In computer forensics, investigators need to be able to analyse storage devices. Storage devices tend to store information in blocks, and the arrangement of blocks in a certain order is the thing which represents a data object. Read more
In order to detect contraband content within a cloud-based system, it is possible to sample fragments of data [1] and match them against hashed values. Read more
The question of what conscious perception is for remains a key, largely unanswered, question for the scientific study of consciousness and indeed for our whole understanding of mind. Read more
As deep learning technologies continue to evolve, the rise of deepfake videos has become a critical concern, posing threats to cybersecurity, privacy, and the spread of misinformation. Read more
*Offer only available for the duration of your active subscription, and subject to change. You MUST claim your prize within 72 hours, if not we will redraw.
Do you want hassle-free information and advice?
Create your FindAPhD account and sign up to our newsletter:
Find out about funding opportunities and application tips
Receive weekly advice, student stories and the latest PhD news
Hear about our upcoming study fairs
Save your favourite projects, track enquiries and get personalised subject updates
Due to your Facebook privacy settings, we were unable to create your account at this time. Please select another method to sign up.
We were unable to log you in with your Google account at this time. If you have third-party cookies blocked, please enable them, refresh, and try again.
or
Continue with Facebook
Create your account
We were unable to log you in with your Google account at this time. If you have third-party cookies blocked, please enable them, refresh, and try again.
Looking to list your PhD opportunities? Log in here.