Sciweavers

7544 search results - page 15 / 1509
» Network Forensics Analysis
Sort
View
JCP
2007
132views more  JCP 2007»
13 years 8 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
ICASSP
2010
IEEE
13 years 8 months ago
Geometric tampering estimation by means of a SIFT-based forensic analysis
In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opi...
Irene Amerini, Lamberto Ballan, Roberto Caldelli, ...
ICASSP
2011
IEEE
13 years 11 days ago
On the effect of amr and AMR-WB GSM compression on overlapped speech for forensic analysis
The recent ubiquity of mobile telephony has posed the challenge of forensic speech analysis on compressed speech content. Whilst existing research studies have investigated the ef...
Eva Cheng, Ian S. Burnett
ISSA
2008
13 years 10 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
IFIP
2005
Springer
14 years 2 months ago
Forensic Analysis of Mobile Phone Internal Memory
Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence ...
Svein Willassen