Sciweavers

741 search results - page 4 / 149
» Tools and techniques for Network Forensics
Sort
View
IH
2004
Springer
14 years 28 days ago
Statistical Tools for Digital Forensics
A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longe...
Alin C. Popescu, Hany Farid
IH
2001
Springer
14 years 3 hour ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
MEDIAFORENSICS
2010
13 years 9 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
JCDL
2011
ACM
260views Education» more  JCDL 2011»
12 years 10 months ago
Extending digital repository architectures to support disk image preservation and access
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support da...
Kam Woods, Christopher A. Lee, Simson Garfinkel
SAC
2011
ACM
12 years 10 months ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...