Sciweavers

195 search results - page 13 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
70
Voted
ARESEC
2011
76views more  ARESEC 2011»
13 years 9 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
SAC
2011
ACM
14 years 14 days ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
JCP
2007
132views more  JCP 2007»
14 years 9 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
IEEECIT
2006
IEEE
15 years 3 months ago
Statistical 3D Cranio-Facial Models
In forensic science, 3D cranio facail reconstruction is used to reconstruct the face from a skull. This can be done by manual approaches or computer assisted methods. The proposed...
Maxime Berar, Michel Desvignes, Gérard Bail...