Papers

With Tag: Forensic

Can't find what you are looking for? Add a listing here
Sort By
(0)

Applying Semantic Technologies to Fight Online Banking Fraud

Rodrigo Carvalho, Sadie Creese, Michael Goldsmith
2015

none

(0)

E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime

Fahim Akhter
2008 | 10.1007/978-3-540-69304-8_30

none

(0)

High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA

N Kamaraj, S Geetha, Siva S Sivatha Sindhu, V Kabilan
2009 | 10.1109/NetCoM.2009.68

none

(0)

Towards Hippocratic Log Files

A W Rutherford

none

(0)

Design and Analysis of a Hierarchical IP Traceback System

Ashraf Matrawy, Abes Dabir
2009 | 10.1109/ICC.2009.5198896

none

(0)

Noise resistant audio-visual verification via structural constraints

Kuldip K Paliwal, Conrad Sanderson
2003

none

(0)

Rank-based distance metric learning: An application to image retrieval

2008 | 10.1109/CVPR.2008.4587389

none

(0)

Virtual Computing Laboratories Using VMware Lab Manager

2011 | 10.1109/HICSS.2011.482

none

(0)

Murder, mystery, game: a novel approach to science writing

Ann S Jennings
2001 | 10.1109/IPCC.2001.971575

none

(0)

Concept for a security investigation framework

Feng Cheng, Christoph Meinel, Martin Ussath
2015

none

(0)

A Cooperative Multi-agent Approach to Computer Forensics

Celia Ghedini Ralha, Rajiv Geeverghese, Bruno W P Hoelz, Hugo C Junior
2008 | 10.1109/WIIAT.2008.55

none

(0)

Extrinsic signatures embedding and detection for information hiding and secure printing in electrophotography

Peiju Chiang, Jan P Allebach, George T C Chiu, Gazi N Ali, Aravind K Mikkilineni, Edward J Delp
2006 | 10.1109/ACC.2006.1656604

none

(0)

Effective pruning strategies for sequential pattern mining

Ma Zhixin, Xu Yusheng, Li Lian, T S Dillon
2008 | 10.1109/WKDD.2008.22

none

(0)

The exploration & forensic analysis of computer usage data in the elderly

Jeffery A Kaye, Tamara L Hayes, Edward A Vanbaak, Misha Pavel, Holly Jimison, Stuart Hagler, William Hatt
2009 | 10.1109/IEMBS.2009.5333084

none

(0)

A Method to Automatically Filter Log Evidences for Intrusion Forensics

Jian Zhang, Bin Luo, Zhihong Zhao, Xiao Fu, Xiaojiang Du
2013 | 10.1109/ICDCSW.2013.7

none

(0)

Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers

Lucas C K Hui, Shuhui Hou, Tetsutaro Uehara, S M Yiu, K P Chow
2011 | 10.1109/IIHMSP.2011.28

none

(0)

Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera

Yuki Ashino, Ryu Sasaki, Kunihiko Fujita, Misako Irisawa
2007 | 10.1109/IIHMSP.2007.4457641

none

(0)

The Windows Physical Memory Dump Explorer for Live Forensics

Jisung Han, Sangjin Lee
2011

none

(0)

A Study of Memory Information Collection and Analysis in a view of Digital Forensic in Window System

Lee Seokhee, Lee Sangjin, Lim Jongin, Kim Hyunsang
2006

none

(0)

Reliability Verification of Evidence Analysis Tools for Digital Forensics

Sanguk Shin, Taerim Lee
2011

none

Can't find what you are looking for? Add a paper here