Sciweavers

173 search results - page 22 / 35
» Computer Forensics in Forensis
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 4 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 4 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
14 years 4 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
SADFE
2005
IEEE
14 years 3 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
BMCBI
2008
102views more  BMCBI 2008»
13 years 10 months ago
mtDNAmanager: a Web-based tool for the management and quality analysis of mitochondrial DNA control-region sequences
Background: For the past few years, scientific controversy has surrounded the large number of errors in forensic and literature mitochondrial DNA (mtDNA) data. However, recent res...
Hwan Young Lee, Injee Song, Eunho Ha, Sung-Bae Cho...