Sciweavers

195 search results - page 13 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
ARESEC
2011
76views more  ARESEC 2011»
13 years 11 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
SAC
2011
ACM
14 years 2 months ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
JCP
2007
132views more  JCP 2007»
14 years 11 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
IEEECIT
2006
IEEE
15 years 5 months ago
Statistical 3D Cranio-Facial Models
In forensic science, 3D cranio facail reconstruction is used to reconstruct the face from a skull. This can be done by manual approaches or computer assisted methods. The proposed...
Maxime Berar, Michel Desvignes, Gérard Bail...