Build a Digital Evidence Map considered Log-Chain

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

Design of Log-Map / Max-Log-Map Decoder

The process of turbo-code decoding starts with the formation of a posteriori probabilities (APPs) for each data bit, which is followed by choosing the data-bit value that corresponds to the maximum a posteriori (MAP) probability for that data bit. Upon reception of a corrupted code-bit sequence, the process of decision making with APPs allows the MAP algorithm to determine the most likely infor...

متن کامل

Graphic Rendering Considered as a Compilation Chain

Graphical rendering must be fast enough so as to avoid hindering the user perception/action loop. Traditionally, programmers interleave descriptions and optimizations to achieve such performances, thus compromising modularity. In this paper, we consider graphic rendering as a compilation chain: we designed a static and dynamic graphical compiler that enables a designer to clearly separate the d...

متن کامل

Sufficiency of Windows Event log as Evidence in Digital Forensics2

The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows operating system, such as the Registry, slack space and the Windo...

متن کامل

The Decision Reliability of MAP, Log-MAP, Max-Log-MAP and SOVA Algorithms for Turbo Codes

In this paper, we study the reliability of decisions of e Codes, Channel Reliability, e N comm llular, satellite and we also consider two improved versions, named Log-MAP two different or identical Recursi s, connected in p Fig. 1. The turbo encoder with rate 1/3. The first encoder operat ed b e u, i ond encoder p Lucian Andrei Perişoară, and Rodica Stoian th MAP, Log-MAP, Max-Log-MAP and SOVA ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology

سال: 2014

ISSN: 1598-3986

DOI: 10.13089/jkiisc.2014.24.3.523