The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
This paper presents FOXP (computer FOrensic eXPerience), an open source project to support network Live Digital Forensics (LDF), where the network nodes run a Windows NT family Ope...
Roberto Battistoni, Alessandro Di Biagio, Roberto ...
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...