Sciweavers

42 search results - page 4 / 9
» Forensic Engineering
Sort
View
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 7 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 6 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
SADFE
2010
IEEE
13 years 4 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
SADFE
2005
IEEE
13 years 11 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
IH
2001
Springer
13 years 10 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...