Sciweavers

7544 search results - page 12 / 1509
» Network Forensics Analysis
Sort
View
IJDE
2007
384views more  IJDE 2007»
13 years 7 months ago
Computer Forensic Analysis in a Virtual Environment
In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and softwa...
Derek Bem, Ewa Huebner
IFIP
2007
Springer
14 years 1 months ago
Super-Resolution Video Analysis for Forensic Investigations
Super-resolution algorithms typically improve the resolution of a video frame by mapping and performing signal processing operations on data from frames immediately preceding and i...
Ashish Gehani, John H. Reif
JCDL
2011
ACM
260views Education» more  JCDL 2011»
12 years 10 months ago
Extending digital repository architectures to support disk image preservation and access
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support da...
Kam Woods, Christopher A. Lee, Simson Garfinkel
AUSFORENSICS
2003
13 years 9 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver