Sökning: "computer crime"
Visar resultat 11 - 15 av 33 uppsatser innehållade orden computer crime.
11. Library construction optimization and analysis of Short Tandem Repeats by a simple, PCR-based DNA barcoding method
Master-uppsats, Lunds universitet/Teknisk mikrobiologi; Lunds universitet/BioteknikSammanfattning : DNA profiling is evolving in the forensics community towards introducing massively parallel sequencing (MPS) as a complement to capillary electrophoresis (CE). Obstacles remain however before this technology can become routine in forensic casework, such as the development of more efficient bioinformatics solutions and recommendations concerning data analyses. LÄS MER
12. Molnforensik : En litteraturstudie om tekniska utmaningar och möjligheter inom IT-forensik mot molnet
Kandidat-uppsats, Högskolan i Skövde/Institutionen för informationsteknologiSammanfattning : Molntjänster används idag över hela världen och ger många fördelar för en användare eller företag. En nackdel med molnet är att det är en miljö som kriminella kan använda sig av för att utföra brott. LÄS MER
13. Estimation of Red Blood Cell-Count using Neural Networks
Master-uppsats, Lunds universitet/Fysiska institutionen; Lunds universitet/FörbränningsfysikSammanfattning : Quantification through image analysis is used in a multitude of fields, and often requires algorithms tailored to the specific task and object that needs to be quantified. The need for flexibility means that such segmentation algorithms are quickly becoming outdated with the advent of convolutional neural networks, which can be trained to fit the specific requirements of the user. LÄS MER
14. Combating online child sexual abuse material. An explorative study of Swedish police investigations
Master-uppsats, Malmö universitet/Fakulteten för hälsa och samhälle (HS)Sammanfattning : Online child sexual abuse material (CSAM) is a growing problem that transcends geographical borders. In order to improve cooperation between international law enforcement, knowledge concerning the jurisdiction, procedure and issues with investigations in different countries is needed. LÄS MER
15. Insider Threat detection using Isolation Forest
Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknikSammanfattning : In contrast to the need for companies to get real time information about insider threats, there is a privacy and integrity based limitation of what the individual accepts as acceptable surveillance. This creates a problem since performing online surveillance would pose an infringement on the employees privacy and integrity. LÄS MER