Sciweavers

1031 search results - page 71 / 207
» Indexing Information for Data Forensics
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
SISW
2003
IEEE
14 years 1 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 9 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
CSMR
2006
IEEE
14 years 2 months ago
Can LSI help Reconstructing Requirements Traceability in Design and Test?
Managing traceability data is an important aspect of the software development process. In this paper we investigate to what extent latent semantic indexing (LSI), an information r...
Marco Lormans, Arie van Deursen
ICDCSW
2002
IEEE
14 years 27 days ago
Persistent Cache in Cooperative Search Engine
Cooperative Search Engine (CSE) is a distributed search engine, which can update indexes in very short time for the purpose of fresh information retrieval. In CSE, the retrieval p...
Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai, Hi...