期刊文献+
共找到788篇文章
< 1 2 40 >
每页显示 20 50 100
A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory 被引量:2
1
作者 TIAN Zhihong JIANG Wei +1 位作者 LI Yang DONG Lan 《China Communications》 SCIE CSCD 2014年第5期91-97,共7页
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se... Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators. 展开更多
关键词 network forensics security dempster-shafer theory digital evidence fusion
在线阅读 下载PDF
Blockchain⁃Based Log Verification System for Cloud Forensics
2
作者 AGBEDANU Promise Ricardo WANG Pengwei +3 位作者 LEI Yinghui NORTEY Richard N RASOOL Abdul ODARTEY Lamptey K 《Journal of Donghua University(English Edition)》 CAS 2021年第5期449-458,共10页
In this age when most organizations make use of cloud computing,it is important to not only protect cloud computing resources from cyber⁃attacks but also investigate these attacks.During forensic investigations in a c... In this age when most organizations make use of cloud computing,it is important to not only protect cloud computing resources from cyber⁃attacks but also investigate these attacks.During forensic investigations in a cloud environment,the investigators fall on service providers for pieces of evidence like log files.The challenge,however,is the integrity of these logs provided by the service providers.To this end,we propose a blockchain⁃based log verification system called BlogVerifier that uses a decentralized approach to solve forensics issues in the cloud.BlogVerifier extracts logs produced in cloud environments,hashes these logs and stores the hashed values as transactional values on the blockchain.The transactions are then merged into blocks and shared on the blockchain.The proposed system also ensures the continuation of an investigation even when the primary source of a log is compromised by using encryption and smart contracts.The proposed system also makes it possible for any stakeholder involved in the forensic process to verify the authenticity of log files.The performance results show that BlogVerifier can be integrated into the cloud environment without any significant impact on system resources and increase in computational cost. 展开更多
关键词 cloud computing forensics blockchain CRYPTOGRAPHY SECURITY
在线阅读 下载PDF
Cybersecurity and Cyber Forensics: Machine Learning Approach Systematic Review
3
作者 Ibrahim Goni Jerome MGumpy +1 位作者 Timothy UMaigari Murtala Mohammad 《Semiconductor Science and Information Devices》 2020年第2期25-29,共5页
The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Di... The proliferation of cloud computing and internet of things has led to the connectivity of states and nations(developed and developing countries)worldwide in which global network provide platform for the connection.Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which is perfectly enough for the court of law to use and make a judgment based on the comprehensiveness,authenticity and objectivity of the information obtained.Cybersecurity is of major concerned to the internet users worldwide due to the recent form of attacks,threat,viruses,intrusion among others going on every day among internet of things.However,it is noted that cybersecurity is based on confidentiality,integrity and validity of data.The aim of this work is make a systematic review on the application of machine learning algorithms to cybersecurity and cyber forensics and pave away for further research directions on the application of deep learning,computational intelligence,soft computing to cybersecurity and cyber forensics. 展开更多
关键词 CYBERSECURITY Cyber forensics Cyber space Cyber threat Machine learning and deep learning
在线阅读 下载PDF
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
4
作者 Zhimao Lai Saad Arif +2 位作者 Cong Feng Guangjun Liao Chuntao Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期73-102,共30页
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed... With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics. 展开更多
关键词 Deepfake proactive forensics digital watermarking TRACEABILITY detection techniques
在线阅读 下载PDF
A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigations
5
作者 Sungbum Kim Gwangsik Lee +2 位作者 Jian Song Insoo Lee Taeshik Shon 《Computers, Materials & Continua》 2025年第4期661-683,共23页
The smart home platform integrates with Internet of Things(IoT)devices,smartphones,and cloud servers,enabling seamless and convenient services.It gathers and manages extensive user data,including personal information,... The smart home platform integrates with Internet of Things(IoT)devices,smartphones,and cloud servers,enabling seamless and convenient services.It gathers and manages extensive user data,including personal information,device operations,and patterns of user behavior.Such data plays an essential role in criminal inves-tigations,highlighting the growing importance of specialized smart home forensics.Given the rapid advancement in smart home software and hardware technologies,many companies are introducing new devices and services that expand the market.Consequently,scalable and platform-specific forensic research is necessary to support efficient digital investigations across diverse smart home ecosystems.This study thoroughly examines the core components and structures of smart homes,proposing a generalized architecture that represents various operational environments.A three-stage smart home forensics framework is introduced:(1)analyzing application functions to infer relevant data,(2)extracting and processing data from interconnected devices,and(3)identifying data valuable for investigative purposes.The framework’s applicability is validated using testbeds from Samsung SmartThings and Xiaomi Mi Home platforms,offering practical insights for real-world forensic applications.The results demonstrate that the proposed forensic framework effectively acquires and classifies relevant digital evidence in smart home platforms,confirming its practical applicability in smart home forensic investigations. 展开更多
关键词 Digital forensic forensic framework internet of things smart home smart home platform
在线阅读 下载PDF
A Comprehensive Review on File Containers-Based Image and Video Forensics
6
作者 Pengpeng Yang Chen Zhou +2 位作者 Dasara Shullani Lanxi Liu Daniele Baracchi 《Computers, Materials & Continua》 2025年第11期2487-2526,共40页
Images and videos play an increasingly vital role in daily life and are widely utilized as key evidentiary sources in judicial investigations and forensic analysis.Simultaneously,advancements in image and video proces... Images and videos play an increasingly vital role in daily life and are widely utilized as key evidentiary sources in judicial investigations and forensic analysis.Simultaneously,advancements in image and video processing technologies have facilitated the widespread availability of powerful editing tools,such as Deepfakes,enabling anyone to easily create manipulated or fake visual content,which poses an enormous threat to social security and public trust.To verify the authenticity and integrity of images and videos,numerous approaches have been proposed,which are primarily based on content analysis and their effectiveness is susceptible to interference from various image or video post-processing operations.Recent research has highlighted the potential of file containers analysis as a promising forensic approach that offers efficient and interpretable results.However,there is still a lack of review articles on this kind of approach.In order to fill this gap,we present a comprehensive review of file containers-based image and video forensics in this paper.Specifically,we categorize the existing methods into two distinct stages,qualitative analysis and quantitative analysis.In addition,an overall framework is proposed to organize the exiting approaches.Then,the advantages and disadvantages of the schemes used across different forensic tasks are provided.Finally,we outline the trends in this research area,aiming to provide valuable insights and technical guidance for future research. 展开更多
关键词 Image and video forensics file containers analysis content analysis Deepfakes
在线阅读 下载PDF
Forensic Analysis of Cyberattacks in Electric Vehicle Charging Systems Using Host-Level Data
7
作者 Salam Al-E’mari Yousef Sanjalawe +4 位作者 Budoor Allehyani Ghader Kurdi Sharif Makhadmeh Ameera Jaradat Duaa Hijazi 《Computers, Materials & Continua》 2025年第11期3289-3320,共32页
Electric Vehicle Charging Systems(EVCS)are increasingly vulnerable to cybersecurity threats as they integrate deeply into smart grids and Internet ofThings(IoT)environments,raising significant security challenges.Most... Electric Vehicle Charging Systems(EVCS)are increasingly vulnerable to cybersecurity threats as they integrate deeply into smart grids and Internet ofThings(IoT)environments,raising significant security challenges.Most existing research primarily emphasizes network-level anomaly detection,leaving critical vulnerabilities at the host level underexplored.This study introduces a novel forensic analysis framework leveraging host-level data,including system logs,kernel events,and Hardware Performance Counters(HPC),to detect and analyze sophisticated cyberattacks such as cryptojacking,Denial-of-Service(DoS),and reconnaissance activities targeting EVCS.Using comprehensive forensic analysis and machine learning models,the proposed framework significantly outperforms existing methods,achieving an accuracy of 98.81%.The findings offer insights into distinct behavioral signatures associated with specific cyber threats,enabling improved cybersecurity strategies and actionable recommendations for robust EVCS infrastructure protection. 展开更多
关键词 Electric vehicle charging systems forensic analysis CYBERSECURITY host security cyber-physical systems
在线阅读 下载PDF
Genotype Identification of Complete Hydatidiform Moles without a Maternal Component:Attempts at a Novel 26-plex STR System
8
作者 Yi-na Jiang Lu-yao Li +2 位作者 Peng-fei Nan Fu-quan Jia Li-qin Chen 《Current Medical Science》 2025年第4期889-900,共12页
Objective Current autosomal short tandem repeat(STR)assays can analyze the zygotic composition by comparing the allelic genes at each locus of complete hydatidiform moles(CHM),with a maternal genotype serving as an es... Objective Current autosomal short tandem repeat(STR)assays can analyze the zygotic composition by comparing the allelic genes at each locus of complete hydatidiform moles(CHM),with a maternal genotype serving as an essential reference for comparative analysis.However,their application in pathology represents a challenge because of deficiency or contamination of maternal-origin tissues.This study aimed to develop a novel STR genotyping method for identifying CHM genotypes without a maternal component.Methods Samples with the pathologic description of molar pregnancy were collected.Routine hematoxylin–eosin(HE)staining and p57 immunohistochemistry staining were conducted in accordance with standard guidelines.A novel 26-plex system was explored to classify CHM and diploid pregnancies.The system combined 22 STRs on chromosomes 21/18/13/X,3 sex loci,and 1 quality control marker(TAF9L),enabling molecular diagnosis in the absence of maternal tissue.At last,traditional DNA typing based on villi and decidua(maternal component)of each case was used for result consistency analysis.Results CHM and nonmolar abortus could not be distinguished by the basic HE staining with no fetal evidence or other prominent features.DNA typing was successfully processed for all cases according to the novel 26-plex and traditional system.CHM(46XX)diagnosis required single A-STR/X-STR peaks and absent Y-chromosome markers,excluding chromosomal abnormalities via TAF9L analysis.When the villous tissue analysis revealed single peaks at X-STR/SRY loci,a 1:1 amelogenin ratio,and a 2:1 TAF9L peak ratio,these results overlapped with those of 46XY hydropic abortus or CHM.Notably,p57 immunohistochemical staining resolved the ambiguity.Consistency with traditional DNA genotyping confirmed system accuracy.This multiplex assay enhanced reliability in mole diagnosis,supporting clinical differentiation and genetic counseling.Conclusion This study presents a rapid and cost-effective assay for the genotypic identification of CHM without the need for a maternal component.The method combined the characteristics of STR loci distributed across different chromosomes and developed the clinic application of forensic biomarkers. 展开更多
关键词 Forensic biomarkers Short tandem repeat Complete hydatidiform moles GENOTYPE TAF9L
暂未订购
A Survey of Image Forensics:Exploring Forgery Detection in Image Colorization
9
作者 Saurabh Agarwal Deepak Sharma +2 位作者 Nancy Girdhar Cheonshik Kim Ki-Hyun Jung 《Computers, Materials & Continua》 2025年第9期4195-4221,共27页
In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulat... In today’s digital era,the rapid evolution of image editing technologies has brought about a significant simplification of image manipulation.Unfortunately,this progress has also given rise to the misuse of manipulated images across various domains.One of the pressing challenges stemming from this advancement is the increasing difficulty in discerning between unaltered and manipulated images.This paper offers a comprehensive survey of existing methodologies for detecting image tampering,shedding light on the diverse approaches employed in the field of contemporary image forensics.The methods used to identify image forgery can be broadly classified into two primary categories:classical machine learning techniques,heavily reliant on manually crafted features,and deep learning methods.Additionally,this paper explores recent developments in image forensics,placing particular emphasis on the detection of counterfeit colorization.Image colorization involves predicting colors for grayscale images,thereby enhancing their visual appeal.The advancements in colorization techniques have reached a level where distinguishing between authentic and forged images with the naked eye has become an exceptionally challenging task.This paper serves as an in-depth exploration of the intricacies of image forensics in the modern age,with a specific focus on the detection of colorization forgery,presenting a comprehensive overview of methodologies in this critical field. 展开更多
关键词 Image colorization image forensic digital image forgery machine learning convolutional neural network deep learning generative adversarial network
在线阅读 下载PDF
The Detecting System of Image Forgeries with Noise Features and EXIF Information 被引量:5
10
作者 SUN Xiaoting LI Yezhou +1 位作者 NIU Shaozhang HUANG Yanli 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第5期1164-1176,共13页
Recently, the digital image blind forensics technology has received an increasing attention in academic community. This paper aims at developing a new identification approach based on the statistical noise and exchang... Recently, the digital image blind forensics technology has received an increasing attention in academic community. This paper aims at developing a new identification approach based on the statistical noise and exchangeable image file format (EXIF) information of image for images authen- tication. In particular, the authors can identify whether the current image has been modified or not by utilizing the relevance between noise and EXIF parameters and comparing the real values with the estimated values of the EXIF parameters. Experimental results validate the proposed method. That is, the detecting system can identify the doctored image effectively. 展开更多
关键词 Blind forensics doctored image EXIF parameters noise features
在线阅读 下载PDF
Digital Forensics for Recoloring via Convolutional Neural Network 被引量:2
11
作者 Zhangyi Shen Feng Ding Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2020年第1期1-16,共16页
As a common medium in our daily life,images are important for most people to gather information.There are also people who edit or even tamper images to deliberately deliver false information under different purposes.T... As a common medium in our daily life,images are important for most people to gather information.There are also people who edit or even tamper images to deliberately deliver false information under different purposes.Thus,in digital forensics,it is necessary to understand the manipulating history of images.That requires to verify all possible manipulations applied to images.Among all the image editing manipulations,recoloring is widely used to adjust or repaint the colors in images.The color information is an important visual information that image can deliver.Thus,it is necessary to guarantee the correctness of color in digital forensics.On the other hand,many image retouching or editing applications or software are equipped with recoloring function.This enables ordinary people without expertise of image processing to apply recoloring for images.Hence,in order to secure the color information of images,in this paper,a recoloring detection method is proposed.The method is based on convolutional neural network which is quite popular in recent years.Unlike the traditional linear classifier,the proposed method can be employed for binary classification as well as multiple labels classification.The classification performance of different structure for the proposed architecture is also investigated in this paper. 展开更多
关键词 Image forensics machine learning convolutional neural network recoloring
在线阅读 下载PDF
Median Filtering Forensics Scheme for Color Images Based on Quaternion Magnitude-Phase CNN 被引量:2
12
作者 Jinwei Wang Yang Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第1期99-112,共14页
In the paper,a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images.Compared with conventional convolutional neural network,color images can be proces... In the paper,a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images.Compared with conventional convolutional neural network,color images can be processed in a holistic manner in the proposed scheme,which makes full use of the correlation between RGB channels.And due to the use of convolutional neural network,it can effectively avoid the one-sidedness of artificial features.Experimental results have shown the scheme’s improvement over the state-of-the-art scheme on the accuracy of color image median filtering detection. 展开更多
关键词 Quaternion transform convolutional neural network median filtering forensics color image
在线阅读 下载PDF
Cloud Foren:A Novel Framework for Digital Forensics in Cloud Computing 被引量:2
13
作者 Mathew Nyamagwa Jigang Liu +1 位作者 Anyi Liu Tetsutaro Uehara 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期39-45,共7页
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.A... Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment. 展开更多
关键词 digital forensics cloud computing FRAMEWORK
在线阅读 下载PDF
PHOTOREALISTIC COMPUTER GRAPHICS FORENSICS BASED ON LEADING DIGIT LAW 被引量:3
14
作者 Xu Bo Wang Junwen Liu Guangjie Dai Yuewei 《Journal of Electronics(China)》 2011年第1期95-100,共6页
As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it ma... As the advent and growing popularity of image rendering software,photorealistic computer graphics are becoming more and more perceptually indistinguishable from photographic images.If the faked images are abused,it may lead to potential social,legal or private consequences.To this end,it is very necessary and also challenging to find effective methods to differentiate between them.In this paper,a novel leading digit law,also called Benford's law,based method to identify computer graphics is proposed.More specifically,statistics of the most significant digits are extracted from image's Discrete Cosine Transform(DCT) coefficients and magnitudes of image's gradient,and then the Support Vector Machine(SVM) based classifiers are built.Results of experiments on the image datasets indicate that the proposed method is comparable to prior works.Besides,it possesses low dimensional features and low computational complexity. 展开更多
关键词 Leading digit law Benford’s law Digital image forensic Computer graphics
在线阅读 下载PDF
Multi-Purpose Forensics of Image Manipulations Using Residual-Based Feature 被引量:1
15
作者 Anjie Peng Kang Deng +1 位作者 Shenghai Luo Hui Zeng 《Computers, Materials & Continua》 SCIE EI 2020年第12期2217-2231,共15页
The multi-purpose forensics is an important tool for forge image detection.In this paper,we propose a universal feature set for the multi-purpose forensics which is capable of simultaneously identifying several typica... The multi-purpose forensics is an important tool for forge image detection.In this paper,we propose a universal feature set for the multi-purpose forensics which is capable of simultaneously identifying several typical image manipulations,including spatial low-pass Gaussian blurring,median filtering,re-sampling,and JPEG compression.To eliminate the influences caused by diverse image contents on the effectiveness and robustness of the feature,a residual group which contains several high-pass filtered residuals is introduced.The partial correlation coefficient is exploited from the residual group to purely measure neighborhood correlations in a linear way.Besides that,we also combine autoregressive coefficient and transition probability to form the proposed composite feature which is used to measure how manipulations change the neighborhood relationships in both linear and non-linear way.After a series of dimension reductions,the proposed feature set can accelerate the training and testing for the multi-purpose forensics.The proposed feature set is then fed into a multi-classifier to train a multi-purpose detector.Experimental results show that the proposed detector can identify several typical image manipulations,and is superior to the complicated deep CNN-based methods in terms of detection accuracy and time efficiency for JPEG compressed image with low resolution. 展开更多
关键词 Digital image forensics partial correlation auto-regression MULTI-CLASSIFICATION
在线阅读 下载PDF
Primary Exploration of Reliability Evaluation of Computer Live Forensics Model on Physical Memory Analysis 被引量:1
16
作者 Lian-Hai Wang Qiu-Liang Xu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第4期121-128,共8页
The integrity and fidelity of digital evidence are very important in live forensics. Previous studies have focused the uncertainty of live forensics based on different memory snapshots. However,this kind of method is ... The integrity and fidelity of digital evidence are very important in live forensics. Previous studies have focused the uncertainty of live forensics based on different memory snapshots. However,this kind of method is not effective in practice. In fact,memory images are usually acquired by using forensics tools instead of using snapshots. Therefore,the integrity and fidelity of live evidence should be evaluated during the acquisition process. In this paper,we study the problem in a novel viewpoint. Firstly,several definitions about memory acquisition measure error are introduced to describe the trusty. Then,we analyze the experimental error and propose some suggestions on how to reduce it. A novel method is also developed to calculate the system error in detail. The results of a case study on Windows 7 and VMware virtual machine show that the experimental error has good accuracy and precision,which demonstrate the efficacy of the proposed reducing methods. The system error is also evaluated,that is,it accounts for the whole error from 30% to 50%. 展开更多
关键词 digital investigation live forensics volatile memory acquisition trusted probability
在线阅读 下载PDF
A Survey of Blind Forensics Techniques for JPEG Image Tampering 被引量:1
17
作者 Xueling Chu Haiming Li 《Journal of Computer and Communications》 2019年第10期1-13,共13页
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and... Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and foreign scholars in the blind forensic technology of JPEG image tampering were briefly described. Then, according to the different methods of tampering and detection, the current detection was divided into two types: double JPEG compression detection and block effect inconsistency detection. This paper summarized the existing methods of JPEG image blind forensics detection, and analyzed the two methods. Finally, the existing problems and future research trends were analyzed and prospected to provide further theoretical support for the research of JPEG image blind forensics technology. 展开更多
关键词 IMAGE forensics TAMPER Detection JPEG IMAGE forensics JPEG BLOCK Effect
在线阅读 下载PDF
Construction and evaluation of in-house methylation-sensitive SNaPshot system and three classification prediction models for identifying the tissue origin of body fluid 被引量:1
18
作者 Yating FANG Man CHEN Bofeng ZHU 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2023年第9期839-852,共14页
The identification of tissue origin of body fluid can provide clues and evidence for criminal case investigations.To establish an efficient method for identifying body fluid in forensic cases,eight novel body fluid-sp... The identification of tissue origin of body fluid can provide clues and evidence for criminal case investigations.To establish an efficient method for identifying body fluid in forensic cases,eight novel body fluid-specific DNA methylation markers were selected in this study,and a multiplex single base extension reaction(SNaPshot)system for these markers was constructed for the identification of five common body fluids(venous blood,saliva,menstrual blood,vaginal fluid,and semen).The results indicated that the in-house system showed good species specificity,sensitivity,and ability to identify mixed biological samples.At the same time,an artificial body fluid prediction model and two machine learning prediction models based on the support vector machine(SVM)and random forest(RF)algorithms were constructed using previous research data,and these models were validated using the detection data obtained in this study(n=95).The accuracy of the prediction model based on experience was 95.79%;the prediction accuracy of the SVM prediction model was 100.00%for four kinds of body fluids except saliva(96.84%);and the prediction accuracy of the RF prediction model was 100.00%for all five kinds of body fluids.In conclusion,the in-house SNaPshot system and RF prediction model could achieve accurate tissue origin identification of body fluids. 展开更多
关键词 DNA methylation Body fluid Forensic identification Single base extension reaction(SNaPshot) Machine learning
原文传递
Digital Forensics and Cyber Crime Datamining 被引量:2
19
作者 K. K. Sindhu B. B. Meshram 《Journal of Information Security》 2012年第3期196-201,共6页
Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve th... Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability. 展开更多
关键词 CYBER Forensic DIGITAL Forensic TOOL Network Forensic TOOL CRIME Data MINING
在线阅读 下载PDF
Development of a 9-locus X-STR Multiplex PCR System for Genetic Analysis of Three Ethnic Populations in China 被引量:3
20
作者 黄代新 马红杜 +3 位作者 杨荣芝 易少华 刘宇轩 胡清清 《Journal of Huazhong University of Science and Technology(Medical Sciences)》 SCIE CAS 2015年第2期183-187,共5页
X-chromosome short tandem repeats(X-STR) analysis has been confirmed to be effective for kinship testing such as in deficiency paternity cases. The aim of this study was to develop a new multiplex polymerase chain r... X-chromosome short tandem repeats(X-STR) analysis has been confirmed to be effective for kinship testing such as in deficiency paternity cases. The aim of this study was to develop a new multiplex polymerase chain reaction(PCR) system that can simultaneously amplify 9 X-STR loci(GATA172D05, DXS10159, DXS6797, HPRTB, DXS10079, DXS6789, DXS9895, DXS10146 and GATA31E08) in the same PCR reaction, and to obtain the database of the 9 X-STR loci in three ethnic populations in China. The genetic data of 815(404 females and 411 males) unrelated Han Chinese from Hubei province, and Yi and Zhuang Chinese from Yunnan province were analyzed by using this multiplex system. The results showed that a total of 93 alleles for all these loci were found, and 7 to 20 alleles for each locus were observed. All of the analyzed loci were in agreement with Hardy-Weinberg equilibrium after Bonferroni correction in the three studied populations. The polymorphism information content(PIC) and power of discrimination(PD) in females were 0.6566–0.8531 and 0.8639–0.9684, respectively. Pairwise comparisons of allele frequency distribution showed significant differences in the most of these loci between different populations. The results indicate that this multiplex system is very useful for forensic analysis of different ethnic populations in China. 展开更多
关键词 populations alleles locus chromosome ethnic repeats forensic discrimination unrelated correction
暂未订购
上一页 1 2 40 下一页 到第
使用帮助 返回顶部