Sciweavers

1744 search results - page 216 / 349
» The Steganographic File System
Sort
View
EUROSEC
2008
ACM
15 years 5 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
LREC
2010
150views Education» more  LREC 2010»
15 years 5 months ago
Eslo: From Transcription to Speakers' Personal Information Annotation
This paper presents the preliminary works to put online a French oral corpus and its transcription. This corpus is the Socio-Linguistic Survey in Orleans, realized in 1968. First,...
Iris Eshkol, Denis Maurel, Nathalie Friburger
IICAI
2003
15 years 5 months ago
Web Usage Mining: Extraction, Maintenance and Behaviour Trends
With the growing popularity of the web, large volumes of data are gathered automatically by Web Servers and collected into access log files. Analysis of such files is generally cal...
Pierre-Alain Laur, Maguelonne Teisseire, Pascal Po...
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
15 years 5 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
CMS
2010
207views Communications» more  CMS 2010»
15 years 4 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...