Sciweavers

195 search results - page 17 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
CONEXT
2010
ACM
14 years 7 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
ISSA
2008
14 years 11 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
ICDAR
2009
IEEE
14 years 7 months ago
Semi-automatic Forensic Reconstruction of Ripped-up Documents
Manual reconstruction of ripped-up documents can be a very difficult and time-consuming task. This paper discusses a semi-automatic toolset that can be used for reconstructing rip...
Patrick de Smet
84
Voted
MINENET
2006
ACM
15 years 3 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
70
Voted
CVPR
2006
IEEE
15 years 11 months ago
Homography from Coplanar Ellipses with Application to Forensic Blood Splatter Reconstruction
Reconstruction of the point source of blood splatter in a crime scene is an important and difficult problem in forensic science. We study the problem of automatically reconstructi...
John Wright, Andrew Wagner, Shankar Rao, Yi Ma