Sciweavers

TKDE
2010
159views more  TKDE 2010»
13 years 9 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
GRAPHICSINTERFACE
2007
14 years 19 days ago
Progressive multiples for communication-minded visualization
This paper describes a communication-minded visualization called progressive multiples that supports both the forensic analysis and presentation of multidimensional event data. We...
Doantam Phan, Andreas Paepcke, Terry Winograd
EUROSEC
2008
ACM
14 years 29 days ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
AINA
2010
IEEE
14 years 4 months ago
InnoDB Database Forensics
— Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) ti...
Peter Fruhwirt, Marcus Huber, Martin Mulazzani, Ed...
ICMCS
2005
IEEE
131views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Attacks and Forensic Analysis for Multimedia Content Protection
Piracy is one of the biggest concerns in entertainment industry. Digital copies are perfect copies. An anti-piracy defense is to perform forensic analysis and identify who partici...
Hongxia Jin, Jeffery Lotspiech
ICDCSW
2005
IEEE
14 years 4 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
ICASSP
2007
IEEE
14 years 5 months ago
Block Size Forensic Analysis in Digital Images
In non-intrusive forensic analysis, we wish to find information and properties about a piece of data without any reference to the original data prior to processing. An important ...
Steven Tjoa, Wan-Yi Sabrina Lin, H. Vicky Zhao, K....
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 5 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
SIGMOD
2006
ACM
121views Database» more  SIGMOD 2006»
14 years 11 months ago
Forensic analysis of database tampering
Kyriacos E. Pavlou, Richard T. Snodgrass