Sciweavers

7596 search results - page 76 / 1520
» Challenges in forensic computing
Sort
View
IJDE
2006
77views more  IJDE 2006»
14 years 9 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
IJDE
2006
101views more  IJDE 2006»
14 years 9 months ago
Google Desktop as a Source of Digital Evidence
This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop computers, and how the information cached and stored with these systems can be retrieved...
Benjamin Turnbull, Barry Blundell, Jill Slay
ICDAR
2011
IEEE
13 years 9 months ago
Evaluating the Rarity of Handwriting Formations
—Identifying unusual or unique characteristics of an observed sample in useful in forensics in general and handwriting analysis in particular. Rarity is formulated as the probabi...
Sargur N. Srihari
INTERACT
2007
14 years 11 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
DATESO
2010
369views Database» more  DATESO 2010»
14 years 7 months ago
Database Trends and Directions: Current Challenges and Opportunities
Database management has undergone more than four decades of evolution producing vast range of research and extensive array of technology solutions. The database research community ...
George Feuerlicht