Sciweavers

195 search results - page 29 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
ECIR
2003
Springer
14 years 11 months ago
Corpus-Based Thesaurus Construction for Image Retrieval in Specialist Domains
This paper explores the use of texts that are related to an image collection, also known as collateral texts, for building thesauri in specialist domains to aid in image retrieval....
Khurshid Ahmad, Mariam Tariq, Bogdan Vrusias, Chri...
COMPSEC
2006
90views more  COMPSEC 2006»
14 years 9 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
IJNSEC
2008
210views more  IJNSEC 2008»
14 years 9 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
IJDE
2006
77views more  IJDE 2006»
14 years 9 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
IJDE
2006
101views more  IJDE 2006»
14 years 9 months ago
Google Desktop as a Source of Digital Evidence
This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop computers, and how the information cached and stored with these systems can be retrieved...
Benjamin Turnbull, Barry Blundell, Jill Slay