Sciweavers

7596 search results - page 9 / 1520
» Challenges in forensic computing
Sort
View
SAC
2006
ACM
15 years 3 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
IRI
2006
IEEE
15 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
IMF
2007
14 years 11 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
ICPR
2008
IEEE
15 years 4 months ago
Facial feature estimation from the local structural diversity of skulls
In forensics, the craniofacial reconstruction is employed as an initialization of the identification from skulls. It is a challenging work to develop such a system due to the ambi...
Yuru Pei, Hongbin Zha, Zhongbiao Yuan
ICIP
2006
IEEE
15 years 11 months ago
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
We describe a digital image forensics technique to distinguish images captured by a digital camera from computer generated images. Our approach is based on the fact that image acq...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon