Sciweavers

561 search results - page 12 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
WACV
2007
IEEE
15 years 3 months ago
Facial Strain Pattern as a Soft Forensic Evidence
The success of forensic identification largely depends on the availability of strong evidence or traces that substantiate the prosecution hypothesis that a certain person is guil...
Vasant Manohar, Dmitry B. Goldgof, Sudeep Sarkar, ...
66
Voted
ISSA
2008
14 years 11 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
CHI
2010
ACM
15 years 4 months ago
ToolClips: an investigation of contextual video assistance for functionality understanding
We investigate the use of on-line contextual video assistance to improve the learnability of software functionality. After discussing motivations and design goals for such forms o...
Tovi Grossman, George W. Fitzmaurice
ACSAC
2003
IEEE
15 years 2 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
72
Voted
CCS
2007
ACM
15 years 3 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...