Sciweavers

113 search results - page 5 / 23
» Statistical Tools for Digital Forensics
Sort
View
JDFP
2006
139views more  JDFP 2006»
13 years 8 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
IJDE
2006
116views more  IJDE 2006»
13 years 8 months ago
Forensics and SIM Cards: An Overview
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement...
Fabio Casadei, Antonio Savoldi, Paolo Gubian
SADFE
2005
IEEE
14 years 2 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
SADFE
2009
IEEE
14 years 3 months ago
File Fragment Classification-The Case for Specialized Approaches
Increasingly advances in file carving, memory analysis and network forensics requires the ability to identify the underlying type of a file given only a file fragment. Work to dat...
Vassil Roussev, Simson L. Garfinkel
ICIP
2006
IEEE
14 years 10 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu