Digital Evolution: History, Challenges and Future Directions for the Digital and Multimedia Sciences Section
暂无分享,去创建一个
Daniel J. Ryan | Zeno Geradts | Peter Stephenson | Douglas S. Lacey | Kara Nance | David W. Baker | Daniel J. Ryan | John E. Sammons | K. Nance | Z. Geradts | David W. Baker | John E. Sammons | P. Stephenson
[1] Simon Tjoa,et al. Forensics Investigations of Multimedia Data: A Review of the State-of-the-Art , 2011, 2011 Sixth International Conference on IT Security Incident Management and IT Forensics.
[2] Hirotaka Nakasone,et al. Variations in recorded acoustic gunshot waveforms generated by small firearms. , 2011, The Journal of the Acoustical Society of America.
[3] Andrew Hoog. Android and mobile forensics , 2011 .
[4] Damian Schofield,et al. Playing with evidence: Using video games in the courtroom , 2011, Entertain. Comput..
[5] N. Daéid,et al. Interpol's Forensic Science Review , 2010 .
[6] Zeno Geradts,et al. Forensic Audio and Visual Evidence , 2010 .
[7] Bruce E. Koenig,et al. Forensic Authentication of Digital Audio Recordings , 2009 .
[8] Zeno J. M. H. Geradts,et al. Source video camera identification for multiply compressed videos originating from YouTube , 2009, Digit. Investig..
[9] R. Maher,et al. Audio forensic examination , 2009, IEEE Signal Processing Magazine.
[10] J.P. Campbell,et al. Forensic speaker recognition , 2009, IEEE Signal Processing Magazine.
[11] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[12] Bruce E. Koenig,et al. Forensic Enhancement of Digital Audio Recordings , 2007 .
[13] Vinton G. Cerf,et al. A protocol for packet network intercommunication , 1974, CCRV.
[14] Robin M. Ruefle,et al. State of the Practice of Computer Security Incident Response Teams (CSIRTs) , 2003 .
[15] Eyes Wide Shut: Hidden Problems and Future Consequences of the Fact-Based Validity Standard , 2003 .
[16] S. Penrod,et al. THE EFFECTS OF DAUBERT ON THE ADMISSIBILITY OF EXPERT TESTIMONY IN STATE AND FEDERAL CRIMINAL CASES , 2002 .
[17] J. Cecil,et al. Judge and Attorney Experiences, Practices, and Concerns Regarding Expert Testimony in Federal Civil Trials , 2002 .
[18] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[19] D. Risinger. Navigating Expert Reliability: are Criminal Standards of Certainty Being Left on the Dock? , 2000 .
[20] Robert D. Keppel,et al. Profiling Killers: A Revised Classification Model for Understanding Sexual Murder , 1999 .
[21] Lee Garber. Melissa Virus Creates a New Type of Threat , 1999, Computer.
[22] Hirotaka Nakasone,et al. Signal convolution of recorded free-field gunshot sounds , 1998 .
[23] John H. Langbein. The Historical Foundations of the Law of Evidence: A View from the Ryder Sources , 1996 .
[24] Bruce E. Koenig. Authentication of Forensic Audio Recordings , 1990 .
[25] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[26] Bruce E. Koenig. Enhancement of Forensic Audio Recordings , 1988 .
[27] D. J. Sawney. A way forward—with computers? , 1987 .
[28] J. E. Starrs. “A Still-Life Watercolor”: Frye v. United States , 1982 .
[29] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[30] George C. Chase. History of Mechanical Computing Machinery , 1980, Annals of the History of Computing.
[31] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[32] Claude E. Shannon,et al. A symbolic analysis of relay and switching circuits , 1938, Transactions of the American Institute of Electrical Engineers.
[33] G. W. Leibniz,et al. Die Philosophischen Schriften von Gottfried Wilhelm Leibniz , 1875 .
[34] G. Boole. An Investigation of the Laws of Thought: On which are founded the mathematical theories of logic and probabilities , 2007 .