湿润 发表于 2025-3-30 10:24:21
http://reply.papertrans.cn/15/1479/147817/147817_51.png平 发表于 2025-3-30 13:03:34
http://reply.papertrans.cn/15/1479/147817/147817_52.pngcrucial 发表于 2025-3-30 16:39:11
Ronny Reinhardt,William J. Oliverl results demonstrate that the classification system, which uses features related to the cyber crime domain, correctly classifies 51.3 million messages. The automation can significantly reduce the manual effort and the costs involved in investigating online underground marketplaces.garrulous 发表于 2025-3-31 00:41:29
Ronny Reinhardt,William J. Oliveron rules define the seeder curve that consistently describes the number of uploaders over time. Analysis of four scenarios shows improved accuracy at detecting the first uploader and that, in situations with insufficient competition for file content, the first uploader may not be identified precisely.Enzyme 发表于 2025-3-31 02:31:54
Kwok Kuen Tsang,Dian Liu,Yanbi Hongproximate matching to locate relevant files. The experiments described in this paper used three test images of Windows XP, Windows 7 and Ubuntu 12.04 systems to evaluate fingerprint-based comparisons. The results reveal that approximate matching can improve file identification – in one case, increasing the identification rate from 1.82% to 23.76%.Delude 发表于 2025-3-31 08:58:02
https://doi.org/10.1007/978-3-642-01878-7, best practices for minimizing the false positive rate during data carving are identified. These findings are implemented in an open source forensic investigation toolkit that operates in a forensically-sound manner.Aerophagia 发表于 2025-3-31 11:07:17
Conference proceedings 2014ss communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digit主动脉 发表于 2025-3-31 15:26:58
http://reply.papertrans.cn/15/1479/147817/147817_58.png