Sciweavers

666 search results - page 5 / 134
» Design and implementation of a live-analysis digital forensi...
Sort
View
HICSS
2008
IEEE
122views Biometrics» more  HICSS 2008»
15 years 4 months ago
Pedagogy and Overview of a Graduate Program in Digital Investigation Management
Although still a relatively new undergraduate course of study at most colleges and universities, specialized degree programs in computer forensics and digital investigations are n...
Gary C. Kessler, Don Haggerty
ICDCSW
2005
IEEE
15 years 3 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
MM
2004
ACM
136views Multimedia» more  MM 2004»
15 years 3 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
WWW
2004
ACM
15 years 10 months ago
Digital repository interoperability: design, implementation and deployment of the ecl protocol and connecting middleware
This paper describes the design and implementation of the eduSource Communication Layer (ECL) protocol. ECL is one outcome of a pan-Canadian project called eduSource Canada to bui...
Ty Mey Eap, Marek Hatala, Griff Richards
SADFE
2008
IEEE
15 years 4 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....