default search action
1. e-Forensics 2008: Adelaide, Australia
- Matthew Sorell, Lang White:
1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008. ICST/ACM 2008, ISBN 978-963-9799-19-6
Electronic evidence and the legal system
- Benjamin P. Turnbull:
The adaptability of electronic evidence acquisition guides for new technologies. 1 - Nigel H. M. Wilson:
Forensics in cyber-space: the legal challenges. 2 - Sabine Cikic, Sabina Jeschke, Fritz Lehmann-Grube, Jan Sablatnig:
Using a room metaphor for e-forensic working environments. 3
Video analysis
- Anton van den Hengel, Rhys Hill, Henry Detmold, Anthony R. Dick:
Searching in space and time: a system for forensic analysis of large video repositories. 4 - Carmen Duthoit, Tamara Sztynda, S. K. L. Lal, Budi Thomas Jap, Johnson I. Agbinya:
Optical flow image analysis of facial expressions of human emotion: forensic applications. 5 - Zhuo Xiao, Amirsaman Poursoltanmohammadi, Matthew Sorell:
Video motion detection beyond reasonable doubt. 6
Network forensics
- Tobias Eggendorfer:
Methods to identify spammers. 7 - Dennis K. Nilsson, Ulf Larson:
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. 8 - Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel:
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. 9
Voice and VoIP
- Jill Slay, Matthew Simon:
Voice over IP forensics. 10 - Mauro Migliardi, Roberto Podestá, Matteo Tebaldi, Massimo Maresca:
Hiding Skype VoIP calls from parametric identification. 11 - Marko Tuononen, Rosa González Hautamäki, Pasi Fränti:
Automatic voice activity detection in different speech applications. 12
Evidence tracing
- Sabine Cikic, Sven Grottke, Fritz Lehmann-Grube, Jan Sablatnig:
Cheat-prevention and -analysis in online virtual worlds. 13 - Eunju Baek, Yeog Kim, Jinwon Sung, Sangjin Lee:
The design of framework for detecting an insider's leak of confidential information. 14 - Svein Yngvar Willassen:
Timestamp evidence correlation by model based clock hypothesis testing. 15
JPEG image analysis
- Michael I. Cohen:
Advanced JPEG carving. 16 - Marie-Charlotte Poilpré, Patrick Perrot, Hugues Talbot:
Image tampering detection using Bayer interpolation and JPEG compression. 17 - Matthew Sorell:
Conditions for effective detection and identification of primary quantization of re-quantized JPEG images. 18
Digital memory recovery
- Braden J. Phillips, Cain D. Schmidt, Daniel R. Kelly:
Recovering data from USB flash memory sticks that have been damaged or electronically erased. 19 - Roland MacKenzie, Matthew Sorell:
Recovery of circumstantial digital evidence leading to an Anton Piller order: a case study. 20
Watermarking
- Kazuo Ohzeki, Masaru Sakurai:
SVD-based watermark with quasi-one-way operation by reducing a singular value matrix rank. 21 - Antionette W.-T. Goh, M. L. Dennis Wong, Raphael C.-W. Phan:
Analysis of a zero location based authentication scheme for biomedical images. 22 - Shipu Zheng, Yuesheng Zhu, Xing Wang:
A new RST-invariant watermarking scheme based on texture features. 23 - Gaurav Gupta, Josef Pieprzyk:
Reversible and blind database watermarking using difference expansion. 24
Forensic sensing technologies: papers submitted to the International Workshop on Forensic Sensing Technologies
- Valerian A. Kuznetsov, Jadranka Sunde, Michael Thomas:
Explosive blast effects on latent fingerprints. 25 - Xinshi Luo, Sivakumar Balakrishnan, Peter Osvath, Gerry Swiegers:
DatatraceDNA®: a novel authentic technology for forensic detections and identifications. 26 - Nigel A. Spooner, Barnaby W. Smith:
Luminescence analysis for radiological and nuclear forensic application. 27
Posters and technology demonstrators
- Fokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Emre Topak:
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures. 28 - John Haggerty, David Llewellyn-Jones, Mark John Taylor:
FORWEB: file fingerprinting for automated network forensics investigations. 29 - Keonwoo Kim, Dowon Hong, Kyoil Chung:
Forensics for Korean cell phone. 30 - Hyungkeun Jee, Jooyoung Lee, Dowon Hong:
High speed search for large-scale digital forensic investigation. 31 - Young-Soo Kim, Sang-Su Lee, Dowon Hong:
Suspects' data hiding at remaining registry values of uninstalled programs. 32 - Giada Maggenti, Andrea Bracciali, Paolo Mancarella:
Abduction and legal reasoning. 33
International Workshop on Knowledge Discovery and Data Mining - WKDD1
- Youdong Zhang:
Cooperation forensic computing research. 34 - Xu Yusheng, Zhixin Ma, Li Lian, Tharam S. Dillon:
Effective pruning strategies for sequential pattern mining. 35 - Yuechao Ding:
A new method: multi-factor trend regression and its application to economy forecast in Jiangxi. 36
WKDD 2008 poster session
- Wang Ting, Hua Zhiwu:
A customer satisfaction degree evaluation model based on support vector machine. 37 - Xiaoliang Jia, Zhenming Zhang, Xitian Tian:
Research and application on typical process knowledge discovery in mechanical manufacturing enterprise. 38 - Lili Cai, Fugeng Song, Deling Yuan:
Study on the application of SVM in supplier primary election. 39 - Ke Chen, Jia Wang:
The data mining technology based on CIMS and its application on automotive remanufacturing. 40 - Shouning Qu, Bing Zhang, Xinsheng Yu, Qin Wang:
The development and application of Chinese intelligent question answering system based on J2EE technology. 41 - Xiao Xue, Xueyan Zhang:
The method engineering process for multi-agent system development. 42 - Fu Duan, Yongjie Han, Qiuyong Zhao, Keming Xie:
Towards self-tuning of dynamic resources for workloads. 43 - Caiquan Xiong, Ying Pan, Dehua Li:
A discussion information-structuring model based on the Toulmin formalism. 44 - Zhengbing Hu, Zhitang Li, Junqi Wu:
A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. 45 - Zhenqiang Bao, Kaizhou Gao, Xiangqing Li, Lei Guo, Hui Zhong:
Evaluating organization external knowledge acquisition. 46 - Guangzhu Yu, Keqing Li, Shihuang Shao:
Mining high utility itemsets in large high dimensional data. 47 - Yong-li Zhu, Xin-ying Wang, Dong-ling Cheng:
Ontology-based research on wind power plant information interaction. 48 - Zhiming Liu, Cheng Wang, Jian Li:
Solving constrained optimization via a modified genetic particle swarm optimization. 49 - Daliang Wang, Dezheng Zhang, Lixin Gao, Jianming Liu, Huansheng Zhang:
Process knowledge verification method based on petri net. 50 - José Miguel Rubio León:
Knowledge management in the ubiquitous software development. 51 - Deren Li, Xinyi Dong, Liangming Liu, Daxiang Xiang:
A new cloud detection algorithm for FY-2C images over China. 52 - Orlando Durán, Nibaldo Rodríguez, Luiz Airton Consalter:
A PSO-based clustering algorithm for manufacturing cell design. 53 - Zhongni Wang, Xianchuan Yu, Li-bao Zhang:
A remote sensing image fusion algorithm based on ordinal fast independent component analysis. 54 - Hongchao Ma, Wei Zhou, Xinyi Dong, Honggen Xu:
An empirical research of multi-classifier fusion methods and diversity measure in remote sensing classification. 55 - Wei Guo, Ke Chen, Jia Wang:
An empirical study on improving the manufacturing informatization index system of China. 56 - Jianhong Luo, Dezhao Chen:
An enhanced ART2 neural network for clustering analysis. 57 - Xingping Wen, Guangdao Hu, Xiaofeng Yang:
CBERS-02 remote sensing data mining using decision tree algorithm. 58 - Dezheng Zhang, Lixin Gao, Huansheng Zhang, Jianming Liu:
Centrality research on the traditional Chinese medicine network. 59 - Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu:
Cloud model-based data attributes reduction for clustering. 60 - Yixin Zhang:
Coupling analysis of regional economic structure system. 61 - Myunggwon Hwang, Jong-An Park, Sunkyoung Baek, Pankoo Kim, Junho Choi:
Grasping related words of unknown word for automatic extension of lexical dictionary. 62 - Liangming Liu, Daxiang Xiang, Xinyi Dong, Zheng Zhou:
Improvement of the drought monitoring model based on the cloud parameters method and remote sensing data. 63 - Chun Dong, Hongmei Zhang, Tao Wang, Yong Wang, Agen Qiu:
Temporal and spatial analysis on labor productivity of radio and TV industry in China. 64
International workshop on knowledge discovery and data mining (WKDD 2008) - WKDD2
- Xinyu Duan, Ping Jiang:
Research of a virtual 3D study pattern based on constructive theory in e-learning. 65 - Junfang Gong, Xincai Wu, Xiuguo Liu, Shengwen Li:
Application of tetrahedral mesh model based on neural network in solid mineral reserve estimation. 66
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.