Sciweavers

173 search results - page 29 / 35
» Computer Forensics in Forensis
Sort
View
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
15 years 5 months ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid
USS
2004
15 years 1 months ago
Avfs: An On-Access Anti-Virus File System
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators&#...
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wrigh...
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
14 years 12 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
BMCBI
2007
153views more  BMCBI 2007»
14 years 11 months ago
Estimating genealogies from linked marker data: a Bayesian approach
Background: Answers to several fundamental questions in statistical genetics would ideally require knowledge of the ancestral pedigree and of the gene flow therein. A few examples...
Dario Gasbarra, Matti Pirinen, Mikko J. Sillanp&au...
IJDE
2006
95views more  IJDE 2006»
14 years 11 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum