default search action
Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010
- Chang-Tsun Li:
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions. IGI Global 2010, ISBN 9781605668369 - Patrizio Campisi, Emanuele Maiorana, Alessandro Neri:
Privacy Enhancing Technologies in Biometrics. 1-22 - Gian Luca Marcialis, Fabio Roli, Pietro Coli, Giovanni Delogu:
A Fingerprint Forensic Tool for Criminal Investigations. 23-52 - Tim Rawlinson, Abhir Bhalerao, Li Wang:
Principles and Methods for Face Recognition and Face Modelling. 53-78 - Pawel T. Puslecki:
Biometrical Processing of Faces in Security and Forensics. 79-103 - Matthew Sorell:
Digital Camera Photographic Provenance. 104-129 - Roberto Caldelli, Irene Amerini, Francesco Picchioni, Alessia De Rosa, Francesca Uccheddu:
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication. 130-154 - Stefan Katzenbeisser, Huajian Liu, Martin Steinebach:
Challenges and Solutions in Multimedia Document Authentication. 155-175 - Xi Zhao, Anthony T. S. Ho:
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications. 176-203 - Hong Cai, Sos S. Agaian:
A Novel Multilevel DCT Based Reversible Data Hiding. 204-233 - Lodovico Marziale, Santhi Movva, Golden G. Richard III, Vassil Roussev, Loren Schwiebert:
Massively Threaded Digital Forensics Tools. 234-256 - Lynn Margaret Batten, Lei Pan:
Testing Digital Forensic Software Tools Used in Expert Testimony. 257-278 - Michael I. Cohen:
Network Forensics. 279-306 - Bo Zhou, Qi Shi, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. 307-333 - Xiaoling Chen, Rohan D. W. Perera, Ziqian Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Deception Detection on the Internet. 334-354 - Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law:
Forensic Investigation of Peer-to-Peer Networks. 355-378 - Thomas M. Chen:
Identity Theft through the Web. 379-395 - Antonio Savoldi, Paolo Gubian:
Embedded Forensics. 396-423 - Cosimo Anglano:
Forensic Implications of Virtualization Technologies. 424-446 - Gian Piero Zarri:
Conceptual Tools for Dealing with 'Narrative' Terrorism Information. 447-469 - Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos:
Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process. 470-495 - Adel Elmaghraby, Deborah W. Keeling, Michael Losavio:
Legal Issues for Research and Practice in Computational Forensics. 496-515 - Christopher A. Canning, Baoying Wang:
Trends in Information Security Regulation. 516-528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.