Sciweavers

24 search results - page 3 / 5
» Tamper Evident Microprocessors
Sort
View
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
14 years 1 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay
IJDE
2002
67views more  IJDE 2002»
13 years 7 months ago
Error, Uncertainty and Loss in Digital Evidence
Despite the potentially grave ramifications of relying on faulty information in the investigative or probabitive stages, the uncertainty in digital evidence is not being evaluated...
Eoghan Casey
ICIP
2010
IEEE
13 years 5 months ago
Detecting photo manipulation on signs and billboards
The manipulation of text on a sign or billboard is relatively easy to do in a way that is perceptually convincing. When text is on a planar surface and imaged under perspective pr...
Valentina Conotter, Giulia Boato, Hany Farid
CN
2007
179views more  CN 2007»
13 years 7 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
ICCAD
2002
IEEE
154views Hardware» more  ICCAD 2002»
14 years 4 months ago
Concurrent flip-flop and repeater insertion for high performance integrated circuits
For many years, CMOS process scaling has allowed a steady increase in the operating frequency and integration density of integrated circuits. Only recently, however, have we reach...
Pasquale Cocchini