52 papers:
CAiSE-2014-SimouKKG #challenge #forensics #identification- Cloud Forensics: Identifying the Major Issues and Challenges (SS, CK, EK, SG), pp. 271–284.
ICPR-2014-ChenLLYH #adaptation #detection #forensics- Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement (CC, HL, WL, RY, JH), pp. 672–677.
ICPR-2014-IslamCK #case study #forensics #geometry- A Preliminary Study of Lower Leg Geometry as a Soft Biometric Trait for Forensic Investigation (MRI, FKSC, AWKK), pp. 427–431.
ICPR-2014-SharifzadehZK #estimation #forensics #modelling #multi #parametricity #visualisation- Vein Pattern Visualization through Multiple Mapping Models and Local Parameter Estimation for Forensic Investigation (HRS, HZ, AWKK), pp. 160–165.
SEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process #using- Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
DocEng-2013-BagleyBK #forensics- Revisiting a summer vacation: digital restoration and typesetter forensics (SRB, DFB, BWK), pp. 3–12.
ICDAR-2013-AmaralFB #feature model #forensics #identification- Feature Selection for Forensic Handwriting Identification (AMMMA, COdAF, FB), pp. 922–926.
ICDAR-2013-BarbozaLJ #documentation #forensics- A Color-Based Model to Determine the Age of Documents for Forensic Purposes (RdSB, RDL, DMdJ), pp. 1350–1354.
ICDAR-2013-MalikALD #forensics #realtime #verification- FREAK for Real Time Forensic Signature Verification (MIM, SA, ML, AD), pp. 971–975.
ICDAR-2013-MalikLD #automation #comparison #forensics #verification- Part-Based Automatic System in Comparison to Human Experts for Forensic Signature Verification (MIM, ML, AD), pp. 872–876.
ICDAR-2013-RoyG #documentation #forensics #probability #re-engineering- A Probabilistic Model for Reconstruction of Torn Forensic Documents (AR, UG), pp. 494–498.
DUXU-PMT-2013-Breiner #detection #forensics #interactive- User Interaction Forensics — Detecting and Interpreting the User’s Footprints during Touch Interaction (KB), pp. 193–202.
SEKE-2013-GayedLB #case study #forensics #process #representation- Representing Chains of Custody Along a Forensic Process: A Case Study on Kruse Model (TFG, HL, MB), pp. 674–680.
RE-2013-PasqualeYSCTN #adaptation #forensics- Requirements-driven adaptive digital forensics (LP, YY, MS, LC, TTT, BN), pp. 340–341.
ICSE-2013-King #forensics- Measuring the forensic-ability of audit logs for nonrepudiation (JK), pp. 1419–1422.
ICPR-2012-PollardSA #forensics #image- Print biometrics: Recovering forensic signatures from halftone images (SBP, SJS, GBA), pp. 1651–1654.
ICPR-2012-TangZKC #analysis #forensics #image #visualisation- Visualizing vein patterns from color skin images based on image mapping for forensics analysis (CT, HZ, AWKK, NC), pp. 2387–2390.
SEKE-2012-GayedLB #forensics #semantics #towards #web- Computer Forensics: Toward the Construction of Electronic Chain of Custody on the Semantic Web (TFG, HL, MB), pp. 406–411.
ICMT-2012-BosS #forensics #optimisation- Domain-Specific Optimization in Digital Forensics (JvdB, TvdS), pp. 121–136.
DocEng-2011-AdamsPS #case study #forensics #interactive- A study of the interaction of paper substrates on printed forensic imaging (GBA, SBP, SJS), pp. 263–266.
SAC-2011-DingZ #analysis #forensics- Time based data forensic and cross-reference analysis (XD, HZ), pp. 185–190.
SAC-2011-Marty #forensics- Cloud application logging for forensics (RM), pp. 178–184.
ICSE-2011-BosS #domain-specific language #forensics- Bringing domain-specific languages to digital forensics (JvdB, TvdS), pp. 671–680.
DocEng-2010-SimskeSAE #documentation #ecosystem #forensics #security- Document imaging security and forensics ecosystem considerations (SJS, MS, GBA, PE), pp. 41–50.
ICPR-2010-PuertasRFOE #comprehension #forensics #performance #recognition #towards- Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions (MP, DR, JF, JOG, NE), pp. 1638–1641.
KDD-2010-HendersonEFALMPT #approach #forensics #graph #metric #mining #multi- Metric forensics: a multi-level approach for mining volatile graphs (KH, TER, CF, LA, LL, KM, BAP, HT), pp. 163–172.
KEOD-2010-YilmazTA #forensics #named #ontology- BALLON — An Ontology for Forensic Ballistics Domain (AY, HT, SA), pp. 392–395.
SEKE-2010-Pelaez #convergence #forensics #modelling #network- A Pattern Methodology for Modeling Network Forensic Investigations in Converged Tactical Environments (JCP), pp. 777–782.
SAC-2010-GloeB #benchmark #database #forensics #image #metric- The “Dresden Image Database” for benchmarking digital image forensics (TG, RB), pp. 1584–1590.
SAC-2010-IqbalKFD #email #forensics #verification- e-mail authorship verification for forensic investigation (FI, LAK, BCMF, MD), pp. 1591–1598.
ICDAR-2009-Franke #analysis #forensics #reliability- Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations (KF), pp. 1310–1314.
ICDAR-2009-Smet #automation #documentation #forensics #re-engineering- Semi-automatic Forensic Reconstruction of Ripped-up Documents (PdS), pp. 703–707.
RE-2009-Hall #forensics #verification- Forensic System Verification (RJH), pp. 111–120.
SAC-2009-FloraTB #forensics #identification #image #using- Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SAC-2009-HoelzRG #forensics- Artificial intelligence applied to computer forensics (BWPH, CGR, RG), pp. 883–888.
ICPR-2008-GuehamBC #automation #classification #correlation #forensics #using- Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
SAC-2008-WeiSWS #email #forensics #identification #mining- Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
SIGMOD-2007-StahlbergML #analysis #database #forensics #privacy- Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
MoDELS-2007-HibberdLR #debugging #forensics #model transformation- Forensic Debugging of Model Transformations (MH, ML, KR), pp. 589–604.
MoDELS-2007-HibberdLR #debugging #forensics #model transformation- Forensic Debugging of Model Transformations (MH, ML, KR), pp. 589–604.
SAC-2007-IeongL #forensics- Deriving cse-specific live forensics investigation procedures from FORZA (RSCI, HCL), pp. 175–180.
SAC-2007-LiebrockMBPCSU #analysis #design #forensics #set- A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
SAC-2007-SantosBOJ #approach #documentation #forensics #verification- Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
SAC-2007-SavoldiG #forensics #perspective- SIM and USIM filesystem: a forensics perspective (AS, PG), pp. 181–187.
SIGMOD-2006-PavlouS #analysis #database #forensics- Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
SAC-2006-AbbottBCVM #automation #forensics #recognition- Automated recognition of event scenarios for digital forensics (JA, JB, AJC, OYdV, GMM), pp. 293–300.
SAC-2006-BurmesterM #forensics- The advent of trusted computing: implications for digital forensics (MB, JM), pp. 283–287.
SAC-2005-PervouchineLM #analysis #documentation #forensics- Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
SAC-2005-RekhisB #automation #forensics #verification- A formal logic-based language and an automated verification tool for computer forensic investigation (SR, NB), pp. 287–291.
SAC-2005-RenJ #adaptation #distributed #forensics #network #realtime- Honeynet based distributed adaptive network forensics and active real time investigation (WR, HJ), pp. 302–303.
DAC-2000-KirovskiLWP #forensics #tool support- Forensic engineering techniques for VLSI CAD tools (DK, DTL, JLW, MP), pp. 581–586.
ICDAR-v1-1995-Baier #documentation #forensics #image- Image processing of forensic documents (PEB), pp. 1–4.