Sciweavers

113 search results - page 8 / 23
» Statistical Tools for Digital Forensics
Sort
View
133
Voted
IJNSEC
2007
194views more  IJNSEC 2007»
15 years 3 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
109
Voted
JCP
2007
132views more  JCP 2007»
15 years 3 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
126
Voted
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
15 years 9 months ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid
126
Voted
IH
2001
Springer
15 years 8 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
197
Voted
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 10 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.