Sciweavers

7544 search results - page 32 / 1509
» Network Forensics Analysis
Sort
View
SASO
2009
IEEE
14 years 3 months ago
Swarming Geographic Event Profiling, Link Analysis, and Prediction
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Sven A. Brueckner
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 3 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
CRV
2008
IEEE
118views Robotics» more  CRV 2008»
14 years 3 months ago
Generating Semantic Information from 3D Scans of Crime Scenes
Recent advancements in laser and visible light sensor technology allows for the collection of photorealistic 3D scans of large scale spaces. This enables the technology to be used...
Anna Topol, Michael Jenkin, Jarek Gryz, Stephanie ...
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 2 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz