Sciweavers

7544 search results - page 14 / 1509
» Network Forensics Analysis
Sort
View
TIFS
2010
127views more  TIFS 2010»
13 years 7 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
ISPEC
2007
Springer
14 years 2 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 10 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
ICDAR
2003
IEEE
14 years 1 months ago
Individuality of Handwritten Characters
Analysis of handwritten characters (allographs) plays an important role in forensic document examination. However, so far there lacks a comprehensive and quantitative study on ind...
Bin Zhang, Sargur N. Srihari, Sangjik Lee
ICASSP
2011
IEEE
13 years 11 days ago
Forensically inspired approaches to automatic speaker recognition
This paper presents ongoing research leveraging forensic methods for automatic speaker recognition. Some of the methods forensic scientists employ include identifying speaker dist...
Kyu J. Han, Mohamed Kamal Omar, Jason W. Pelecanos...