Sciweavers

173 search results - page 27 / 35
» Computer Forensics in Forensis
Sort
View
CN
2007
133views more  CN 2007»
13 years 9 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
TOG
2010
117views more  TOG 2010»
13 years 4 months ago
Multi-feature matching of fresco fragments
We present a multiple-feature approach for determining matches between small fragments of archaeological artifacts such as Bronze-Age and Roman frescoes. In contrast with traditio...
Corey Toler-Franklin, Benedict J. Brown, Tim Weyri...
ICPR
2008
IEEE
14 years 4 months ago
Facial feature estimation from the local structural diversity of skulls
In forensics, the craniofacial reconstruction is employed as an initialization of the identification from skulls. It is a challenging work to develop such a system due to the ambi...
Yuru Pei, Hongbin Zha, Zhongbiao Yuan
SIBGRAPI
2007
IEEE
14 years 4 months ago
Dental Biometrics: Human Identification Based On Dental Work Information
Dental biometrics is used in forensic dentistry to identify or verify persons based on their dental radiographs. This paper presents a method for human identification based on den...
Michael Hofer, Aparecido Nilceu Marana
CCS
2006
ACM
14 years 1 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...