Sciweavers

7596 search results - page 14 / 1520
» Challenges in forensic computing
Sort
View
COMPSEC
2011
14 years 4 months ago
Designing a cluster-based covert channel to evade disk investigation and forensics
Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan ...
ICASSP
2011
IEEE
14 years 1 months ago
A knowledge-based algorithm to remove blocking artifacts in skin images for forensic analysis
Identifying criminals and victims in evidence images, where their faces are covered or obstructed, is a challenging task. In the legal case, United States v. Michael Joseph Pepe (...
Chaoying Tang, Adams Wai-Kin Kong, Noah Craft
63
Voted
IFIP
2005
Springer
15 years 3 months ago
Forensic Analysis of Mobile Phone Internal Memory
Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence ...
Svein Willassen
ICASSP
2011
IEEE
14 years 1 months ago
On the effect of amr and AMR-WB GSM compression on overlapped speech for forensic analysis
The recent ubiquity of mobile telephony has posed the challenge of forensic speech analysis on compressed speech content. Whilst existing research studies have investigated the ef...
Eva Cheng, Ian S. Burnett
SAC
2011
ACM
14 years 13 days ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...