Showing 1 - 12 results of 12 for search 'Horsens~', query time: 2.61s Refine Results
  1. 1

    Multimedia Forensics

    Published 2022
    Table of Contents: “…What's In This Book and Why? -- Media Forensics in the Age of Disinformation -- Computational Imaging -- Sensor Fingerprints: Camera Identification and Beyond -- Source Camera Attribution from Videos -- Source Camera Model Identification -- GAN Fingerprints in Face Image Synthesis -- Physical Integrity.…”
    Link to Metadata
    Electronic eBook
  2. 2

    Forensic Genetics in the Governance of Crime by Machado, Helena, Granja, Rafaela

    Published 2020
    Table of Contents: “…Chapter 1 Introduction -- Chapter 2 The Sociological Gaze -- Chapter 3 Biological Explanations of Criminal Behaviour -- Chapter 4 DNA Technologies in Criminal Investigation and Courts -- Chapter 5 DNA Databases and Big Data -- Chapter 6 Forensic Genetics and Governance of Transnational Criminality -- Chapter 7 Emerging DNA Technologies and Stigmatization -- Chapter 8 Conclusion.…”
    Link to Metadata
    Electronic eBook
  3. 3
  4. 4
  5. 5

    Handbook on Craniofacial Superimposition The MEPROCS Project / by Damas, Sergio, Cordón, Oscar, Ibáñez, Oscar

    Published 2020
    Table of Contents: “…Introduction to Craniofacial Superimposition -- Importance of Craniofacial Superimposition in Forensic Identification: Historical Perspective -- Relationships Between the Skull and the Face in the Forensic Realm -- Craniofacial Superimposition Techniques -- Craniofacial Superimposition: The State of the Art -- Ethical and Legal Issues in Craniofacial Superimposition -- Experimental Study of Methodologies, Tools and Criteria -- MEPROCS Craniofacial Superimposition Framework -- MEPROCS Framework Validation -- Conclusions -- Appendices -- References.…”
    Link to Metadata
    Electronic eBook
  6. 6
  7. 7

    Security of Ubiquitous Computing Systems Selected Topics /

    Published 2021
    Table of Contents: “…Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics.…”
    Link to Metadata
    Electronic eBook
  8. 8

    Modes of Bio-Bordering The Hidden (Dis)integration of Europe / by Amelung, Nina, Granja, Rafaela, Machado, Helena

    Published 2021
    Table of Contents: “…Chapter 1 - Introduction -- Chapter 2 - A brief history of the evolution of forensic biometrics and biometric database systems crossing borders in EU law enforcement -- Chapter 3 - Biobordering as a concept -- Chapter 4 - Germany -- Chapter 5 - The Netherlands -- Chapter 6 - Poland -- Chapter 7 - Portugal -- Chapter 8 - The United Kingdom -- Chapter 9 - Conclusion.…”
    Link to Metadata
    Electronic eBook
  9. 9
  10. 10

    Explorations An Open Invitation To Biological Anthropology

    Published 2019
    Table of Contents: “…Human Variation: An Adaptive Significance Approach -- 15. Bioarchaeology and Forensic Anthropology -- 16. Contemporary Topics: Human Biology and Health -- Part II. …”
    Access online version
    Electronic eBook
  11. 11
  12. 12