Sciweavers

173 search results - page 21 / 35
» Computer Forensics in Forensis
Sort
View
IJNSEC
2008
210views more  IJNSEC 2008»
13 years 9 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
IJDE
2006
77views more  IJDE 2006»
13 years 9 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
IJDE
2006
101views more  IJDE 2006»
13 years 9 months ago
Google Desktop as a Source of Digital Evidence
This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop computers, and how the information cached and stored with these systems can be retrieved...
Benjamin Turnbull, Barry Blundell, Jill Slay
ICDAR
2011
IEEE
12 years 9 months ago
Evaluating the Rarity of Handwriting Formations
—Identifying unusual or unique characteristics of an observed sample in useful in forensics in general and handwriting analysis in particular. Rarity is formulated as the probabi...
Sargur N. Srihari
ICDCSW
2005
IEEE
14 years 3 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...