Sciweavers

561 search results - page 14 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
IMF
2007
15 years 1 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
15 years 12 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
84
Voted
FGCS
2000
100views more  FGCS 2000»
14 years 11 months ago
Investigating the application of web-based simulation principles within the architecture for a next-generation computer generate
With a heavy emphasis on distribution and reuse, web-based simulation portends a dramatic shift in the application of simulation as a problem-solving technique and decision-suppor...
Ernest H. Page, Jeffrey M. Opper
SADFE
2010
IEEE
14 years 9 months ago
Fonts for Forensics
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
Fred Cohen
71
Voted
DI
2006
52views more  DI 2006»
14 years 11 months ago
Unique file identification in the National Software Reference Library
: The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for use by law enforcement and other organizations invo...
Steve Mead