Search results for "Forensics"

showing 10 items of 42 documents

Two tiered privacy enhanced intrusion detection system architecture

2009

The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.

Network forensicsInformation privacyComputer sciencePrivacy policyLaw enforcementXACMLComputingMilieux_LEGALASPECTSOFCOMPUTINGIntrusion detection systemNetwork monitoringComputer securitycomputer.software_genreHost-based intrusion detection systemcomputercomputer.programming_language2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
researchProduct

Cover Picture: Uranium from German Nuclear Power Projects of the 1940s— A Nuclear Forensic Investigation (Angew. Chem. Int. Ed. 45/2015)

2015

Nuclear physicsEngineeringchemistrybusiness.industryNuclear forensicschemistry.chemical_elementCover (algebra)General ChemistryNuclear powerUraniumbusinessCatalysisNuclear chemistryAngewandte Chemie International Edition
researchProduct

Nuclear Forensics: A methodology applicable to Nuclear Security and to Non-Proliferation

2011

Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material". Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material…

Nuclear reactionHistoryComputer scienceNuclear engineeringNuclear forensicschemistry.chemical_elementNuclear materialUraniumIsotopic compositionComputer Science ApplicationsEducationCharacterization (materials science)PlutoniumNuclear physicschemistryNeutron
researchProduct

Il fattore personale dell'argomentazione: una prospettiva retorico-antropologica

2014

Dans le cadre d’une approche philosophique et épistémologique, qui privilège le point de vue rhétorique sur l’argumentation et la ligne de pensée Aristote-Vico-Perelman, la thèse essaye d’analyser la construction de la subjectivité dans le discours argumentatif. Je cherche à montrer qu’il est possible de tracer une théorie de l’argumentation dans laquelle subjective n’est pas synonyme de fallacieuse.En général, la thèse analyse le rôle de celui qui parle et de celui qui écoute dans l’argumentation et dans tous les discours. Je vais soutenir est que la dimension personnelle n’est pas un élément qu’il faut supprimer mais, au contraire, un élément essentiel du discours argumentatif.Une approch…

RhetoricEthos (Le mot grec)EthosrhétoriqueRetorica teoria dell'argomentazione ethos ad hominemLangues et littératuresad hominemSciences humainesAristotleArguments ad hominemVicoAd hominem argumentsSpeeches addresses etcArgumentationDiscoursVico Giambattista (1668-1744)Ethos (The Greek word)Forensics (Public speaking)Settore M-FIL/05 - Filosofia E Teoria Dei Linguaggi
researchProduct

The Law of Service Robots

2014

Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…

Robots drones remotely piloted aerial systems ENAC liability privacy data protection commons intellectual property digital forensics cyber-security criminal liabilitySettore IUS/01 - Diritto Privato
researchProduct

A vision-based fully automated approach to robust image cropping detection

2020

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…

Robust computer visionExploitComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRobust statisticsImage processing02 engineering and technologyCropping detectionMultimedia forensicRobustness (computer science)0202 electrical engineering electronic engineering information engineeringMultimedia Forensics Robust Computer Vision Cropping Detection Image Content AnalysisComputer visionElectrical and Electronic EngineeringSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaVision basedbusiness.industryDetectorImage content analysi020206 networking & telecommunicationsFully automatedSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessCroppingSoftwareSignal Processing: Image Communication
researchProduct

The analysis of SUDEP forensic autopsies leading to preventable events

2023

Introduction: The diagnosis of unexpected death by excluding non-natural causes, particularly in subjects with epilepsy, is a topic of interest and it is difficult to identify in the forensic field. Health professionals sometimes are faced with cases of sudden death, generally in young adults with a long history of epilepsy that require, for judicial purposes, an explanation in terms of cause and means to determine the death. SUDEP is an entity diagnosed by the exclusion of other causes that may have led to death, and then for forensic purposes, it requires particular attention and knowledge, and there is difficulty in identifying it. Our contribution aims to illustrate the scientific commu…

SUDEP epilepsy forensics autopsy research preventable events artificial intelligence
researchProduct

Copy–Move Forgery Detection by Matching Triangles of Keypoints

2015

Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and CommunicationsComputer scienceDelaunay triangulationbusiness.industryFeature vectorSURFFeature extractionScale-invariant feature transformPattern recognitionDelaunay TriangulationDigital Image ForensicVisualizationVertex (geometry)Copy-move ForgeryDigital imageComputer Networks and CommunicationHarriSIFTComputer visionArtificial intelligenceSafety Risk Reliability and QualitybusinessCopy-move Forgery; Delaunay Triangulation; Digital Image Forensics; Harris; SIFT; SURF; Computer Networks and Communications; Safety Risk Reliability and QualityTransformation geometryIEEE Transactions on Information Forensics and Security
researchProduct

A tool to support the creation of datasets of tampered videos

2015

Digital Video Forensics is getting a growing interest from the Multimedia research community, as the need for methods to validate the authenticity of a video content is increasing with the number of videos freely available to the digital users. Unlike Digital Image Forensics, to our knowledge, there are not standard datasets to test video forgery detection techniques. In this paper we present a new tool to support the users in creating datasets of tampered videos. We furthermore present our own dataset and we discuss some remarks about how to create forgeries difficult to be detected by an observer, to the naked eye.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCopy move forgeryCopy move forgeryInformation retrievalVideo forensicComputer scienceForgery detectionComputer Science (all)Digital videoComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONObject trackingCopy move forgery; Object tracking; Video forensics; Computer Science (all); Theoretical Computer ScienceData scienceTheoretical Computer ScienceVideo trackingResearch communityDigital image forensics
researchProduct

State of the art in passive digital image forgery detection: copy-move image forgery

2017

Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is cop…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCopyingCopy-move forgery Digital forensics Duplicated detection Manipulation detectionbusiness.industryComputer sciencemedia_common.quotation_subjectDigital forensicsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyImage (mathematics)Digital imageArtificial IntelligenceOriginalityPattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionRelevance (information retrieval)Computer Vision and Pattern RecognitionArtificial intelligenceState (computer science)businessmedia_commonPattern Analysis and Applications
researchProduct