Script-based tool for remote digital forensics analysisIn this Master Thesis it has been working in digital forensics and its aim is to create a tool with a GUI that will allow people that are not specialist in digital forensics to perform an analysis at the same time that preserve the chain of custody of the artifacts being analyzed. This is done to make able digital forensics investigations at any part of the world where there it may not be any specialist. The tools that have been scripted and analyzed in this project are the following: binary copy, file carving, timeline, OCR and eDiscovery. There are already some tools with GUI but our aim is to create a new one so easy to use that if in one country there is no specialist, the analysis ...
Modern video coding algorithms are becoming increasingly complex with the result that single general...
The transition from the operating room to the postoperative care unit is a critical time in the peri...
abstract: Concurrency bugs are one of the most notorious software bugs and are very difficult to man...
Monitoring the preservation of security and dependability (S&D) properties of complex software syste...
The present work examined how holistic, conceptual processing could be achieved by meaningfully inte...
Education and technology in today’s era is a vital part of our lives. Academic institutions are inco...
In recent years, investigative genetic genealogy (IGG), which involves the use of genealogical metho...
The growing importance of mobile telephones, especially so called smartphones , the problem of iden...
2014 Fall.Includes bibliographical references.This project focused on user experience to create a pl...
A series of in-person and task-oriented usability tests were conducted to evaluate the functional in...
Crimes committed over computer networks has increased dramatically over the past few years. From the...
As SAFe model is still young method on the industry, this research studies how Scaled Agile Framewor...
Rates of internalized false confessions has become increasingly salient through the use of DNA evide...
The purpose of this paper is to explore overarching themes regarding identity and the HR department....
The aim of the current study is to investigate the effects of eye-closure on true and false memory f...
Modern video coding algorithms are becoming increasingly complex with the result that single general...
The transition from the operating room to the postoperative care unit is a critical time in the peri...
abstract: Concurrency bugs are one of the most notorious software bugs and are very difficult to man...
Monitoring the preservation of security and dependability (S&D) properties of complex software syste...
The present work examined how holistic, conceptual processing could be achieved by meaningfully inte...
Education and technology in today’s era is a vital part of our lives. Academic institutions are inco...
In recent years, investigative genetic genealogy (IGG), which involves the use of genealogical metho...
The growing importance of mobile telephones, especially so called smartphones , the problem of iden...
2014 Fall.Includes bibliographical references.This project focused on user experience to create a pl...
A series of in-person and task-oriented usability tests were conducted to evaluate the functional in...
Crimes committed over computer networks has increased dramatically over the past few years. From the...
As SAFe model is still young method on the industry, this research studies how Scaled Agile Framewor...
Rates of internalized false confessions has become increasingly salient through the use of DNA evide...
The purpose of this paper is to explore overarching themes regarding identity and the HR department....
The aim of the current study is to investigate the effects of eye-closure on true and false memory f...
Modern video coding algorithms are becoming increasingly complex with the result that single general...
The transition from the operating room to the postoperative care unit is a critical time in the peri...
abstract: Concurrency bugs are one of the most notorious software bugs and are very difficult to man...