Sciweavers

173 search results - page 20 / 35
» Computer Forensics in Forensis
Sort
View
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
14 years 10 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
IFIP
2005
Springer
14 years 3 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
ECAI
2008
Springer
13 years 11 months ago
Author Identification Using a Tensor Space Representation
Author identification is a text categorization task with applications in intelligence, criminal law, computer forensics, etc. Usually, in such cases there is shortage of training t...
Spyridon Plakias, Efstathios Stamatatos
ECIR
2003
Springer
13 years 11 months ago
Corpus-Based Thesaurus Construction for Image Retrieval in Specialist Domains
This paper explores the use of texts that are related to an image collection, also known as collateral texts, for building thesauri in specialist domains to aid in image retrieval....
Khurshid Ahmad, Mariam Tariq, Bogdan Vrusias, Chri...
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 10 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...