Sciweavers

195 search results - page 34 / 39
» Multimedia Forensics Is Not Computer Forensics
Sort
View
82
Voted
USS
2008
15 years 3 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
101
Voted
MEDIAFORENSICS
2010
15 years 2 months ago
Managing a large database of camera fingerprints
Sensor fingerprint is a unique noise-like pattern caused by slightly varying pixel dimensions and inhomogeneity of the silicon wafer from which the sensor is made. The fingerprint...
Miroslav Goljan, Jessica J. Fridrich, Tomás...
102
Voted
IMF
2007
15 years 2 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
111
Voted
ISSA
2004
15 years 2 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
116
Voted
HM
2010
Springer
161views Optimization» more  HM 2010»
15 years 2 months ago
A Memetic Algorithm for Reconstructing Cross-Cut Shredded Text Documents
The reconstruction of destroyed paper documents became of more interest during the last years. On the one hand it (often) occurs that documents are destroyed by mistake while on th...
Christian Schauer, Matthias Prandtstetter, Gü...