Sciweavers

741 search results - page 10 / 149
» Tools and techniques for Network Forensics
Sort
View
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 2 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
OSDI
2004
ACM
14 years 7 months ago
Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control
This paper studies the use of statistical induction techniques as a basis for automated performance diagnosis and performance management. The goal of the work is to develop and ev...
Ira Cohen, Jeffrey S. Chase, Julie Symons, Mois&ea...
TIFS
2010
127views more  TIFS 2010»
13 years 6 months ago
Audio authenticity: detecting ENF discontinuity with high precision phase analysis
—This paper addresses a forensic tool used to assess audio authenticity. The proposed method is based on detecting phase discontinuity of the power grid signal; this signal, refe...
Daniel Patricio Nicolalde Rodríguez, Jos&ea...
ICSEA
2006
IEEE
14 years 1 months ago
Analysing Countermeasures Against Privacy-Invasive Software
User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. Various forms of countermeasures try to mitigate the negative effects caused b...
Martin Boldt, Bengt Carlsson