Sciweavers

SADFE
2005
IEEE
14 years 6 months ago
Digital Evidence Search Kit
With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that...
K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas C...
SADFE
2005
IEEE
14 years 6 months ago
Challenges of Automating the Detection of Paedophile Activity on the Internet
This review paper outlines the need for research into the process of automating the detection of paedophile activities on the Internet and identifies the associated challenges of ...
Lyta Penna, Andrew Clark, George M. Mohay
SADFE
2005
IEEE
14 years 6 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
SADFE
2005
IEEE
14 years 6 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...