Sciweavers

SADFE
2005
IEEE
14 years 5 months ago
Challenges of Automating the Detection of Paedophile Activity on the Internet
This review paper outlines the need for research into the process of automating the detection of paedophile activities on the Internet and identifies the associated challenges of ...
Lyta Penna, Andrew Clark, George M. Mohay
SADFE
2005
IEEE
14 years 5 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
SADFE
2005
IEEE
14 years 5 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
SADFE
2007
IEEE
14 years 5 months ago
Toward Models for Forensic Analysis
The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...
SADFE
2007
IEEE
14 years 5 months ago
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution
Robert F. Erbacher, Barbara Endicott-Popovsky, Deb...
SADFE
2007
IEEE
14 years 5 months ago
The Rules of Time on NTFS File System
—With the rapid development and popularity of IT technology, criminals and mischievous computer users are given avenues to commit crimes and malicious activities. As forensic sci...
Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan,...
SADFE
2008
IEEE
14 years 6 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
SADFE
2008
IEEE
14 years 6 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
SADFE
2008
IEEE
14 years 6 months ago
Protecting Digital Legal Professional Privilege (LPP) Data
To enable free communication between legal advisor and his client for proper functioning of the legal system, certain documents, known as Legal professional privilege (LPP) docume...
Frank Y. W. Law, Pierre K. Y. Lai, Zoe L. Jiang, R...