Sciweavers

7596 search results - page 47 / 1520
» Challenges in forensic computing
Sort
View
AUSFORENSICS
2003
14 years 11 months ago
Testing the Date Maintenance of the File Allocation Table File System
The directory entries used in the File Allocation Table filesystems maintain a significant amount of file metadata that is of interest to a forensic examiner. This information is ...
Tom Waghorn
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ACSAC
1999
IEEE
15 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
CHI
2007
ACM
15 years 10 months ago
HCI4D: hci challenges in the global south
Marshini Chetty, Rebecca E. Grinter
64
Voted
ICPR
2006
IEEE
15 years 10 months ago
Challenges for Data Mining in Distributed Sensor Networks
Luca Lombardi, Paolo Lombardi, Virginio Cantoni