Loading…
Advanced Framework for Digital Forensic Technologies and Procedures
Trček, Denis, Abie, Habtamu, Skomedal, Åsmund, Starc, Iztok
Published in Journal of forensic sciences (01.11.2010)
Published in Journal of forensic sciences (01.11.2010)
Get full text
Journal Article
Loading…
Forensic implications of respiratory derived blood spatter distributions
Denison, David, Porter, Alice, Mills, Matthew, Schroter, Robert C.
Published in Forensic science international (30.01.2011)
Published in Forensic science international (30.01.2011)
Get full text
Journal Article
Loading…
Dental sex dimorphism: Using odontometrics and digital jaw radiography
Satish, B N V S, Moolrajani, Chanchal, Basnaker, Maharudrappa, Kumar, Prashant
Published in Journal of forensic dental sciences (01.01.2017)
Published in Journal of forensic dental sciences (01.01.2017)
Get full text
Journal Article
Loading…
Effects of image compression on ear biometrics
Rathgeb, Christian, Pflug, Anika, Wagner, Johannes, Busch, Christoph
Published in IET biometrics (01.09.2016)
Published in IET biometrics (01.09.2016)
Get full text
Journal Article
Loading…
Loading…
Role of forensic dentistry for dental practitioners: A comprehensive study
Rathod, Vanita, Desai, Veena, Pundir, Siddharth, Dixit, Sudhanshu, Chandraker, Rashmi
Published in Journal of forensic dental sciences (01.05.2017)
Published in Journal of forensic dental sciences (01.05.2017)
Get full text
Journal Article
Loading…
Loading…
Age and gender assessment through three-dimensional morphometric analysis of maxillary sinus using magnetic resonance imaging
Rani, Sanda Usha, Rao, Guttikonda Venkateswara, Kumar, Dumpala Rakesh, Sravya, Taneeru, Sivaranjani, Yeluri, Kumar, Manchikatla Praveen
Published in Journal of forensic dental sciences (01.01.2017)
Published in Journal of forensic dental sciences (01.01.2017)
Get full text
Journal Article
Loading…
Loading…
An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition
Yazhuo Gong, Zhang, D., Pengfei Shi, Jingqi Yan
Published in IEEE transactions on information forensics and security (01.01.2013)
Published in IEEE transactions on information forensics and security (01.01.2013)
Get full text
Journal Article
Loading…
Pattern self-repetition of fingerprints, lip prints, and palatal rugae among three generations of family: A forensic approach to identify family hierarchy
Mala, Sankeerti, Rathod, Vanita, Pundir, Siddharth, Dixit, Sudhanshu
Published in Journal of forensic dental sciences (01.01.2017)
Published in Journal of forensic dental sciences (01.01.2017)
Get full text
Journal Article
Loading…
Preferences for lives, injuries, and age: A stated preference survey
Carlsson, Fredrik, Daruvala, Dinky, Jaldell, Henrik
Published in Accident analysis and prevention (01.11.2010)
Published in Accident analysis and prevention (01.11.2010)
Get full text
Journal Article
Loading…
The migration of some biometal ions in the systems mineral tissue of teeth–soil and teeth–water media
Nikolic, Ruzica S, Radosavljevic-Stevanovic, Natasa V, Andelkovic, Tatjana D, Stankovic, Maja N, Krstic, Nenad S
Published in Journal of the Serbian Chemical Society (01.01.2014)
Published in Journal of the Serbian Chemical Society (01.01.2014)
Get full text
Journal Article
Loading…
Unidentified bodies and human remains: An Italian glimpse through a European problem
Cattaneo, C., Porta, D., De Angelis, D., Gibelli, D., Poppa, P., Grandi, M.
Published in Forensic science international (25.02.2010)
Published in Forensic science international (25.02.2010)
Get full text
Journal Article
Loading…
Loading…
An Automated Solution to the Multiuser Carved Data Ascription Problem
Garfinkel, S L, Parker-Wood, A, Huynh, D, Migletz, J
Published in IEEE transactions on information forensics and security (01.12.2010)
Published in IEEE transactions on information forensics and security (01.12.2010)
Get full text
Journal Article
Loading…
Loading…
Incident Response Plan for a Small to Medium Sized Hospital
DeVoe, Charles, M. Rahman, Syed (Shawon)
Published in International journal of network security & its applications (31.03.2013)
Published in International journal of network security & its applications (31.03.2013)
Get full text
Journal Article