Уголовное судопроизводство. Уголовно-процессуальное право - 343.1

Подразделы для УДК 343.1

(Уголовное судопроизводство. Уголовно-процессуальное право)

Научные статьи

В разделе "Уголовное судопроизводство. Уголовно-процессуальное право"
A Model of Workflow-oriented Attributed Based Access Control
Guoping Zhang, Jing Liu
Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System
V.K. Narendira Kumar, B. Srinivasan
Digital Forensic Investigation Tools and Procedures
K. K. Sindhu, B. B. Meshram
Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition
V.K. NARENDIRA KUMAR, B. SRINIVASAN
A Survey: Recent Advances and Future Trends in Honeypot Research
Matthew L. Bringer, Christopher A. Chelmecki, Hiroshi Fujinoki
Integrity Analysis of Multimedia File Transmission between Mobile Phones
Sweta Deana Bye. Dhondoo, Vidasha. Ramnarain-Seetohul, Razvi. Doomun
PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes
Mohammad Rasmi, Ahmad Al-Qerem
Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes
Rabail S. Satti, Fakeeha Jafari
A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia
Yudi Prayudi, Ahmad Ashari, Tri K Priyambodo
Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism
Apurva R. Naik, Lalit B. Damahe
Internet Passport Authentication System Using Multiple Biometric Identification Technology
V.K. Narendira Kumar, B. Srinivasan
A Pragmatic Approach for E-governance Evaluation Built over Two Streams (of Literature)
Marya Butt
Comparative Evaluation of Mobile Forensic Tools
Oluwafemi Osho, Sefiyat Oyiza Ohida
A Hybrid Approach for Detecting Suspicious Accounts in Money Laundering Using Data Mining Techniques
Ch.Suresh, K.Thammi Reddy, N. Sweta
Vehicle Theft Alert and Location Identification Using GSM, GPS and Web Technologies
Garba Suleiman, Ibrahim S. Shehu, Olumide S. Adewale, Muhammad B. Abdullahi, Solomon A. Adepoju
Real Time Recognition of Handwritten Devnagari Signatures without Segmentation Using Artificial Neural Network
Shailendra Kumar Dewangan
Cybercrimes Solutions using Digital Forensic Tools
Dhwaniket Ramesh Kamble, Nilakshi Jain, Swati Deshpande
Next Generation Electronic Passport Scheme using Cryptographic Authentication Protocols and Multiple Biometrics Technology
V.K. Narendira Kumar, B. Srinivasan
Statistical Analysis of Resulting Palm vein Image through Enhancement Operations
Shriram D. Raut, Vikas T. Humbe
Abiding IPRs in Technological Implications for Pakistan
Murtaza Hussain Shaikh, Ievet S.Karlson, Noor Ahmed Ansari, Mahreen Jurial Khan, Dai xiaoling
Computer Forensics and Image Deblurring: An Inclusive Investigation
Zohair Al-Ameen, Ghazali Bin Sulong, Md. Gapar Md. Johar
A Survey on Face Detection and Recognition Techniques in Different Application Domain
Subrat Kumar Rath, Siddharth Swarup Rautaray
Digital Forensics through Application Behavior Analysis
Shuaibur Rahman, M. N. A. Khan
Computer security and software watermarking based on return-oriented programming
Ashwag Alrehily, Vijey Thayananthan
Cyber security and analysis of cyber-crime laws to restrict cyber crime in Pakistan
Qamar Atta Ul Haq
Privacy and security concerns in electronic commerce websites in Ghana: a survey study
Issah Baako, Sayibu Umar, Prosper Gidisu
Ensemble learning approach for weapon recognition using images of wound patterns: a forensic perspective
Dayanand G. Savakar, Anil Kannur
INSPECT- an intelligent and reliable forensic investigation through virtual machine snapshots
K. Umamaheswari, S. Sujatha
Hidden Markov model for identification of different marks on human body in forensic perspective
Dayanand G. Savakar, Anil Kannur
Mining the dark web: a novel approach for placing a dark website under investigation
Bassel Alkhatib, Randa S. Basheer
Detection of Suspicious Timestamps in NTFS using Volume Shadow Copies
Alji Mohamed, Chougdali Khalid
A Biometric Asymmetric Cryptosystem Software Module Based on Convolutional Neural Networks
Ilyenko Anna, Ilyenko Sergii, Herasymenko Marharyta
Application of Digital Forensics to Identify Human Voices Using the System Development Life Cycle (SDLC) Method
Misriani, Ingrid Nurtanio, Yuyun, Omar Wahid
An Adaptive User Authentication Architecture for Drunk Driving and Vehicle Theft Mitigation
Edward O. Ofoegbu
A Review on HEVC Video Forensic Investigation under Compressed Domain
Neetu Singla, Sushama Nagpal, Jyotsna Singh
Blockchain and IFPS based Secure System for Managing e-FIR
Khandaker Mohammad Mohi Uddin, Sadia Mahamuda, Sikder Sajib Al Shahriar, Md Ashraf Uddin
Towards a Novel Identity Check Using Latest W3C standards & Hybrid Blockchain for Paperless Verification
Samiur Rahman Khan, Md. Al-Amin
A Proposed Model for Vehicle Registration Using Blockchain
Md. Zawad Hossain Rifat, Md. Shakil, Rifat Md. Iftakhar Hasan, F. A. Zidan, Dip Nandi
Blocking Fraud, Advertising, or Campaign-Related Calls with a Blockchain-based Mobile App
Remzi Gürfidan, Şerafettin Atmaca
Proof of Notoriety: A Promised Consensus Mechanism for the Blockchain-based Copyright System
Ahmed Mounsif Kebir, Asmaa Boughrara