Sciweavers

113 search results - page 8 / 23
» Statistical Tools for Digital Forensics
Sort
View
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 8 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
JCP
2007
132views more  JCP 2007»
13 years 8 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
14 years 2 months ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid
IH
2001
Springer
14 years 1 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 3 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.