Towards Active Linguistic Authentication (Englisch)
Freier Zugriff
- Neue Suche nach: Juola, Patrick
- Neue Suche nach: Noecker, John Jr.
- Neue Suche nach: Stolerman, Ariel
- Neue Suche nach: Ryan, Michael
- Neue Suche nach: Brennan, Patrick
- Neue Suche nach: Greenstadt, Rachel
- Neue Suche nach: Juola, Patrick
- Neue Suche nach: Noecker, John Jr.
- Neue Suche nach: Stolerman, Ariel
- Neue Suche nach: Ryan, Michael
- Neue Suche nach: Brennan, Patrick
- Neue Suche nach: Greenstadt, Rachel
In:
Advances in Digital Forensics IX
8
;
385-398
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Towards Active Linguistic Authentication
-
Beteiligte:Juola, Patrick ( Autor:in ) / Noecker, John Jr. ( Autor:in ) / Stolerman, Ariel ( Autor:in ) / Ryan, Michael ( Autor:in ) / Brennan, Patrick ( Autor:in ) / Greenstadt, Rachel ( Autor:in )
-
Erschienen in:Advances in Digital Forensics IX , 8 ; 385-398IFIP Advances in Information and Communication Technology ; 410, 8 ; 385-398
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
History, Historiography and the Hermeneutics of the Hard DrivePollitt, Mark et al. | 2013
- 19
-
Protecting Third Party Privacy in Digital Forensic InvestigationsStaden, Wynand et al. | 2013
- 33
-
On the Scientific Maturity of Digital Forensics ResearchOlivier, Martin / Gruner, Stefan et al. | 2013
- 53
-
Cognitive Approaches for Digital Forensic Readiness PlanningPooe, Antonio / Labuschagne, Les et al. | 2013
- 67
-
A Harmonized Process Model for Digital Forensic Investigation ReadinessValjarevic, Aleksandar / Venter, Hein et al. | 2013
- 83
-
Evaluation of the Semi-automated Crime-Specific Digital Triage Process ModelCantrell, Gary / Dampier, David et al. | 2013
- 101
-
Reducing the Time Required for Hashing OperationsBreitinger, Frank / Petrov, Kaloyan et al. | 2013
- 119
-
Hash-Based File Content Identification Using Distributed SystemsYannikos, York / Schluessler, Jonathan / Steinebach, Martin / Winter, Christian / Graffi, Kalman et al. | 2013
- 135
-
Creating Super Timelines in Windows InvestigationsEsposito, Stephen / Peterson, Gilbert et al. | 2013
- 145
-
Log File Analysis with Context-Free GrammarsBosman, Gregory / Gruner, Stefan et al. | 2013
- 153
-
Using a Goal-Driven Approach in the Investigation of a Questioned ContractBlackwell, Clive / Islam, Shareeful / Aziz, Benjamin et al. | 2013
- 171
-
File Fragment Analysis Using Normalized Compression DistanceAxelsson, Stefan / Bajwa, Kamran Ali / Srikanth, Mandhapati Venkata et al. | 2013
- 183
-
Quantifying Windows File Slack Size and StabilityMulazzani, Martin / Neuner, Sebastian / Kieseberg, Peter / Huber, Markus / Schrittwieser, Sebastian / Weippl, Edgar et al. | 2013
- 195
-
Automating Video File Carving and Content IdentificationYannikos, York / Ashraf, Nadeem / Steinebach, Martin / Winter, Christian et al. | 2013
- 213
-
Data Recovery from Proprietary Formatted Cctv Hard DisksAriffin, Aswami / Slay, Jill / Choo, Kim-Kwang et al. | 2013
- 227
-
Creating Integrated Evidence Graphs for Network ForensicsLiu, Changwei / Singhal, Anoop / Wijesekera, Duminda et al. | 2013
- 243
-
A Generic Bayesian Belief Model for Similar Cyber CrimesTse, Hayson / Chow, Kam-Pui / Kwan, Michael et al. | 2013
- 257
-
An Empirical Study Profiling Internet PiratesLai, Pierre / Chow, Kam-Pui / Fan, Xiao-Xi / Chan, Vivien et al. | 2013
- 273
-
Real-Time Covert Timing Channel Detection in Networked Virtual EnvironmentsLiu, Anyi / Chen, Jim / Wechsler, Harry et al. | 2013
- 291
-
Impact of Cloud Computing on Digital Forensic InvestigationsO’Shaughnessy, Stephen / Keane, Anthony et al. | 2013
- 305
-
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud EnvironmentsAhmed, Irfan / Zoranic, Aleksandar / Javaid, Salman / Richard, Golden III / Roussev, Vassil et al. | 2013
- 331
-
Comparison of the Data Recovery Function of Forensic ToolsBuchanan-Wollaston, Joe / Storer, Tim / Glisson, William et al. | 2013
- 349
-
Security Analysis and Decryption of Filevault 2Choudary, Omar / Grobert, Felix / Metz, Joachim et al. | 2013
- 367
-
Detecting Counterfeit Currency and Identifying Its SourceSarkar, Ankit / Verma, Robin / Gupta, Gaurav et al. | 2013
- 385
-
Towards Active Linguistic AuthenticationJuola, Patrick / Noecker, John Jr. / Stolerman, Ariel / Ryan, Michael / Brennan, Patrick / Greenstadt, Rachel et al. | 2013