Digital Evolution: History, Challenges and Future Directions for the Digital and Multimedia Sciences Section

[1]  Simon Tjoa,et al.  Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art , 2011, 2011 Sixth International Conference on IT Security Incident Management and IT Forensics.

[2]  Hirotaka Nakasone,et al.  Variations in recorded acoustic gunshot waveforms generated by small firearms. , 2011, The Journal of the Acoustical Society of America.

[3]  Andrew Hoog Android and mobile forensics , 2011 .

[4]  Damian Schofield,et al.  Playing with evidence: Using video games in the courtroom , 2011, Entertain. Comput..

[5]  N. Daéid,et al.  Interpol's Forensic Science Review , 2010 .

[6]  Zeno Geradts,et al.  Forensic Audio and Visual Evidence , 2010 .

[7]  Bruce E. Koenig,et al.  Forensic Authentication of Digital Audio Recordings , 2009 .

[8]  Zeno J. M. H. Geradts,et al.  Source video camera identification for multiply compressed videos originating from YouTube , 2009, Digit. Investig..

[9]  R. Maher,et al.  Audio forensic examination , 2009, IEEE Signal Processing Magazine.

[10]  J.P. Campbell,et al.  Forensic speaker recognition , 2009, IEEE Signal Processing Magazine.

[11]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Bruce E. Koenig,et al.  Forensic Enhancement of Digital Audio Recordings , 2007 .

[13]  Vinton G. Cerf,et al.  A protocol for packet network intercommunication , 1974, CCRV.

[14]  Robin M. Ruefle,et al.  State of the Practice of Computer Security Incident Response Teams (CSIRTs) , 2003 .

[15]  Eyes Wide Shut: Hidden Problems and Future Consequences of the Fact-Based Validity Standard , 2003 .

[16]  S. Penrod,et al.  THE EFFECTS OF DAUBERT ON THE ADMISSIBILITY OF EXPERT TESTIMONY IN STATE AND FEDERAL CRIMINAL CASES , 2002 .

[17]  J. Cecil,et al.  Judge and Attorney Experiences, Practices, and Concerns Regarding Expert Testimony in Federal Civil Trials , 2002 .

[18]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[19]  D. Risinger Navigating Expert Reliability: are Criminal Standards of Certainty Being Left on the Dock? , 2000 .

[20]  Robert D. Keppel,et al.  Profiling Killers: A Revised Classification Model for Understanding Sexual Murder , 1999 .

[21]  Lee Garber Melissa Virus Creates a New Type of Threat , 1999, Computer.

[22]  Hirotaka Nakasone,et al.  Signal convolution of recorded free-field gunshot sounds , 1998 .

[23]  John H. Langbein The Historical Foundations of the Law of Evidence: A View from the Ryder Sources , 1996 .

[24]  Bruce E. Koenig Authentication of Forensic Audio Recordings , 1990 .

[25]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[26]  Bruce E. Koenig Enhancement of Forensic Audio Recordings , 1988 .

[27]  D. J. Sawney A way forward—with computers? , 1987 .

[28]  J. E. Starrs “A Still-Life Watercolor”: Frye v. United States , 1982 .

[29]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[30]  George C. Chase History of Mechanical Computing Machinery , 1980, Annals of the History of Computing.

[31]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[32]  Claude E. Shannon,et al.  A symbolic analysis of relay and switching circuits , 1938, Transactions of the American Institute of Electrical Engineers.

[33]  G. W. Leibniz,et al.  Die Philosophischen Schriften von Gottfried Wilhelm Leibniz , 1875 .

[34]  G. Boole An Investigation of the Laws of Thought: On which are founded the mathematical theories of logic and probabilities , 2007 .