Sciweavers

291 search results - page 20 / 59
» Enforceable social laws
Sort
View
IJDE
2002
145views more  IJDE 2002»
14 years 9 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
ICCS
2007
Springer
15 years 3 months ago
Detecting Invisible Relevant Persons in a Homogeneous Social Network
Abstract. An algorithm to detect invisible relevant persons in a homogeneous social network is studied with computer simulation. The network is effective as a model for contempora...
Yoshiharu Maeno, Kiichi Ito, Yukio Ohsawa
CMOT
2006
124views more  CMOT 2006»
14 years 9 months ago
My agents love to conform: Norms and emotion in the micro-macro link
This contribution investigates the function of emotion in relation to norms, both in natural and artificial societies. We illustrate that unintentional behavior can be normative an...
Christian von Scheve, Daniel Moldt, Julia Fix, Rol...
AUSFORENSICS
2004
14 years 11 months ago
Electronic Crime - its not only the big end of town that should be worried
The permeation of technology into our daily lives has resulted in new types of criminal activity and new ways of committing old crimes. As with traditional crime, fundamental to t...
Mathew Hannan, Barry Blundell
CN
1999
128views more  CN 1999»
14 years 9 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer