Sciweavers

19 search results - page 3 / 4
» Computational Forensics: Towards Hybrid-Intelligent Crime In...
Sort
View
WACV
2007
IEEE
14 years 1 months ago
Facial Strain Pattern as a Soft Forensic Evidence
The success of forensic identification largely depends on the availability of strong evidence or traces that substantiate the prosecution hypothesis that a certain person is guil...
Vasant Manohar, Dmitry B. Goldgof, Sudeep Sarkar, ...
AUSFORENSICS
2004
13 years 9 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
JCP
2007
132views more  JCP 2007»
13 years 7 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
ACSAC
2003
IEEE
14 years 23 days ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
IJNSEC
2008
210views more  IJNSEC 2008»
13 years 7 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo