Sciweavers

7596 search results - page 6 / 1520
» Challenges in forensic computing
Sort
View
ACSW
2006
14 years 11 months ago
Event sequence mining to develop profiles for computer forensic investigation purposes
Developing profiles to describe user or system behaviour is a useful technique employed in Computer Forensic investigations. Information found in data obtained by investigators ca...
Tamas Abraham
NSDI
2010
14 years 11 months ago
Carousel: Scalable Logging for Intrusion Prevention Systems
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and...
Vinh The Lam, Michael Mitzenmacher, George Varghes...
CSL
2006
Springer
14 years 9 months ago
Robust estimation, interpretation and assessment of likelihood ratios in forensic speaker recognition
In this contribution, the Bayesian framework for interpretation of evidence when applied to forensic speaker recognition is introduced. Different aspects of the use of voice as ev...
Joaquin Gonzalez-Rodriguez, Andrzej Drygajlo, Dani...
AUSFORENSICS
2004
14 years 11 months ago
To Revisit: What is Forensic Computing?
The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academi...
Mathew Hannan
AVBPA
2005
Springer
228views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Between-Source Modelling for Likelihood Ratio Computation in Forensic Biometric Recognition
Abstract. In this paper, the use of biometric systems in forensic applications is reviewed. Main differences between the aim of commercial biometric systems and forensic reporting...
Daniel Ramos-Castro, Joaquin Gonzalez-Rodriguez, C...