71 resources related to Forensics
- Conferences related to Forensics
- Xplore Articles related to Forensics
- Jobs related to Forensics
- Educational Resources on Forensics
- Standards related to Forensics
2014 IEEE Statistical Signal Processing Workshop (SSP)
The IEEE Statistical Signal Processing Workshop is a unique meeting that brings members of the IEEE Signal Processing Society together with researchers from allied fields such as bioinformatics, communication, and statistics. The scope of the workshop includes basic theory, methods and algorithms, and applications.
2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)
Today new technologies and new applications will not be widely adopted until it can be demonstrated that the security of the underlying ICT infrastructure and the privacy of information being processed are both protected. Only then will users trust and therefore use these innovations and then, and only then, will the developers and society as a whole reap the benefits of the innovation. Without breakthroughs in Privacy, Security and Trust (PST) technology the "bad guys" will continue to thwart our best e
2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP)
Multimedia communication and networking Multimodal signal processing Multimedia security and content protection Quality Assessment Multimedia databases and digital libraries
2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)
The conference covers theory, design and application of computer networks and distributed computing and information systems.
2013 IEEE International Conference on Multimedia and Expo (ICME)
To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.
Lin Chen; Zhitang Li; Cuixia Gao; Yingshu Liu Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on, 2009
As an important part of computer forensics, network forensics particularly places emphasis on dynamic network information collection and proactive defense. Most forensics systems based on intrusion detection or honeypot rarely emphasize the availability of actual servers. In addition, few of them discussed the occasion of dynamic forensics particularly. The work presented in this paper is based on an idea to ...
Liang Zhou; Han-Chieh Chao; Vasilakos, A.V. Selected Areas in Communications, IEEE Journal on, 2011
High quality multimedia forensics service is increasingly critical for delay- sensitive applications over heterogeneous networks. Up to now, it is a challenging problem, where the demand for less forensics overhead, higher authentication level and smaller transmission delay needs to be reconciled with the limited and often dynamic network resources. Traditional multimedia forensics mechanisms, however, either overlook the available network resource ...
Sibiya, G.; Venter, H.S.; Ngobeni, S.; Fogwill, T. Information Security for South Africa (ISSA), 2012, 2012
Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud can span across numerous countries. Its distributed nature and virtualisation introduces digital forensic research issues that include among others difficulty in identifying and collecting forensically ...
Hong Su Broadband Network and Multimedia Technology (IC-BNMT), 2010 3rd IEEE International Conference on, 2010
The innovations of computer forensics technology need to meet the large-scale, distributed development requirements of invasion technology. By comparing the existing domestic and international forensics models, combines the advantages of multiple forensics models and adds new computer technology, a distributed computer dynamic forensics system based on agent technology is designed. The forensics system combines the multiple benefits of agent technology, ...
Sabeil, E.; Manaf, A.B.A.; Ismail, Z.; Sarkan, H.M. e-Learning and e-Technologies in Education (ICEEE), 2012 International Conference on, 2012
The nature of Digital Forensics Investigations is complex, which requires multidisciplinary skills, knowledge and abilities. As a result of the Digital Forensics Investigations and its training/education are relatively new, the world lacks of Digital Forensics Investigation workforces. Thus, this paper focuses on Digital Forensics training/education programs Quality Assurance and Accreditation. Quantitative research method was used. An average of 83.54 percent ...
Jr Electrical Engineer - Top Secret - Req. # : 10354 American Systems
Facilities Electrical Engineering Team Lead URS Corporation
Princ Cyber Vulnerability Researcher (FL) Raytheon
Cyber Trailblazer (Rev Eng/VR SME) Raytheon
Electrical Engineer Shaw Industries Inc
Senior All-Source/Electrical Engineer Analyst Job Leidos
All-Source/Electrical Engineer Analyst Job Leidos
Memon, Nasir Digital Image Forensics, 2011
This tutorial will cover collecting image evidence as well as searching and sorting evidence. We will also review attributing images to their sources and authenticating them. Sources of images include devices such as cameras or computers. Image authentication involves asking whether an image has been tampered with or manipulated.
Weiss, Joseph Cyber Security of Industrial Control Systems (ICS), 2009
This course will begin with an introduction to industrial control systems (SCADA, DCS, PLC, RTU, IED, field devices, meters, etc) and will explain what makes control systems different than business IT. Potential mitigation approaches including policies and technologies will be discussed. Example control system cyber events and their ramifications will be presented. Finally, current industry and government activities to secure ...
No standards are currently tagged "Forensics"
Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.
IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...
All telecommunications, including telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space, and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; communication theory; and wireless communications.