-
2
-
-
65249122989
-
-
Regional Computer Forensics Laboratory Program Annual Report FY2007, US Federal Bureau of Investigation, 2007; www.rcfl.gov/downloads/ documents/RCFL-Nat -Ammal07.pdf.
-
Regional Computer Forensics Laboratory Program Annual Report FY2007, US Federal Bureau of Investigation, 2007; www.rcfl.gov/downloads/ documents/RCFL-Nat -Ammal07.pdf.
-
-
-
-
3
-
-
84868929483
-
DOD Seized 60TB in Search for Iraq Battle Plan Leak
-
Australia, 31 Jan. 2005;
-
P. Roberts, "DOD Seized 60TB in Search for Iraq Battle Plan Leak," Computerworld (Australia), 31 Jan. 2005; www.computerworld. com.au/index.php/id;266473746.
-
Computerworld
-
-
Roberts, P.1
-
4
-
-
65249092425
-
-
RCFL Program Annual Report for Fiscal Year 2006, US Federal Bureau of Investigation, 2006; www.rcfl.gov/ downloads/documents/RCFL-Nat-Ammal06.pdf.
-
RCFL Program Annual Report for Fiscal Year 2006, US Federal Bureau of Investigation, 2006; www.rcfl.gov/ downloads/documents/RCFL-Nat-Ammal06.pdf.
-
-
-
-
5
-
-
0014814325
-
Space/Time Tradeoffs in Hash Coding with Allowable Errors
-
B. Bloom, "Space/Time Tradeoffs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, no. 7, 1970, pp. 422-426.
-
(1970)
Comm. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
7
-
-
0003676885
-
Fingerprinting by Random Polynomials
-
15-81, Center lor Research in Computing Technology, Harvard Univ
-
M.O. Rabin, Fingerprinting by Random Polynomials, tech. report 15-81, Center lor Research in Computing Technology, Harvard Univ., 1981.
-
(1981)
tech. report
-
-
Rabin, M.O.1
-
8
-
-
0022030599
-
Efficient Raudomized Pattern-Matching Algorithms
-
R. Karp and M. Rabin, "Efficient Raudomized Pattern-Matching Algorithms," IBM J. Research and Development, vol. 31, no. 2, 1987, pp. 249-260.
-
(1987)
IBM J. Research and Development
, vol.31
, Issue.2
, pp. 249-260
-
-
Karp, R.1
Rabin, M.2
-
9
-
-
85043988965
-
Finding Similar Files in a Large File System
-
Usenix Assoc
-
U. Manber, "Finding Similar Files in a Large File System," Proc. Usenix Winter 1994 Technical Conf., Usenix Assoc, 1994, pp. 1-10.
-
(1994)
Proc. Usenix Winter 1994 Technical Conf
, pp. 1-10
-
-
Manber, U.1
-
10
-
-
84976810280
-
Copy Detection Mechanisms for Digital Documents
-
ACM Press
-
S. Brin, J. Davis, and H. Garcia-Molia, "Copy Detection Mechanisms for Digital Documents," Proc. 1995 ACM SIGMOD Int'l Conf. Management of Data, ACM Press, 1995, pp. 398-409.
-
(1995)
Proc. 1995 ACM SIGMOD Int'l Conf. Management of Data
, pp. 398-409
-
-
Brin, S.1
Davis, J.2
Garcia-Molia, H.3
-
11
-
-
0004278262
-
-
SRC Technical Note 1997-015, Digital Equipment Corp, 25 July
-
A. Broder, S. Glassman, and M. Manasse, "Syntactic Clustering of the Web," SRC Technical Note 1997-015, Digital Equipment Corp., 25 July 1997.
-
(1997)
Syntactic Clustering of the Web
-
-
Broder, A.1
Glassman, S.2
Manasse, M.3
-
12
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
Usenix Assoc
-
H. Kim and B. Karp, "Autograph: Toward Automated, Distributed Worm Signature Detection," Proc. 13th Usenix Security Symp., Usenix Assoc, 2004, pp. 271-286.
-
(2004)
Proc. 13th Usenix Security Symp
, pp. 271-286
-
-
Kim, H.1
Karp, B.2
-
13
-
-
14844288974
-
Payload Attribution via Hierarchical Bloom Filters
-
ACM Press
-
K. Shanmugasundaram, H. Brönnimann, and N. Me-mou, "Payload Attribution via Hierarchical Bloom Filters," Proc. 11th ACM Conf. Computer and Communications Security, ACM Press, 2004, pp. 31-41.
-
(2004)
Proc. 11th ACM Conf. Computer and Communications Security
, pp. 31-41
-
-
Shanmugasundaram, K.1
Brönnimann, H.2
Me-mou, N.3
-
14
-
-
33845543472
-
Network Forensics on Packet Fingerprints
-
Springer
-
C.Y. Cho et al., "Network Forensics on Packet Fingerprints," Security and Privacy in Dynamic Environments, Springer, 2006, pp. 401-412.
-
(2006)
Security and Privacy in Dynamic Environments
, pp. 401-412
-
-
Cho, C.Y.1
-
15
-
-
1142267351
-
Winnowing: Local Algorithms for Document Fingerprinting
-
ACM Press
-
S. Schleimer, D. Wilkerson, and A. Aiken, "Winnowing: Local Algorithms for Document Fingerprinting," Proc. 2003 ACM SIGMOD Int'l Conf. Management of Data, ACM Press, 2003, pp. 76-85.
-
(2003)
Proc. 2003 ACM SIGMOD Int'l Conf. Management of Data
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.2
Aiken, A.3
-
17
-
-
52249094557
-
Identifying Almost Identical Files Using Context Triggered Piecewise Hashing
-
Elsevier
-
J. Kornblum, "Identifying Almost Identical Files Using Context Triggered Piecewise Hashing," 'Proc. 6th Ann. Digital Forensics Research Workshop Conf. (DFRWS 06), Elsevier, 2006, pp. S91-S97; www.dfrws.org/2006/ proceedings/12-Kornblum.pdf.
-
(2006)
Proc. 6th Ann. Digital Forensics Research Workshop Conf. (DFRWS 06)
-
-
Kornblum, J.1
-
19
-
-
65249183010
-
Multi-resolution Similarity Hashing
-
Elsevier
-
V. Roussev, G.G. Richard III, and L. Marziale, "Multi-resolution Similarity Hashing," Proc. 1th Ann. Digital Forensics Research Workshop Conf. (DFRWS 07), Elsevier, 2007, pp. S105-S113; www.dfrws.org/2007/ proceedings/pl05-roussev.pdf.
-
(2007)
Proc. 1th Ann. Digital Forensics Research Workshop Conf. (DFRWS 07)
-
-
Roussev, V.1
Richard III, G.G.2
Marziale, L.3
|