Sciweavers

94 search results - page 1 / 19
» Performance Forensics
Sort
View
IJDE
2002
145views more  IJDE 2002»
13 years 4 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
ICASSP
2008
IEEE
13 years 11 months ago
A pattern classification framework for theoretical analysis of component forensics
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
ICMCS
2005
IEEE
131views Multimedia» more  ICMCS 2005»
13 years 10 months ago
Attacks and Forensic Analysis for Multimedia Content Protection
Piracy is one of the biggest concerns in entertainment industry. Digital copies are perfect copies. An anti-piracy defense is to perform forensic analysis and identify who partici...
Hongxia Jin, Jeffery Lotspiech
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
13 years 11 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
CSL
2006
Springer
13 years 4 months ago
Robust estimation, interpretation and assessment of likelihood ratios in forensic speaker recognition
In this contribution, the Bayesian framework for interpretation of evidence when applied to forensic speaker recognition is introduced. Different aspects of the use of voice as ev...
Joaquin Gonzalez-Rodriguez, Andrzej Drygajlo, Dani...