Discovering Covert Digital Evidence

نویسندگان

  • Chet Hosmer
  • Christopher Hyde
چکیده

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive the direction of research and development.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Discovering Hidden Evidence Discovering Hidden Evidence

Discovering Hidden Evidence C. Hosmer Chet Hosmer WetStone Technologies, Inc., Cortland, New York, USA ABSTRACT Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. In addition, new information suggests that the download of an arsenal of software tools that perform these...

متن کامل

Discovering covert node in networked organization

This paper addresses a method to solve a node discovery problem in a complex network. Covert nodes which exist in a social network do not appear in the records which are observed on the communication or collaborative activities among the nodes. Discovering the covert nodes refers to identifying suspicious records in which the covert nodes would appear, or suspicious nodes which would be the nei...

متن کامل

An introduction to methods of discovering and identifying ancient sites with emphasis on evidence and geomorphologic techniques

Recognizing of position of ancient sites, it is of the great help to archaeologist. After this recognition, the archaeologist with rely on the knowledge and usual techniques in archaeology can determine the range of sites. After the discovery of this information, the archaeologist can get the information about the social, economic, livelihood and political of the past of sites. In this researc...

متن کامل

Covert Communication Techniques in the Digital World

The boom of covert communication coincides with the appearance and growth of the Internet. The rapid spread of computer networks and shift to digitization of media has created a very favourable environment for covert communication. In this paper, some Covert communication techniques have been described. Covert or secure communication includes methods such as cryptography, steganography and wate...

متن کامل

Adoption of Neural Network Approach in Steganography and Digital Watermarking for Covert Communication and Copyright Protection

Now a day, covert communication is one of the most important aspects of internet. When you want to hide the data from intruders, you can use different methods for covert communication. One of the most useful methods is steganography. Other thing in the era of internet is the copyright protection, which can be implemented effectively by digital watermarking. The performance of these methods can ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016