Sciweavers

173 search results - page 27 / 35
» Computer Forensics in Forensis
Sort
View
125
Voted
CN
2007
133views more  CN 2007»
15 years 3 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
134
Voted
TOG
2010
117views more  TOG 2010»
14 years 10 months ago
Multi-feature matching of fresco fragments
We present a multiple-feature approach for determining matches between small fragments of archaeological artifacts such as Bronze-Age and Roman frescoes. In contrast with traditio...
Corey Toler-Franklin, Benedict J. Brown, Tim Weyri...
117
Voted
ICPR
2008
IEEE
15 years 10 months ago
Facial feature estimation from the local structural diversity of skulls
In forensics, the craniofacial reconstruction is employed as an initialization of the identification from skulls. It is a challenging work to develop such a system due to the ambi...
Yuru Pei, Hongbin Zha, Zhongbiao Yuan
SIBGRAPI
2007
IEEE
15 years 10 months ago
Dental Biometrics: Human Identification Based On Dental Work Information
Dental biometrics is used in forensic dentistry to identify or verify persons based on their dental radiographs. This paper presents a method for human identification based on den...
Michael Hofer, Aparecido Nilceu Marana
130
Voted
CCS
2006
ACM
15 years 7 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...