Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1
zadetkov: 4
1.
  • Forensic method for decrypt... Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI
    Bichara de Assumpção, Matheus; Reis, Marcelo Abdalla dos; Marcondes, Marcos Roberto ... Forensic Science International: Digital Investigation, March 2023, 2023-03-00, Letnik: 44
    Journal Article
    Recenzirano
    Odprti dostop

    Starting from Windows 11, the Trusted Platform Module (TPM) 2.0 has become a computer requirement, providing hardware-based security capabilities. This poses a challenge to digital forensics experts, ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
2.
  • "EMEET/SERVE: geração sob-demanda de hiperdocumentos multimídia a partir de informação capturada em reuniões distribuídas"
    Pedro Monteiro da Silva Eleutério
    Dissertation

    A literatura apresenta muitos sistemas que foram desenvolvidos a fim de automatizar o processo de geração de hiperdocumentos multimídia a partir de experiências ao vivo; ambientes educacionais e de ...
Preverite dostopnost
3.
  • NuDetective: A Forensic Too... NuDetective: A Forensic Tool to Help Combat Child Pornography through Automatic Nudity Detection
    de Castro Polastro, Mateus; da Silva Eleuterio, Pedro Monteiro 2010 Workshops on Database and Expert Systems Applications, 2010-Aug.
    Conference Proceeding

    With the recent amendment in Brazilian law, where possession of files containing child pornography is now considered a crime, the need to detect this type of content at crime scenes increased. This ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
4.
  • A Statistical Approach for ... A Statistical Approach for Identifying Videos of Child Pornography at Crime Scenes
    de Castro Polastro, M.; da Silva Eleuterio, P. M. 2012 Seventh International Conference on Availability, Reliability and Security, 2012-Aug.
    Conference Proceeding

    The identification of child pornographic files at crime scenes can take a pedophile to jail immediately. However, this type of live analysis is a difficult task, since a computer storage device can ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

Nalaganje filtrov