Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Security (3)
- Firearm identification (2)
- Analytics (1)
- Australia (1)
- Ballistic images (1)
-
- Ballistics (1)
- Big data (1)
- Browsers (1)
- Business intelligence (1)
- Cloud Services (1)
- Conference (1)
- Data discovery (1)
- Encryption (1)
- Event processing (1)
- Evidence (1)
- Fast Fourier Transform (FFT) (1)
- Hadoop (1)
- Image processing (1)
- Intelligence (1)
- Investigation (1)
- Law (1)
- Mobility (1)
- Networking (1)
- NoSQL. (1)
- Ontology (1)
- Pattern recognition (1)
- Privacy (1)
- Projectile specimens (1)
- Semantic (1)
- Sentiment analysis (1)
Articles 1 - 6 of 6
Full-Text Articles in Criminology
Mining Social Networking Sites For Digital Evidence, Brian Cusack, Saud Alshaifi
Mining Social Networking Sites For Digital Evidence, Brian Cusack, Saud Alshaifi
Australian Digital Forensics Conference
OnLine Social Networking sites (SNS) hold a vast amount of information that individuals and organisations post about themselves. Investigations include SNS as sources of evidence and the challenge is to have effective tools to extract the evidence. In this exploratory research we apply the latest version of a proprietary tool to identify potential evidence from five SNS using three different browsers. We found that each web browser influenced the scope of the evidence extracted. In previous research we have shown that different open source and proprietary tools influence the scope of evidence obtained. In this research we asked, What variation …
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
The Bad Guys Are Using It, Are You?, Hong-Eng Koh
Australian Security and Intelligence Conference
From Occupy Wall Street to 2011 England riots to Arab Spring to Mumbai 26/11 to the ethnic cleansing rumors in India and increasingly used by pedophiles, social media is a very powerful tool for pedophiles, troublemakers, criminals and even terrorists to target individuals and even to go against the establishment. On the other hand, social media can save lives in a disaster, and its a natural extension of community policing or engagement. Community engagement is a must-have strategy for any public safety and security agency. However, this strategy requires the removal of stovepipe processes and systems within an agency, allowing …
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone
Australian Security and Intelligence Conference
Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
7th Australian Security And Intelligence Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University, Security Research Institute, Edith Cowan University
Australian Security and Intelligence Conference
No abstract provided.
Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li
Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li
Research outputs pre 2011
Firearm identification is an intensive and time-consuming process that requires physical interpretation of forensic ballistics evidence. Especially as the level of violent crime involving firearms escalates, the number of firearms to be identified accumulates dramatically. The demand for an automatic firearm identification system arises. This chapter proposes a new, analytic system for automatic firearm identification based on the cartridge and projectile specimens. Not only do we present an approach for capturing and storing the surface image of the spent projectiles at high resolution using line-scan imaging technique for the projectiles database, but we also present a novel and effective FFT-based …
Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li
Australian Firearm Identification System Based On The Ballistics Images Of Projectile Specimens, Dongguang Li
Research outputs pre 2011
Charactetistic markings on the cartridge case and projectile of a fired bullet are created when it is fired. Over thirty different features within these marks can be distinguished, which in combination produce a "fingerprint" for a firearm. By analyzing features within such a set of fireann :fingerprints, it will be possible to identify not only the type and model of a fireann, but also each every individual weapon as effectively as human :fingerprint identification. A new analytic system based on fast Fourier transform (FFT) for identifying the projectile specimens by the line-scan imaging technique is proposed in this paper. Experimental …