Sciweavers

561 search results - page 17 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
SAC
2008
ACM
14 years 11 months ago
Using simplified event calculus in digital investigation
In a hypothesis-based approach to digital investigation, the investigator formulates his hypothesis about which events took place, and tests them using the evidence available. A f...
Svein Yngvar Willassen
NSPW
2004
ACM
15 years 5 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
BMCBI
2004
136views more  BMCBI 2004»
14 years 11 months ago
A SNP-centric database for the investigation of the human genome
Background: Single Nucleotide Polymorphisms (SNPs) are an increasingly important tool for genetic and biomedical research. Although current genomic databases contain information o...
Alberto Riva, Isaac S. Kohane
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
15 years 6 months ago
Investigating data-flow coverage of classes using evolutionary algorithms
It is not unusual for a software development organization to expend 40 percent of total project effort on testing, which can be a very laborious and time-consuming process. Thus, ...
Konstantinos Liaskos, Marc Roper, Murray Wood
SAFECOMP
2001
Springer
15 years 4 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...