Sciweavers

7596 search results - page 42 / 1520
» Challenges in forensic computing
Sort
View
CN
1999
128views more  CN 1999»
14 years 9 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
66
Voted
COMPUTER
2007
74views more  COMPUTER 2007»
14 years 9 months ago
Managing E-Mail Overload: Solutions and Future Challenges
David Schuff, Ozgur Turetken, John D'Arcy, David C...
COMPUTER
2008
60views more  COMPUTER 2008»
14 years 9 months ago
Enabling Next-Generation RFID Applications: Solutions and Challenges
Quan Z. Sheng, Xue Li, Sherali Zeadally
COMPUTER
2007
102views more  COMPUTER 2007»
14 years 9 months ago
Challenges in Securing Networked J2ME Applications
André N. Klingsheim, Vebjørn Moen, K...
75
Voted
IWCF
2009
Springer
15 years 4 months ago
Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings
The Electric Network Frequency (ENF) Criterion is a recently developed forensic technique for determining the time of recording of digital audio recordings, by matching the ENF pat...
Maarten Huijbregtse, Zeno Geradts