Sciweavers

1949 search results - page 280 / 390
» Protective Interface Specifications
Sort
View
JDFP
2006
139views more  JDFP 2006»
15 years 2 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
142
Voted
BMCBI
2004
165views more  BMCBI 2004»
15 years 2 months ago
Analysis of oligonucleotide array experiments with repeated measures using mixed models
Background: Two or more factor mixed factorial experiments are becoming increasingly common in microarray data analysis. In this case study, the two factors are presence (Patients...
Hao Li, Constance L. Wood, Thomas V. Getchell, Mar...
CN
1999
128views more  CN 1999»
15 years 2 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
129
Voted
SAC
2008
ACM
15 years 2 months ago
Secure deletion for NAND flash file system
In most file systems, if a file is deleted, only the metadata of the file is deleted or modified and the file's data is still stored on the physical media. Some users require...
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong...
123
Voted
SAC
2008
ACM
15 years 2 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...