1 - 4 of 4 articles
Abstract A critical component of information security is data encryption, and numerous researchers have invented various approaches to encrypt data. This paper presents a novel image encryption approach using the shortest weight first algorithm from graph theory, categorized as a symmetric...
Abstract How we treat victims determines the amount of information we gain from a victim interview. It is also crucial for the security of victims, and for preventing revictimization in a criminal procedure. Nancy Oglesby, Esq., a career prosecutor, and Director of Justice 3D, was interviewed to...
Abstract Page smear is a phenomenon that occurs when a system’s volatile memory dump is obtained in a non-atomic manner; it’s more common in systems with a lot of RAM and different workloads. It has a considerable impact on the quality and reliability of the forensic artifacts obtained, as well...
Abstract Security assurance evaluation (SAE) is a technique that helps organizations to appraise the trust and confidence that a system can be operated correctly and securely. This paper contributes to the research on quantitative SAE by proposing an ontology-based assurance metrics computation...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.