Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
195
search results - page 14 / 39
»
Multimedia Forensics Is Not Computer Forensics
Sort
relevance
views
votes
recent
update
View
thumb
title
44
click to vote
SAC
2010
ACM
172
views
Applied Computing
»
more
SAC 2010
»
e-mail authorship verification for forensic investigation
15 years 4 months ago
Download
users.encs.concordia.ca
Farkhund Iqbal, Liaquat A. Khan, Benjamin C. M. Fu...
claim paper
Read More »
49
click to vote
RAID
2010
Springer
147
views
Computer Networks
»
more
RAID 2010
»
Live and Trustworthy Forensic Analysis of Commodity Production Systems
14 years 8 months ago
Download
www.raid2010.org
Lorenzo Martignoni, Aristide Fattori, Roberto Pale...
claim paper
Read More »
122
click to vote
COMPSEC
2011
279
views
Applied Computing
»
more
COMPSEC 2011
»
Designing a cluster-based covert channel to evade disk investigation and forensics
14 years 4 months ago
Download
caballe.cat
Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan ...
claim paper
Read More »
75
click to vote
ICMCS
2009
IEEE
138
views
Multimedia
»
more
ICMCS 2009
»
Compressed video stream watermarking for peer-to-peer based content distribution network
14 years 7 months ago
Download
www.videotechresearch.com
Peer-to-peer content distribution provides high network throughput with relatively low server cost and scales better than traditional content distribution networks with respect to...
Dekun Zou, Nicolas Prigent, Jeffrey A. Bloom
claim paper
Read More »
68
Voted
MMMACNS
2005
Springer
119
views
Information Technology
»
more
MMMACNS 2005
»
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security
15 years 3 months ago
Download
www.cnas.org.tn
Slim Rekhis, Noureddine Boudriga
claim paper
Read More »
« Prev
« First
page 14 / 39
Last »
Next »