Topic: Computer (Digital) Forensic Tools and Biometrics
暂无分享,去创建一个
[1] Seamus O. Ciardhuáin,et al. An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..
[2] Rodger Jamieson,et al. Developing a Conceptual Framework for Identity Fraud Profiling , 2008, ECIS.
[3] Shahzad Memon,et al. Fingerprint Biometric for Identity management , 2011 .
[4] Zeno J. M. H. Geradts. Forensic implications of identity systems , 2006, Datenschutz und Datensicherheit - DuD.
[5] A.C.J. Sprokkereef,et al. ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .
[6] Ali M. Al Khouri. PKI in Government Identity Management Systems , 2011 .
[7] Kavita Sharma,et al. FORENSIC COMPUTING MODELS : TECHNICAL OVERVIEW , 2012 .
[8] Anil K. Jain,et al. Biometrics of Next Generation: An Overview , 2010 .
[9] Ion Sandu,et al. THE STUDY OF DOCUMENTS COUNTERFEIT PROCEDURES BY ANALYZING THE SECURITY ELEMENTS , 2012 .
[10] T. Singleton,et al. Fraud Risk Assessment , 2011 .
[11] Andreas Uhl,et al. Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.
[12] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[13] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[14] Philip Turner,et al. Forensic data recovery and examination of magnetic swipe card cloning devices , 2007 .
[15] J. Gammack,et al. Digital Business Security Development: Management Technologies , 2010 .
[16] Hein S. Venter,et al. Towards a Digital Forensic Readiness Framework for Public Key Infrastructure systems , 2011, 2011 Information Security for South Africa.
[17] Joshua James,et al. An Assessment Model for Cybercrime Investigation Capacity , 2013, ArXiv.
[18] Nicole Beebe,et al. A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..
[19] Jan H. P. Eloff,et al. Framework for a Digital Forensic Investigation , 2006, ISSA.
[20] George W. Quinn,et al. Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .
[21] Stephen Flowerday,et al. Towards a Standardised Digital Forensic Process: E-mail Forensics , 2010, ISSA.
[22] Ankit Agarwal,et al. Systematic Digital Forensic Investigation Model , 2011 .
[23] Mark Pollitt,et al. Computer Forensics Education , 2003, IEEE Secur. Priv..
[24] Jason Bernard Thompson. Biometrics and Its Use in Forensics , 2005 .
[25] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[26] Dmitry O. Gorodnichy,et al. Multi-order biometric score analysis framework and its application to designing and evaluating biometric systems for access and border control , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[27] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[28] Vincenzo Piuri,et al. Biometric Privacy Protection: Guidelines and Technologies , 2011, ICETE.
[29] Ophir Frieder,et al. A system for the proactive, continuous, and efficient collection of digital forensic evidence , 2011, Digit. Investig..
[30] Sundresan Perumal. Digital Forensic Model Based On Malaysian Investigation Process , 2009 .
[31] G. Aguilar,et al. Multimodal biometric system using fingerprint , 2007, 2007 International Conference on Intelligent and Advanced Systems.
[32] P. Jonathon Phillips,et al. An Introduction to Evaluating Biometric Systems , 2000, Computer.
[33] Ruibin Gong,et al. Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework , 2005, Int. J. Digit. EVid..
[34] Russell G. Smith. Identification systems : a risk assessment framework , 2006 .
[35] Marijana Kosmerlj. Passport of the Future: Biometrics against Identity Theft? , 2004 .
[36] Olga Angelopoulou. ID Theft: A computer forensics' investigation framework , 2007 .
[37] Elham Rajabian Noghondar. Use of Authentication Mechanisms and Biometrics in Norwegian Industry , 2010 .
[38] Mark Maguire,et al. The birth of biometric security , 2009 .
[39] Dmitry O. Gorodnichy,et al. Evolution and evaluation of biometric systems , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[40] Lawrence A. Presley,et al. Recovering and Examining Computer Forensic Evidence , 2000 .
[41] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[42] Charles C. Tappert,et al. A Stylometry System for Authenticating Students Taking Online Tests , 2011 .
[43] Zainuddin Hassan,et al. COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .
[44] Xudong Jiang,et al. Token-Based Fingerprint Authentication , 2009 .
[45] Sebastiaan H. von Solms,et al. Modelling Live Forensic Acquisition , 2009, WDFIA.
[46] S. Felix Wu,et al. Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings , 2000 .
[47] Kim-Kwang Raymond Choo,et al. Future directions in technology-enabled crime: 2007-09 , 2008 .
[48] Mohd Faizal Abdollah,et al. Traceability in digital forensic investigation process , 2011, 2011 IEEE Conference on Open Systems.
[49] Theodore Tryfonas,et al. Online ID theft techniques, investigation and response , 2007, Int. J. Electron. Secur. Digit. Forensics.
[50] Thomas Martin,et al. Digital forensics and the issues of identity , 2010, Inf. Secur. Tech. Rep..
[51] Yongjin Wang,et al. Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.
[52] K. K. Arthur. An Investigation Into Computer Forensic Tools , 2004, ISSA.
[53] Ricci S. C. Ieong,et al. FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..
[54] Daniel Ayers,et al. A second generation computer forensic analysis system , 2009, Digit. Investig..
[55] Yoginder S. Dandass,et al. Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model , 2012, Comput. Inf. Sci..
[56] S. Mohammadi,et al. Adoption of iris-based authentication , 2008, 2008 IEEE International Conference on Industrial Engineering and Engineering Management.
[57] Sean Peisert,et al. A model of forensic analysis using goal-oriented logging , 2007 .
[58] Mark Pollitt,et al. An Ad Hoc Review of Digital Forensic Models , 2007, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07).
[59] P. Deepa Shenoy,et al. A Data Mining Approach for Data Generation and Analysis for Digital Forensic Application , 2010 .
[60] A. Anthony Irudhayaraj,et al. Biometric system , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[61] Anil K. Jain,et al. Face recognition: Some challenges in forensics , 2011, Face and Gesture 2011.
[62] Christophe Rosenberger,et al. Evaluation of Biometric Systems , 2012 .
[63] Arun Ross,et al. Multibiometric systems , 2004, CACM.
[64] Margaret L. Johnson. Biometrics and the threat to civil liberties , 2004, Computer.
[65] Mohan S. Kankanhalli,et al. Multimodal fusion for multimedia analysis: a survey , 2010, Multimedia Systems.
[66] Arun Ross,et al. Fingerprint matching using minutiae and texture features , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[67] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[68] Venansius Baryamureeba,et al. The Enhanced Digital Investigation Process Model , 2004 .
[69] David Zhang,et al. A study of identical twins' palmprints for personal verification , 2006, Pattern Recognit..
[70] Zeno J. M. H. Geradts,et al. Extracting forensic evidence from biometric devices , 2003, SPIE Defense + Commercial Sensing.