Completing the Picture Fragments and Back Again
暂无分享,去创建一个
[1] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[2] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[3] Jan Lukás,et al. Determining digital image origin using sensor imperfections , 2005, IS&T/SPIE Electronic Imaging.
[4] Nasir D. Memon,et al. Nabs: a system for detecting resource abuses via characterization of flow content type , 2004, 20th Annual Computer Security Applications Conference.
[5] Mohammad Hossain Heydari,et al. Content based file type detection algorithms , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[6] Simson L. Garfinkel,et al. Carving contiguous and fragmented files with fast object validation , 2007, Digit. Investig..
[7] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[8] Michael I. Cohen. Advanced carving techniques , 2007, Digit. Investig..
[9] N. Shahmehri,et al. File Type Identification of Data Fragments by Their Binary Structure , 2006, 2006 IEEE Information Assurance Workshop.
[10] Nasir D. Memon,et al. Automated reassembly of file fragmented images using greedy algorithms , 2006, IEEE Transactions on Image Processing.
[11] Nasir Memon,et al. Automatic Reassembly of Document Fragments via Data Compression , 2002 .
[12] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[13] Salvatore J. Stolfo,et al. A Study of Malcode-Bearing Documents , 2007, DIMVA.
[14] Nasir D. Memon,et al. Automated reassembly of fragmented images , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[15] Nahid Shahmehri,et al. Oscar — Using Byte Pairs to Find File Type and Camera Make of Data Fragments , 2007 .
[16] Nahid Shahmehri,et al. Oscar - File Type and Camera Identification Using the Structure of Binary Data Fragments , 2006 .
[17] Nahid Shahmehri,et al. Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages , 2006, SEC.
[18] Keith Marzullo,et al. Second International Workshop on Systematic Approaches to Digital Forensic Engineering , 2007 .
[19] R. Wortley,et al. Child pornography on the Internet , 2006 .
[20] Salvatore J. Stolfo,et al. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack , 2006, RAID.
[21] L. Råde,et al. Mathematics handbook for science and engineering , 1995 .
[22] Cor J. Veenman. Statistical Disk Cluster Classification for File Carving , 2007, Third International Symposium on Information Assurance and Security.
[23] Matthew M. Shannon. Forensic Relative Strength Scoring: ASCII and Entropy Scoring , 2004, Int. J. Digit. EVid..
[24] Jon Callas,et al. OpenPGP Message Format , 1998, RFC.
[25] Mark John Taylor,et al. FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints , 2007, SEC.
[26] Ke Wang,et al. Fileprints: identifying file types by n-gram analysis , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[27] Brian D. Carrier,et al. File System Forensic Analysis , 2005 .
[28] Golden G. Richard,et al. Scalpel: A Frugal, High Performance File Carver , 2005, DFRWS.
[29] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[30] M Damashek,et al. Gauging Similarity with n-Grams: Language-Independent Categorization of Text , 1995, Science.
[31] Jan Lukás,et al. Digital "bullet scratches" for images , 2005, IEEE International Conference on Image Processing 2005.
[32] Salvatore J. Stolfo,et al. SPARSE: A Hybrid System to Detect Malcode-Bearing Documents , 2008 .
[33] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[34] Nasir D. Memon,et al. Automatic reassembly of document fragments via context based statistical models , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[35] Robert F. Erbacher,et al. Identification and Localization of Data Types within Large-Scale File Systems , 2007, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07).
[36] Gregory A. Hall,et al. Sliding Window Measurement for File Type Identification , 2007 .
[37] Michaela Poremská,et al. Child Pornography on the Internet in , 2009 .
[38] Golden G. Richard,et al. In-Place File Carving , 2007, IFIP Int. Conf. Digital Forensics.
[39] Peter Deutsch,et al. DEFLATE Compressed Data Format Specification version 1.3 , 1996, RFC.