Sciweavers

173 search results - page 8 / 35
» Computer Forensics in Forensis
Sort
View
JCP
2007
132views more  JCP 2007»
13 years 9 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
SAC
2010
ACM
13 years 8 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
ISSA
2008
13 years 11 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
AUSFORENSICS
2003
13 years 11 months ago
ECF - Event Correlation for Forensics
The focus of the research described in this paper is on the nature of the event information provided in commonly available computer and other logs and the extent to which it is po...
George M. Mohay, Kevin Chen, Andrew Clark
ICDAR
2009
IEEE
13 years 7 months ago
Semi-automatic Forensic Reconstruction of Ripped-up Documents
Manual reconstruction of ripped-up documents can be a very difficult and time-consuming task. This paper discusses a semi-automatic toolset that can be used for reconstructing rip...
Patrick de Smet