-
2
-
-
33746191665
-
Identifying almost identical files using context triggered piecewise hashing
-
Kornblum, J.: Identifying almost identical files using context triggered piecewise hashing. In: Digital Forensic Research Workshop (DFRWS), vol. 3S, pp. 91–97 (2006)
-
(2006)
Digital Forensic Research Workshop (DFRWS)
, vol.3S
, pp. 91-97
-
-
Kornblum, J.1
-
3
-
-
78651093858
-
Data fingerprinting with similarity digests
-
Chow, K.-P., Shenoi, S. (eds.), Springer, Heidelberg
-
Roussev, V.: Data fingerprinting with similarity digests. In: Chow, K.-P., Shenoi, S. (eds.) Advances in Digital Forensics VI. IFIP AICT, vol. 337, pp. 207–226. Springer, Heidelberg (2010)
-
(2010)
Advances in Digital Forensics VI. IFIP AICT
, vol.337
, pp. 207-226
-
-
Roussev, V.1
-
5
-
-
34447525132
-
Multi-resolution similarity hashing
-
Roussev, V., Richard, G.G., Marziale, L.: Multi-resolution similarity hashing. In: Digital Forensic Research Workshop (DFRWS), pp. 105–113 (2007)
-
(2007)
Digital Forensic Research Workshop (DFRWS)
, pp. 105-113
-
-
Roussev, V.1
Richard, G.G.2
Marziale, L.3
-
7
-
-
84881301156
-
-
Tridgell, A.: Spamsum. Readme (2002), http://samba.org/ftp/unpacked/junkcode/spamsum/README
-
(2002)
Spamsum
-
-
Tridgell, A.1
-
9
-
-
80655148030
-
Detecting Similar Files Based on Hash and Statistical Analysis for Digital Forensic Investigation
-
Seo, K., Lim, K., Choi, J., Chang, K., Lee, S.: Detecting Similar Files Based on Hash and Statistical Analysis for Digital Forensic Investigation. In: Computer Science and its Applications (CSA 2009), pp. 1–6 (December 2009)
-
(2009)
Computer Science and Its Applications (CSA 2009
, pp. 1-6
-
-
Seo, K.1
Lim, K.2
Choi, J.3
Chang, K.4
Lee, S.5
-
10
-
-
84873978753
-
Performance Issues About Context-Triggered Piecewise Hashing
-
Gladyshev, P., Rogers, M.K. (eds.), Springer, Heidelberg
-
Breitinger, F., Baier, H.: Performance Issues About Context-Triggered Piecewise Hashing. In: Gladyshev, P., Rogers, M.K. (eds.) ICDF2C 2011. LNICST, vol. 88, pp. 141–155. Springer, Heidelberg (2012)
-
(2012)
ICDF2C 2011. LNICST
, vol.88
, pp. 141-155
-
-
Breitinger, F.1
Baier, H.2
-
12
-
-
84870646838
-
-
Master’s thesis, Hochschule Darmstadt (February
-
Breitinger, F.: Security Aspects of Fuzzy Hashing. Master’s thesis, Hochschule Darmstadt (February 2011), https://www.dasec.h-da.de/offerings/theses/
-
(2011)
Security Aspects of Fuzzy Hashing
-
-
Breitinger, F.1
-
13
-
-
78650760396
-
Building a Better Similarity Trap with Statistically Improbable Features
-
Roussev, V.: Building a Better Similarity Trap with Statistically Improbable Features. In: 42nd Hawaii International Conference on System Sciences, pp. 1–10 (2009)
-
(2009)
42Nd Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Roussev, V.1
-
15
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 422–426 (1970)
-
(1970)
Communications of the ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
16
-
-
79961043514
-
An evaluation of forensic similarity hashes
-
Roussev, V.: An evaluation of forensic similarity hashes. In: Digital Forensic Research Workshop, vol. 8, pp. 34–41 (2011)
-
(2011)
In: Digital Forensic Research Workshop
, vol.8
, pp. 34-41
-
-
Roussev, V.1
|