Tag #forensics
63 papers:
- ECIR-p2-2019-PotthastRSS
- A Decade of Shared Tasks in Digital Text Forensics at PAN (MP, PR, ES, BS0), pp. 291–300.
- ESEC-FSE-2017-AlrajehPN #on the #requirements
- On evidence preservation requirements for forensic-ready systems (DA, LP, BN), pp. 559–569.
- ICPR-2016-RotaSCP #analysis #education #image #learning #question #student
- Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? (PR, ES, VC, CP), pp. 2503–2508.
- SIGITE-2015-GodaBC
- Cell Phone Forensics (BSG, JWB, CEC), pp. 39–42.
- CAiSE-2014-SimouKKG #challenge #identification
- Cloud Forensics: Identifying the Major Issues and Challenges (SS, CK, EK, SG), pp. 271–284.
- ICPR-2014-ChenLLYH #adaptation #detection
- Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement (CC, HL, WL, RY, JH), pp. 672–677.
- ICPR-2014-IslamCK #case study #geometry
- A Preliminary Study of Lower Leg Geometry as a Soft Biometric Trait for Forensic Investigation (MRI, FKSC, AWKK), pp. 427–431.
- ICPR-2014-SharifzadehZK #estimation #modelling #multi #parametricity #visualisation
- Vein Pattern Visualization through Multiple Mapping Models and Local Parameter Estimation for Forensic Investigation (HRS, HZ, AWKK), pp. 160–165.
- SEKE-2014-GayedLB #case study #lightweight #ontology #process #using
- Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
- DocEng-2013-BagleyBK
- Revisiting a summer vacation: digital restoration and typesetter forensics (SRB, DFB, BWK), pp. 3–12.
- ICDAR-2013-AmaralFB #feature model #identification
- Feature Selection for Forensic Handwriting Identification (AMMMA, COdAF, FB), pp. 922–926.
- ICDAR-2013-BarbozaLJ #documentation
- A Color-Based Model to Determine the Age of Documents for Forensic Purposes (RdSB, RDL, DMdJ), pp. 1350–1354.
- ICDAR-2013-MalikALD #realtime #verification
- FREAK for Real Time Forensic Signature Verification (MIM, SA, ML, AD), pp. 971–975.
- ICDAR-2013-MalikLD #automation #comparison #verification
- Part-Based Automatic System in Comparison to Human Experts for Forensic Signature Verification (MIM, ML, AD), pp. 872–876.
- ICDAR-2013-RoyG #documentation #probability #re-engineering
- A Probabilistic Model for Reconstruction of Torn Forensic Documents (AR, UG), pp. 494–498.
- JCDL-2013-BogenMG #documentation #library #named
- Redeye: a digital library for forensic document triage (PLB, AM, RG), pp. 181–190.
- DUXU-PMT-2013-Breiner #detection #interactive
- User Interaction Forensics — Detecting and Interpreting the User’s Footprints during Touch Interaction (KB), pp. 193–202.
- SEKE-2013-GayedLB #case study #process #representation
- Representing Chains of Custody Along a Forensic Process: A Case Study on Kruse Model (TFG, HL, MB), pp. 674–680.
- RE-2013-PasqualeYSCTN #adaptation
- Requirements-driven adaptive digital forensics (LP, YY, MS, LC, TTT, BN), pp. 340–341.
- ICSE-2013-King
- Measuring the forensic-ability of audit logs for nonrepudiation (JK), pp. 1419–1422.
- TPDL-2012-SuttonRGL #library
- Applying Digital Library Technologies to Nuclear Forensics (ES, CR, FCG, RRL), pp. 144–149.
- SIGITE-2012-PanMYSS #game studies #student
- Game-based forensics course for first year students (YP, SM, BY, BS, DS), pp. 13–18.
- ICPR-2012-PollardSA #image
- Print biometrics: Recovering forensic signatures from halftone images (SBP, SJS, GBA), pp. 1651–1654.
- ICPR-2012-TangZKC #analysis #image #visualisation
- Visualizing vein patterns from color skin images based on image mapping for forensics analysis (CT, HZ, AWKK, NC), pp. 2387–2390.
- SEKE-2012-GayedLB #semantics #towards #web
- Computer Forensics: Toward the Construction of Electronic Chain of Custody on the Semantic Web (TFG, HL, MB), pp. 406–411.
- ICMT-2012-BosS #optimisation
- Domain-Specific Optimization in Digital Forensics (JvdB, TvdS), pp. 121–136.
- DocEng-2011-AdamsPS #case study #interactive
- A study of the interaction of paper substrates on printed forensic imaging (GBA, SBP, SJS), pp. 263–266.
- ICSE-2011-BosS #domain-specific language
- Bringing domain-specific languages to digital forensics (JvdB, TvdS), pp. 671–680.
- SAC-2011-DingZ #analysis
- Time based data forensic and cross-reference analysis (XD, HZ), pp. 185–190.
- SAC-2011-Marty
- Cloud application logging for forensics (RM), pp. 178–184.
- DocEng-2010-SimskeSAE #documentation #ecosystem #security
- Document imaging security and forensics ecosystem considerations (SJS, MS, GBA, PE), pp. 41–50.
- SIGITE-2010-Mislan #mobile
- Creating laboratories for undergraduate courses in mobile phone forensics (RPM), pp. 111–116.
- ICPR-2010-PuertasRFOE #comprehension #performance #recognition #towards
- Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions (MP, DR, JF, JOG, NE), pp. 1638–1641.
- KDD-2010-HendersonEFALMPT #approach #graph #metric #mining #multi
- Metric forensics: a multi-level approach for mining volatile graphs (KH, TER, CF, LA, LL, KM, BAP, HT), pp. 163–172.
- KEOD-2010-YilmazTA #named #ontology
- BALLON — An Ontology for Forensic Ballistics Domain (AY, HT, SA), pp. 392–395.
- SEKE-2010-Pelaez #convergence #modelling #network
- A Pattern Methodology for Modeling Network Forensic Investigations in Converged Tactical Environments (JCP), pp. 777–782.
- SAC-2010-GloeB #benchmark #database #image #metric
- The “Dresden Image Database” for benchmarking digital image forensics (TG, RB), pp. 1584–1590.
- SAC-2010-IqbalKFD #email #verification
- e-mail authorship verification for forensic investigation (FI, LAK, BCMF, MD), pp. 1591–1598.
- ICDAR-2009-Franke #analysis #reliability
- Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations (KF), pp. 1310–1314.
- ICDAR-2009-Smet #automation #documentation #re-engineering
- Semi-automatic Forensic Reconstruction of Ripped-up Documents (PdS), pp. 703–707.
- RE-2009-Hall #verification
- Forensic System Verification (RJH), pp. 111–120.
- SAC-2009-FloraTB #identification #image #using
- Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
- SAC-2009-HoelzRG
- Artificial intelligence applied to computer forensics (BWPH, CGR, RG), pp. 883–888.
- ICPR-2008-GuehamBC #automation #classification #correlation #using
- Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
- SAC-2008-WeiSWS #email #identification #mining
- Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
- SIGMOD-2007-StahlbergML #analysis #database #privacy
- Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
- SIGITE-2007-Hill #hardware
- An inexpensive method to shield wireless devices during hardware forensic investigation in a laboratory setting (LWH), pp. 239–244.
- MoDELS-2007-HibberdLR #debugging #model transformation
- Forensic Debugging of Model Transformations (MH, ML, KR), pp. 589–604.
- MoDELS-2007-HibberdLR #debugging #model transformation
- Forensic Debugging of Model Transformations (MH, ML, KR), pp. 589–604.
- SAC-2007-IeongL
- Deriving cse-specific live forensics investigation procedures from FORZA (RSCI, HCL), pp. 175–180.
- SAC-2007-LiebrockMBPCSU #analysis #design #set
- A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
- SAC-2007-SantosBOJ #approach #documentation #verification
- Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
- SAC-2007-SavoldiG #perspective
- SIM and USIM filesystem: a forensics perspective (AS, PG), pp. 181–187.
- SIGMOD-2006-PavlouS #analysis #database
- Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
- SAC-2006-AbbottBCVM #automation #recognition
- Automated recognition of event scenarios for digital forensics (JA, JB, AJC, OYdV, GMM), pp. 293–300.
- SAC-2006-BurmesterM
- The advent of trusted computing: implications for digital forensics (MB, JM), pp. 283–287.
- SIGITE-2005-DardickL #security
- Interdisciplinary minor in digital forensics, security and law (GSD, LKL), p. 371.
- SAC-2005-PervouchineLM #analysis #documentation
- Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
- SAC-2005-RekhisB #automation #verification
- A formal logic-based language and an automated verification tool for computer forensic investigation (SR, NB), pp. 287–291.
- SAC-2005-RenJ #adaptation #distributed #network #realtime
- Honeynet based distributed adaptive network forensics and active real time investigation (WR, HJ), pp. 302–303.
- SIGITE-2004-TroellPS #development
- Forensic course development: one year later (LT, YP, BS), pp. 50–55.
- DAC-2000-KirovskiLWP #tool support
- Forensic engineering techniques for VLSI CAD tools (DK, DTL, JLW, MP), pp. 581–586.
- ICDAR-v1-1995-Baier #documentation #image
- Image processing of forensic documents (PEB), pp. 1–4.