Sciweavers

195 search results - page 39 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
CN
1999
128views more  CN 1999»
13 years 4 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
RITA
2002
110views more  RITA 2002»
13 years 4 months ago
Modeling and Rendering of Real Environments
The use of detailed geometric models is a critical factor for achieving realism in most computer graphics applications. In the past few years, we have observed an increasing deman...
Wagner Toledo Corrêa, Manuel M. Oliveira, Cl...
PAMI
2007
127views more  PAMI 2007»
13 years 4 months ago
Text-Independent Writer Identification and Verification Using Textural and Allographic Features
—The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and const...
Marius Bulacu, Lambert Schomaker
NETWORK
2011
12 years 7 months ago
Dynamic measurement-aware routing in practice
Traffic monitoring is a critical network operation for the purpose of traffic accounting, debugging or troubleshooting, forensics, and traffic engineering. Existing techniques for...
Guanyao Huang, Chen-Nee Chuah, Saqib Raza, Srini S...