Sciweavers

7596 search results - page 17 / 1520
» Challenges in forensic computing
Sort
View
ACSAC
2003
IEEE
15 years 2 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
SAC
2005
ACM
15 years 3 months ago
Handwritten character skeletonisation for forensic document analysis
A new method of skeletonisation (stroke extraction) of handwritten character images is presented. The method has been designed to extract the skeleton which is very close to human...
Vladimir Pervouchine, Graham Leedham, Konstantin M...
ICDAR
2009
IEEE
14 years 7 months ago
Semi-automatic Forensic Reconstruction of Ripped-up Documents
Manual reconstruction of ripped-up documents can be a very difficult and time-consuming task. This paper discusses a semi-automatic toolset that can be used for reconstructing rip...
Patrick de Smet
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
15 years 4 months ago
Consistency Issue on Live Systems Forensics
Volatile data, being vital to digital investigation, have become part of the standard items targeted in the course of live response to a computer system. In traditional computer f...
Frank Y. W. Law, K. P. Chow, Michael Y. K. Kwan, P...
CONEXT
2010
ACM
14 years 7 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields