FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints
-
Published:2007
Issue:
Volume:
Page:1-12
-
ISSN:1571-5736
-
Container-title:New Approaches for Security, Privacy and Trust in Complex Environments
-
language:
-
Short-container-title:
Author:
Haggerty John,Taylor Mark
Reference13 articles.
1. Li, X. & Seberry, J., “Forensic Computing”, Proceedings of INDOCRYPT, New Delhi, India, 8-10 Dec 2003, LNCS 2904, Springer, 2003, pp. 18–35. 2. Mohay, G., Anderson, A., Collie, B., De Vel, O. & McKemmish, R., Computer and Intrusion Forensics, Artech House, MA, USA, 2003. 3. Chen, H., Chung, W., Xu, J.L., Wang, G., Qin, Y. & Chau, M., “Crime Data Mining: A General Framework and Some Examples”, Computer, April 2004, pp. 50–56. 4. Burr, W.E., “Cryptographic Hash Standards Where Do We Go from Here?”, IEEE Security and Privacy, March/April, 2006, pp. 88–91. 5. The Forensics Toolkit, available from http://www.accessdata.com , accessed October 2006.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Pypette;International Journal of Digital Crime and Forensics;2012-10 2. Signature Based Detection of User Events for Post-mortem Forensic Analysis;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2011 3. Detection and Recognition of File Masquerading for E-mail and Data Security;Recent Trends in Network Security and Applications;2010 4. Pypette;Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security
|
|