Topic: Computer (Digital) Forensic Tools and Biometrics

[1]  Seamus O. Ciardhuáin,et al.  An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..

[2]  Rodger Jamieson,et al.  Developing a Conceptual Framework for Identity Fraud Profiling , 2008, ECIS.

[3]  Shahzad Memon,et al.  Fingerprint Biometric for Identity management , 2011 .

[4]  Zeno J. M. H. Geradts Forensic implications of identity systems , 2006, Datenschutz und Datensicherheit - DuD.

[5]  A.C.J. Sprokkereef,et al.  ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .

[6]  Ali M. Al Khouri PKI in Government Identity Management Systems , 2011 .

[7]  Kavita Sharma,et al.  FORENSIC COMPUTING MODELS : TECHNICAL OVERVIEW , 2012 .

[8]  Anil K. Jain,et al.  Biometrics of Next Generation: An Overview , 2010 .

[9]  Ion Sandu,et al.  THE STUDY OF DOCUMENTS COUNTERFEIT PROCEDURES BY ANALYZING THE SECURITY ELEMENTS , 2012 .

[10]  T. Singleton,et al.  Fraud Risk Assessment , 2011 .

[11]  Andreas Uhl,et al.  Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.

[12]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[14]  Philip Turner,et al.  Forensic data recovery and examination of magnetic swipe card cloning devices , 2007 .

[15]  J. Gammack,et al.  Digital Business Security Development: Management Technologies , 2010 .

[16]  Hein S. Venter,et al.  Towards a Digital Forensic Readiness Framework for Public Key Infrastructure systems , 2011, 2011 Information Security for South Africa.

[17]  Joshua James,et al.  An Assessment Model for Cybercrime Investigation Capacity , 2013, ArXiv.

[18]  Nicole Beebe,et al.  A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..

[19]  Jan H. P. Eloff,et al.  Framework for a Digital Forensic Investigation , 2006, ISSA.

[20]  George W. Quinn,et al.  Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .

[21]  Stephen Flowerday,et al.  Towards a Standardised Digital Forensic Process: E-mail Forensics , 2010, ISSA.

[22]  Ankit Agarwal,et al.  Systematic Digital Forensic Investigation Model , 2011 .

[23]  Mark Pollitt,et al.  Computer Forensics Education , 2003, IEEE Secur. Priv..

[24]  Jason Bernard Thompson Biometrics and Its Use in Forensics , 2005 .

[25]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[26]  Dmitry O. Gorodnichy,et al.  Multi-order biometric score analysis framework and its application to designing and evaluating biometric systems for access and border control , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[27]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[28]  Vincenzo Piuri,et al.  Biometric Privacy Protection: Guidelines and Technologies , 2011, ICETE.

[29]  Ophir Frieder,et al.  A system for the proactive, continuous, and efficient collection of digital forensic evidence , 2011, Digit. Investig..

[30]  Sundresan Perumal Digital Forensic Model Based On Malaysian Investigation Process , 2009 .

[31]  G. Aguilar,et al.  Multimodal biometric system using fingerprint , 2007, 2007 International Conference on Intelligent and Advanced Systems.

[32]  P. Jonathon Phillips,et al.  An Introduction to Evaluating Biometric Systems , 2000, Computer.

[33]  Ruibin Gong,et al.  Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework , 2005, Int. J. Digit. EVid..

[34]  Russell G. Smith Identification systems : a risk assessment framework , 2006 .

[35]  Marijana Kosmerlj Passport of the Future: Biometrics against Identity Theft? , 2004 .

[36]  Olga Angelopoulou ID Theft: A computer forensics' investigation framework , 2007 .

[37]  Elham Rajabian Noghondar Use of Authentication Mechanisms and Biometrics in Norwegian Industry , 2010 .

[38]  Mark Maguire,et al.  The birth of biometric security , 2009 .

[39]  Dmitry O. Gorodnichy,et al.  Evolution and evaluation of biometric systems , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[40]  Lawrence A. Presley,et al.  Recovering and Examining Computer Forensic Evidence , 2000 .

[41]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[42]  Charles C. Tappert,et al.  A Stylometry System for Authenticating Students Taking Online Tests , 2011 .

[43]  Zainuddin Hassan,et al.  COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .

[44]  Xudong Jiang,et al.  Token-Based Fingerprint Authentication , 2009 .

[45]  Sebastiaan H. von Solms,et al.  Modelling Live Forensic Acquisition , 2009, WDFIA.

[46]  S. Felix Wu,et al.  Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings , 2000 .

[47]  Kim-Kwang Raymond Choo,et al.  Future directions in technology-enabled crime: 2007-09 , 2008 .

[48]  Mohd Faizal Abdollah,et al.  Traceability in digital forensic investigation process , 2011, 2011 IEEE Conference on Open Systems.

[49]  Theodore Tryfonas,et al.  Online ID theft techniques, investigation and response , 2007, Int. J. Electron. Secur. Digit. Forensics.

[50]  Thomas Martin,et al.  Digital forensics and the issues of identity , 2010, Inf. Secur. Tech. Rep..

[51]  Yongjin Wang,et al.  Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.

[52]  K. K. Arthur An Investigation Into Computer Forensic Tools , 2004, ISSA.

[53]  Ricci S. C. Ieong,et al.  FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..

[54]  Daniel Ayers,et al.  A second generation computer forensic analysis system , 2009, Digit. Investig..

[55]  Yoginder S. Dandass,et al.  Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model , 2012, Comput. Inf. Sci..

[56]  S. Mohammadi,et al.  Adoption of iris-based authentication , 2008, 2008 IEEE International Conference on Industrial Engineering and Engineering Management.

[57]  Sean Peisert,et al.  A model of forensic analysis using goal-oriented logging , 2007 .

[58]  Mark Pollitt,et al.  An Ad Hoc Review of Digital Forensic Models , 2007, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07).

[59]  P. Deepa Shenoy,et al.  A Data Mining Approach for Data Generation and Analysis for Digital Forensic Application , 2010 .

[60]  A. Anthony Irudhayaraj,et al.  Biometric system , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[61]  Anil K. Jain,et al.  Face recognition: Some challenges in forensics , 2011, Face and Gesture 2011.

[62]  Christophe Rosenberger,et al.  Evaluation of Biometric Systems , 2012 .

[63]  Arun Ross,et al.  Multibiometric systems , 2004, CACM.

[64]  Margaret L. Johnson Biometrics and the threat to civil liberties , 2004, Computer.

[65]  Mohan S. Kankanhalli,et al.  Multimodal fusion for multimedia analysis: a survey , 2010, Multimedia Systems.

[66]  Arun Ross,et al.  Fingerprint matching using minutiae and texture features , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[67]  Eugene H. Spafford,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[68]  Venansius Baryamureeba,et al.  The Enhanced Digital Investigation Process Model , 2004 .

[69]  David Zhang,et al.  A study of identical twins' palmprints for personal verification , 2006, Pattern Recognit..

[70]  Zeno J. M. H. Geradts,et al.  Extracting forensic evidence from biometric devices , 2003, SPIE Defense + Commercial Sensing.