Sciweavers

173 search results - page 2 / 35
» Computer Forensics in Forensis
Sort
View
TKDE
2010
159views more  TKDE 2010»
13 years 3 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
BWCCA
2010
12 years 12 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
ACSW
2006
13 years 6 months ago
Event sequence mining to develop profiles for computer forensic investigation purposes
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators ca...
Tamas Abraham
IWCF
2009
Springer
13 years 12 months ago
Multimedia Forensics Is Not Computer Forensics
The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensi...
Rainer Böhme, Felix C. Freiling, Thomas Gloe,...
CSL
2006
Springer
13 years 5 months ago
Robust estimation, interpretation and assessment of likelihood ratios in forensic speaker recognition
In this contribution, the Bayesian framework for interpretation of evidence when applied to forensic speaker recognition is introduced. Different aspects of the use of voice as ev...
Joaquin Gonzalez-Rodriguez, Andrzej Drygajlo, Dani...