Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,185 papers from all fields of science
Search
Sign In
Create Free Account
XRY (software)
Known as:
.XRY
, XRY
XRY is a digital forensics and mobile device forensics product by the Swedish company Micro Systemation used to analyze and recover information from…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Mobile device forensics
Mobile phone
Tablet computer
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Forensic taxonomy of android productivity apps
Abdullah Azfar
,
Kim-Kwang Raymond Choo
,
Lin Liu
Multimedia tools and applications
2017
Corpus ID: 21654588
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the…
Expand
Review
2012
Review
2012
POTENTIAL HERBS AND ITS PHYTOCONSTITUENTS AGAINST FUNGAL INFECTION : A SYSTEMATIC REVIEW
S. Gupta
,
M. Satishkumar
,
B. Duraiswamy
,
S. Das
,
M. Chhajed
2012
Corpus ID: 46969194
Herbs have been one of the important and unique sources of medicines even since the dawn of human civilization. In spite of…
Expand
2011
2011
Diet of nineteen mesopelagic fishes in the Gulf of Alaska
Mei-Sun Yang
2011
Corpus ID: 134927187
A total of 1,607 stomachs from 19 species were analyzed to describe the food habits of the mesopelagic fishes in the Gulf of…
Expand
2011
2011
Challenging the Reliability of iPhone - Geo-tags
H. Lallie
,
D. Benford
2011
Corpus ID: 55903466
Geographical Positioning Systems (GPS) technology has become prevalent in many areas of life and increasingly continues to become…
Expand
2000
2000
The k-Derivation of a Gamma-Ring
Hatice Kandamar
2000
Corpus ID: 55621069
In this paper, the k-derivation is defined on a G-ring M (that is, if M is a G-ring, d:M\to M and k:G\to G are to additive maps…
Expand
1998
1998
Versions of Normality and Some Weak Forms of the Axiom of Choice
P. Howard
,
K. Keremedis
,
H. Rubin
,
J. E. Rubin
Mathematical Logic Quarterly
1998
Corpus ID: 2035944
We investigate the set theoretical strength of some properties of normality, including Urysohn's Lemma, Tietze‐Urysohn Extension…
Expand
Highly Cited
1984
Highly Cited
1984
Identification in fuzzy systems
W. Pedrycz
IEEE Transactions on Systems, Man and Cybernetics
1984
Corpus ID: 11950587
The identification problem which plays a central role in further development of the theory of fuzzy systems and their…
Expand
Highly Cited
1982
Highly Cited
1982
Concepts of Trapping Topologically by Shell Molecules
Mieczysław Maciejewski
1982
Corpus ID: 53612470
Abstract Concepts of the synthesis of shell topological compounds, which consist of a guest molecule (or molecules) trapped by a…
Expand
1970
1970
Operations preserving all equivalence relations
F. Galvin
,
A. Horn
1970
Corpus ID: 92994054
In the recent book by R. S. Pierce [l, p. 38] the following theorem is given as an exercise. If / is a finitary operation on a…
Expand
1969
1969
Varietà a quozienti filtrali
Roberto Magari
Annali dell?Università di Ferrara
1969
Corpus ID: 115768942
RiassuntoDettafiltrale una classe K di algebre simili tale che ogni prodotto sottodiretto di elementi diK sia «a congruenze…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE