Sciweavers

80 search results - page 8 / 16
» A Live Digital Forensic system for Windows networks
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 8 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CIIA
2009
13 years 9 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
AP2PC
2004
Springer
14 years 2 months ago
Photo Agent: An Agent-Based P2P Sharing System
With the proliferation of content creation devices, sharing digital contents has become an increasingly common task in our daily lives. This research proposes the “Photo Agent”...
Jane Yung-jen Hsu, Jih-Yin Chen, Ting-Shuang Huang...
FGR
2011
IEEE
205views Biometrics» more  FGR 2011»
13 years 1 days ago
High resolution face sequences from a PTZ network camera
Abstract— We propose here to acquire high resolution sequences of a person’s face using a pan-tilt-zoom (PTZ) network camera. This capability should prove helpful in forensic a...
Thang Ba Dinh, Nam Vo, Gérard G. Medioni
HPDC
2007
IEEE
14 years 2 months ago
A statistical approach to risk mitigation in computational markets
We study stochastic models to mitigate the risk of poor Quality-of-Service (QoS) in computational markets. Consumers who purchase services expect both price and performance guaran...
Thomas Sandholm, Kevin Lai