-
1
-
-
79961099108
-
-
United States Court of Appeals, Ninth Circuit. No. 05-30177 (1-30-07)
-
US v. Ziegler January 2007 http://caselaw.findlaw.com/us-9th-circuit/ 1102459.html United States Court of Appeals, Ninth Circuit. No. 05-30177 (1-30-07)
-
(2007)
US V. Ziegler
-
-
-
4
-
-
3042776963
-
Time and date issues in forensic computing: A case Study
-
C. Boyd, and P. Forster Time and date issues in forensic computing: a case Study Digital Investigation 1 February 2004 18 23
-
(2004)
Digital Investigation
, vol.1
, pp. 18-23
-
-
Boyd, C.1
Forster, P.2
-
7
-
-
33847193441
-
Design and Implementation of zeitline: A forensic timeline editor
-
Buchholz F. Falk C. Design and Implementation of zeitline: a forensic timeline editor. In: Digital Forensics Research Workshop. 2005. p. 1-7.
-
(2005)
Digital Forensics Research Workshop
, pp. 1-7
-
-
Buchholz, F.1
Falk, C.2
-
8
-
-
10644245884
-
On the role of file system metadata in digital forensics
-
F. Buchholz, and E. Spafford On the role of file system metadata in digital forensics Digital Investigation 1 2004 298 309
-
(2004)
Digital Investigation
, vol.1
, pp. 298-309
-
-
Buchholz, F.1
Spafford, E.2
-
9
-
-
79961037207
-
-
Ex-Hacker New York Times
-
E. Bumiller Ex-Hacker Army leak suspect is turned in June 2010 New York Times http://www.nytimes.com/2010/06/08/world/08leaks.html
-
(2010)
Army Leak Suspect Is Turned in
-
-
Bumiller, E.1
-
10
-
-
33646758567
-
Using audio fingerprinting for duplicate detection and thumbnail generation
-
Burges C, Plastina D, Platt J, Renshaw E, Malvar H. Using audio fingerprinting for duplicate detection and thumbnail generation. In: Proc. acoustics, speech, and signal processing. 2005. p. 1-4.
-
(2005)
Proc. Acoustics, Speech, and Signal Processing
, pp. 1-4
-
-
Burges, C.1
Plastina, D.2
Platt, J.3
Renshaw, E.4
Malvar, H.5
-
12
-
-
0013206133
-
Collection statistics for fast duplicate document detection
-
DOI 10.1145/506309.506311
-
A. Chowdhury, O. Frieder, D. Grossman, and M.C. McCabe Collection statistics for fast duplicate document detection ACM Transactions on Information Systems 20 2002 171 191 (Pubitemid 44642301)
-
(2002)
ACM Transactions on Information Systems
, vol.20
, Issue.2
, pp. 171-191
-
-
Chowdhury, A.1
Frieder, O.2
Grossman, D.3
McCabe, M.C.4
-
17
-
-
33745191834
-
Detection of video sequences using compact signatures
-
T. Hoad, and J. Zobel Detection of video sequences using compact signatures ACM Transactions on Information Systems 24 January 2006 1 50
-
(2006)
ACM Transactions on Information Systems
, vol.24
, pp. 1-50
-
-
Hoad, T.1
Zobel, J.2
-
18
-
-
27844543023
-
Insider threat study: Computer system sabotage in critical infrastructure sectors
-
May
-
Keeney M, Kowalski E, Cappelli D, Moore A, Shimeall T, Rodgers S. Insider threat study: computer system sabotage in critical infrastructure sectors. Tech. rep., U.S. Secret Service and SEI at CMU. May 2005.
-
(2005)
Tech. Rep., U.S. Secret Service and SEI at CMU
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rodgers, S.6
-
20
-
-
52249094557
-
Identifying almost identical files using context triggered piecewise hashing
-
DOI 10.1016/j.diin.2006.06.015, PII S1742287606000764
-
J. Kornblum Identifying almost identical files using context triggered piecewise hashing Digital Investigation 3 2006 91 97 (Pubitemid 44088492)
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL.
, pp. 91-97
-
-
Kornblum, J.1
-
22
-
-
33644785939
-
Computer forensics and electronic discovery: The new management challenge
-
DOI 10.1016/j.cose.2006.01.002, PII S0167404806000186
-
V. Luoma Computer forensics and electronic discovery: the new management challenge Computers & Security 25 March 2006 91 96 (Pubitemid 43344208)
-
(2006)
Computers and Security
, vol.25
, Issue.2
, pp. 91-96
-
-
Luoma, V.M.1
-
26
-
-
68649112105
-
Computer forensic timeline visualization tool
-
J. Olsson, and M. Boldt Computer forensic timeline visualization tool Digital Investigation 6 September 2009 S78 S87
-
(2009)
Digital Investigation
, vol.6
-
-
Olsson, J.1
Boldt, M.2
-
28
-
-
77951751278
-
-
Master's thesis, Stockholm University/The Royal Institute of Technology, Stockholm. Sweden. May
-
Paintsil AB. Insider threat detection: a proactive forensic approach. Master's thesis, Stockholm University/The Royal Institute of Technology, Stockholm. Sweden. May 2007.
-
(2007)
Insider Threat Detection: A Proactive Forensic Approach
-
-
Paintsil, A.B.1
-
32
-
-
34447525132
-
Multi-resolution similarity hashing
-
DOI 10.1016/j.diin.2008.01.001, PII S1742287607000473
-
Roussev V, III, Richard G, Marziale L. Multi-resolution similarity hashing. In: Digital Forensics Research Conference (DFRWS). 2007. p. 105-113. (Pubitemid 47081445)
-
(2007)
Digital Investigation
, vol.4
, Issue.SUPPL.
, pp. 105-113
-
-
Roussev, V.1
Richard III, G.G.2
Marziale, L.3
-
35
-
-
34247356790
-
Precision and recall of five search engines for retrieval of scholarly information in the field of Biotechnology
-
S. Shafi, and R. Rather Precision and recall of five search engines for retrieval of scholarly information in the field of Biotechnology Webology 2 2 August 2005
-
(2005)
Webology
, vol.2
, Issue.2
-
-
Shafi, S.1
Rather, R.2
-
36
-
-
79961065426
-
-
Georgetown University
-
Shields C, Frieder O, Maloof M. A novel system for the proactive, continuous, and efficient collection of digital forensic evidence. Tech. Rep. CSTR-20100415-1, Georgetown University. 2010.
-
(2010)
A Novel System for the Proactive, Continuous, and Efficient Collection of Digital Forensic Evidence. Tech. Rep. CSTR-20100415-1
-
-
Shields, C.1
Frieder, O.2
Maloof, M.3
-
39
-
-
51249106649
-
Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability
-
May
-
Takahashi D, Xiao Y. Complexity analysis of retrieving knowledge from auditing log files for computer and network forensics and accountability. In: 2008 IEEE International Conference on Communications. May 2008. p. 1474-1478.
-
(2008)
2008 IEEE International Conference on Communications
, pp. 1474-1478
-
-
Takahashi, D.1
Xiao, Y.2
|