Sciweavers

291 search results - page 27 / 59
» Enforceable social laws
Sort
View
ISPEC
2007
Springer
15 years 3 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
15 years 3 months ago
Evaluation of Voice Stress Analysis Technology
The Air Force Research Laboratory (AFRL) has been tasked by the National Institute of Justice to investigate voice stress analysis (VSA) technology and evaluate its effectiveness ...
Clifford S. Hopkins, Roy J. Ratley, Daniel S. Beni...
IMF
2007
14 years 11 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
WWW
2007
ACM
15 years 10 months ago
The complex dynamics of collaborative tagging
The debate within the Web community over the optimal means by which to organize information often pits formalized classifications against distributed collaborative tagging systems...
Harry Halpin, Valentin Robu, Hana Shepherd
HICSS
2008
IEEE
138views Biometrics» more  HICSS 2008»
15 years 4 months ago
Cyber Security and Government Fusion Centers
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed ...
Natalie Granado, Gregory White