Sciweavers

195 search results - page 25 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
CCS
2003
ACM
15 years 2 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
RAID
2010
Springer
14 years 8 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
15 years 4 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
MEDIAFORENSICS
2010
14 years 11 months ago
Multimodal object authentication with random projections: a worst-case approach
In this paper, we consider a forensic multimodal authentication framework based on binary hypothesis testing in random projections domain. We formulate a generic authentication pr...
Oleksiy J. Koval, Sviatoslav Voloshynovskiy
AUSFORENSICS
2003
14 years 11 months ago
Testing the Date Maintenance of the File Allocation Table File System
The directory entries used in the File Allocation Table filesystems maintain a significant amount of file metadata that is of interest to a forensic examiner. This information is ...
Tom Waghorn