In combinatorial solution spaces Iterated Local Search (ILS) turns out to be exceptionally successful. The question arises: is ILS also capable of improving the optimization proces...
: Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve...
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
: Forensische Analysen mit freien OpenSource Programmen sind seit Dan Farmers und Wietse Venemas ersten und einzigen Forensik-Kurs und der darauf folgenden Veröffentlichung des Co...
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...