Sciweavers

211 search results - page 20 / 43
» Digital Evidence
Sort
View
ARESEC
2011
76views more  ARESEC 2011»
12 years 8 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
IEPOL
2002
85views more  IEPOL 2002»
13 years 8 months ago
New Economy and ICT development in China
The rapid development and diffusion of the information and communications technology (ICT) is the major driving force of the New Economy. While there is ample evidence to suggest ...
Qingxuan Meng, Mingzhi Li
ICIP
2010
IEEE
13 years 6 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
EXTREME
2004
ACM
14 years 10 days ago
Interpretation Beyond Markup
The meaning conveyed by documents and their markup often goes well beyond what can be inferred from the markup alone. It often depends on context, so that to interpret document ma...
David Dubin, David J. Birnbaum
ERCIMDL
2006
Springer
183views Education» more  ERCIMDL 2006»
14 years 8 days ago
Design of a Cross-Media Indexing System
There is a lack of an integrated technology that will increase effective usage of the vast and heterogeneous multi-lingual and multimedia digital content. The need is being express...
Murat Yakici, Fabio Crestani