BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
forensics
Google forensics

Tag #forensics

63 papers:

ECIRECIR-p2-2019-PotthastRSS
A Decade of Shared Tasks in Digital Text Forensics at PAN (MP, PR, ES, BS0), pp. 291–300.
ESEC-FSEESEC-FSE-2017-AlrajehPN #on the #requirements
On evidence preservation requirements for forensic-ready systems (DA, LP, BN), pp. 559–569.
ICPRICPR-2016-RotaSCP #analysis #education #image #learning #question #student
Bad teacher or unruly student: Can deep learning say something in Image Forensics analysis? (PR, ES, VC, CP), pp. 2503–2508.
SIGITESIGITE-2015-GodaBC
Cell Phone Forensics (BSG, JWB, CEC), pp. 39–42.
CAiSECAiSE-2014-SimouKKG #challenge #identification
Cloud Forensics: Identifying the Major Issues and Challenges (SS, CK, EK, SG), pp. 271–284.
ICPRICPR-2014-ChenLLYH #adaptation #detection
Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement (CC, HL, WL, RY, JH), pp. 672–677.
ICPRICPR-2014-IslamCK #case study #geometry
A Preliminary Study of Lower Leg Geometry as a Soft Biometric Trait for Forensic Investigation (MRI, FKSC, AWKK), pp. 427–431.
ICPRICPR-2014-SharifzadehZK #estimation #modelling #multi #parametricity #visualisation
Vein Pattern Visualization through Multiple Mapping Models and Local Parameter Estimation for Forensic Investigation (HRS, HZ, AWKK), pp. 160–165.
SEKESEKE-2014-GayedLB #case study #lightweight #ontology #process #using
Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
DocEngDocEng-2013-BagleyBK
Revisiting a summer vacation: digital restoration and typesetter forensics (SRB, DFB, BWK), pp. 3–12.
ICDARICDAR-2013-AmaralFB #feature model #identification
Feature Selection for Forensic Handwriting Identification (AMMMA, COdAF, FB), pp. 922–926.
ICDARICDAR-2013-BarbozaLJ #documentation
A Color-Based Model to Determine the Age of Documents for Forensic Purposes (RdSB, RDL, DMdJ), pp. 1350–1354.
ICDARICDAR-2013-MalikALD #realtime #verification
FREAK for Real Time Forensic Signature Verification (MIM, SA, ML, AD), pp. 971–975.
ICDARICDAR-2013-MalikLD #automation #comparison #verification
Part-Based Automatic System in Comparison to Human Experts for Forensic Signature Verification (MIM, ML, AD), pp. 872–876.
ICDARICDAR-2013-RoyG #documentation #probability #re-engineering
A Probabilistic Model for Reconstruction of Torn Forensic Documents (AR, UG), pp. 494–498.
JCDLJCDL-2013-BogenMG #documentation #library #named
Redeye: a digital library for forensic document triage (PLB, AM, RG), pp. 181–190.
HCIDUXU-PMT-2013-Breiner #detection #interactive
User Interaction Forensics — Detecting and Interpreting the User’s Footprints during Touch Interaction (KB), pp. 193–202.
SEKESEKE-2013-GayedLB #case study #process #representation
Representing Chains of Custody Along a Forensic Process: A Case Study on Kruse Model (TFG, HL, MB), pp. 674–680.
RERE-2013-PasqualeYSCTN #adaptation
Requirements-driven adaptive digital forensics (LP, YY, MS, LC, TTT, BN), pp. 340–341.
ICSEICSE-2013-King
Measuring the forensic-ability of audit logs for nonrepudiation (JK), pp. 1419–1422.
TPDLTPDL-2012-SuttonRGL #library
Applying Digital Library Technologies to Nuclear Forensics (ES, CR, FCG, RRL), pp. 144–149.
SIGITESIGITE-2012-PanMYSS #game studies #student
Game-based forensics course for first year students (YP, SM, BY, BS, DS), pp. 13–18.
ICPRICPR-2012-PollardSA #image
Print biometrics: Recovering forensic signatures from halftone images (SBP, SJS, GBA), pp. 1651–1654.
ICPRICPR-2012-TangZKC #analysis #image #visualisation
Visualizing vein patterns from color skin images based on image mapping for forensics analysis (CT, HZ, AWKK, NC), pp. 2387–2390.
SEKESEKE-2012-GayedLB #semantics #towards #web
Computer Forensics: Toward the Construction of Electronic Chain of Custody on the Semantic Web (TFG, HL, MB), pp. 406–411.
ICMTICMT-2012-BosS #optimisation
Domain-Specific Optimization in Digital Forensics (JvdB, TvdS), pp. 121–136.
DocEngDocEng-2011-AdamsPS #case study #interactive
A study of the interaction of paper substrates on printed forensic imaging (GBA, SBP, SJS), pp. 263–266.
ICSEICSE-2011-BosS #domain-specific language
Bringing domain-specific languages to digital forensics (JvdB, TvdS), pp. 671–680.
SACSAC-2011-DingZ #analysis
Time based data forensic and cross-reference analysis (XD, HZ), pp. 185–190.
SACSAC-2011-Marty
Cloud application logging for forensics (RM), pp. 178–184.
DocEngDocEng-2010-SimskeSAE #documentation #ecosystem #security
Document imaging security and forensics ecosystem considerations (SJS, MS, GBA, PE), pp. 41–50.
SIGITESIGITE-2010-Mislan #mobile
Creating laboratories for undergraduate courses in mobile phone forensics (RPM), pp. 111–116.
ICPRICPR-2010-PuertasRFOE #comprehension #performance #recognition #towards
Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions (MP, DR, JF, JOG, NE), pp. 1638–1641.
KDDKDD-2010-HendersonEFALMPT #approach #graph #metric #mining #multi
Metric forensics: a multi-level approach for mining volatile graphs (KH, TER, CF, LA, LL, KM, BAP, HT), pp. 163–172.
KEODKEOD-2010-YilmazTA #named #ontology
BALLON — An Ontology for Forensic Ballistics Domain (AY, HT, SA), pp. 392–395.
SEKESEKE-2010-Pelaez #convergence #modelling #network
A Pattern Methodology for Modeling Network Forensic Investigations in Converged Tactical Environments (JCP), pp. 777–782.
SACSAC-2010-GloeB #benchmark #database #image #metric
The “Dresden Image Database” for benchmarking digital image forensics (TG, RB), pp. 1584–1590.
SACSAC-2010-IqbalKFD #email #verification
e-mail authorship verification for forensic investigation (FI, LAK, BCMF, MD), pp. 1591–1598.
ICDARICDAR-2009-Franke #analysis #reliability
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations (KF), pp. 1310–1314.
ICDARICDAR-2009-Smet #automation #documentation #re-engineering
Semi-automatic Forensic Reconstruction of Ripped-up Documents (PdS), pp. 703–707.
RERE-2009-Hall #verification
Forensic System Verification (RJH), pp. 111–120.
SACSAC-2009-FloraTB #identification #image #using
Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SACSAC-2009-HoelzRG
Artificial intelligence applied to computer forensics (BWPH, CGR, RG), pp. 883–888.
ICPRICPR-2008-GuehamBC #automation #classification #correlation #using
Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
SACSAC-2008-WeiSWS #email #identification #mining
Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
SIGMODSIGMOD-2007-StahlbergML #analysis #database #privacy
Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
SIGITESIGITE-2007-Hill #hardware
An inexpensive method to shield wireless devices during hardware forensic investigation in a laboratory setting (LWH), pp. 239–244.
MODELSMoDELS-2007-HibberdLR #debugging #model transformation
Forensic Debugging of Model Transformations (MH, ML, KR), pp. 589–604.
MODELSMoDELS-2007-HibberdLR #debugging #model transformation
Forensic Debugging of Model Transformations (MH, ML, KR), pp. 589–604.
SACSAC-2007-IeongL
Deriving cse-specific live forensics investigation procedures from FORZA (RSCI, HCL), pp. 175–180.
SACSAC-2007-LiebrockMBPCSU #analysis #design #set
A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
SACSAC-2007-SantosBOJ #approach #documentation #verification
Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
SACSAC-2007-SavoldiG #perspective
SIM and USIM filesystem: a forensics perspective (AS, PG), pp. 181–187.
SIGMODSIGMOD-2006-PavlouS #analysis #database
Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
SACSAC-2006-AbbottBCVM #automation #recognition
Automated recognition of event scenarios for digital forensics (JA, JB, AJC, OYdV, GMM), pp. 293–300.
SACSAC-2006-BurmesterM
The advent of trusted computing: implications for digital forensics (MB, JM), pp. 283–287.
SIGITESIGITE-2005-DardickL #security
Interdisciplinary minor in digital forensics, security and law (GSD, LKL), p. 371.
SACSAC-2005-PervouchineLM #analysis #documentation
Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
SACSAC-2005-RekhisB #automation #verification
A formal logic-based language and an automated verification tool for computer forensic investigation (SR, NB), pp. 287–291.
SACSAC-2005-RenJ #adaptation #distributed #network #realtime
Honeynet based distributed adaptive network forensics and active real time investigation (WR, HJ), pp. 302–303.
SIGITESIGITE-2004-TroellPS #development
Forensic course development: one year later (LT, YP, BS), pp. 50–55.
DACDAC-2000-KirovskiLWP #tool support
Forensic engineering techniques for VLSI CAD tools (DK, DTL, JLW, MP), pp. 581–586.
ICDARICDAR-v1-1995-Baier #documentation #image
Image processing of forensic documents (PEB), pp. 1–4.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.