Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.

0
posts
with
0
views
256profile views
KoolkatzProfessor
Law Enforcement
Koolkatz
CONEXT
2010
ACM
11 years 7 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
CN
1999
128views more  CN 1999»
11 years 9 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
CACM
2004
87views more  CACM 2004»
11 years 9 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
IJDE
2007
110views more  IJDE 2007»
11 years 9 months ago
iPOD Forensics Update
From student to business worker, the popularity and ubiquity of mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Such...
Matthew Kiley, Tim Shinbara, Marcus Rogers
JASIS
2008
76views more  JASIS 2008»
11 years 9 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza
DSS
2006
95views more  DSS 2006»
11 years 9 months ago
Process-driven collaboration support for intra-agency crime analysis
In law enforcement applications, there is a critical need for new tools that can facilitate efficient and effective collaboration. Through a field study, we observe that crime ana...
J. Leon Zhao, Henry H. Bi, Hsinchun Chen, Daniel D...
ISI
2003
Springer
12 years 3 months ago
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, F...
ISI
2005
Springer
12 years 3 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
HICSS
2006
IEEE
102views Biometrics» more  HICSS 2006»
12 years 3 months ago
Organization Antecedents of Successful IT Management
As local law enforcement organizations continue to embrace IT, the successful management of these technologies will continue to have expanding implications for the municipal organ...
Keith Schildt, Suzanne Beaumaster, Susan Bailey
books