Sciweavers

7596 search results - page 43 / 1520
» Challenges in forensic computing
Sort
View
VLSID
2000
IEEE
164views VLSI» more  VLSID 2000»
15 years 2 months ago
A Fast Algorithm for Computing the Euler Number of an Image and its VLSI Implementation
Digital images are convenient media for describing and storing spatial, temporal, spectral, and physical components of information contained in a variety of domains(e.g. aerial/sa...
Sabyasachi Dey, Bhargab B. Bhattacharya, Malay Kum...
IH
2005
Springer
15 years 3 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
77
Voted
DIGRA
2005
Springer
15 years 3 months ago
Learning Games as a Platform for Simulated Science Practice
In recent years, science education has been the focus of study and development of new gamebased learning environments. It has been argued that active and critical learning about r...
Rikke Magnussen
CCS
2003
ACM
15 years 2 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
RAID
2010
Springer
14 years 8 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller