Sciweavers

42 search results - page 3 / 9
» Forensic Engineering
Sort
View
SADFE
2009
IEEE
14 years 5 months ago
File Fragment Classification-The Case for Specialized Approaches
Increasingly advances in file carving, memory analysis and network forensics requires the ability to identify the underlying type of a file given only a file fragment. Work to dat...
Vassil Roussev, Simson L. Garfinkel
SADFE
2005
IEEE
14 years 4 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
OTM
2004
Springer
14 years 4 months ago
Engineering an Ontology of Financial Securities Fraud
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
SADFE
2005
IEEE
14 years 4 months ago
Challenges of Automating the Detection of Paedophile Activity on the Internet
This review paper outlines the need for research into the process of automating the detection of paedophile activities on the Internet and identifies the associated challenges of ...
Lyta Penna, Andrew Clark, George M. Mohay
COMPSAC
2009
IEEE
14 years 5 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...