Sciweavers

7596 search results - page 9 / 1520
» Challenges in forensic computing
Sort
View
SAC
2006
ACM
15 years 5 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
IRI
2006
IEEE
15 years 5 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
IMF
2007
15 years 1 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
ICPR
2008
IEEE
15 years 6 months ago
Facial feature estimation from the local structural diversity of skulls
In forensics, the craniofacial reconstruction is employed as an initialization of the identification from skulls. It is a challenging work to develop such a system due to the ambi...
Yuru Pei, Hongbin Zha, Zhongbiao Yuan
ICIP
2006
IEEE
16 years 1 months ago
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
We describe a digital image forensics technique to distinguish images captured by a digital camera from computer generated images. Our approach is based on the fact that image acq...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon