Sciweavers

7544 search results - page 35 / 1509
» Network Forensics Analysis
Sort
View
JDFP
2006
139views more  JDFP 2006»
13 years 8 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 8 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
ICDAR
2009
IEEE
14 years 3 months ago
A Survey of Techniques for Document and Archaeology Artefact Reconstruction
An automated assembling of shredded/torn documents (2D) or broken pottery (3D) will support philologists, archaeologists and forensic experts. An automated solution for this task ...
Florian Kleber, Robert Sablatnig
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
14 years 2 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 1 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...