Sciweavers

7596 search results - page 12 / 1520
» Challenges in forensic computing
Sort
View
COMPSAC
2009
IEEE
15 years 4 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
IFIP
2007
Springer
15 years 3 months ago
Super-Resolution Video Analysis for Forensic Investigations
Super-resolution algorithms typically improve the resolution of a video frame by mapping and performing signal processing operations on data from frames immediately preceding and i...
Ashish Gehani, John H. Reif
HICSS
2007
IEEE
80views Biometrics» more  HICSS 2007»
15 years 3 months ago
The Development of a University-Based Forensics Training Center as a Regional Outreach and Service Activity
This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local la...
Rayford B. Vaughn, David A. Dampier
IJNSEC
2008
210views more  IJNSEC 2008»
14 years 9 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
HICSS
2010
IEEE
153views Biometrics» more  HICSS 2010»
15 years 4 months ago
Securing E-Government Assets through Automating Deployment of Honeynets for IDS Support
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Christopher Hecker, Brian Hay