Sciweavers

173 search results - page 13 / 35
» Computer Forensics in Forensis
Sort
View
DI
2006
52views more  DI 2006»
13 years 9 months ago
Unique file identification in the National Software Reference Library
: The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for use by law enforcement and other organizations invo...
Steve Mead
SAC
2006
ACM
14 years 3 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
CCS
2010
ACM
14 years 4 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
IRI
2006
IEEE
14 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
ICIP
2006
IEEE
14 years 11 months ago
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
We describe a digital image forensics technique to distinguish images captured by a digital camera from computer generated images. Our approach is based on the fact that image acq...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon