搜索资源列表
Wireshark Network Analysis
- 介绍了网络分析的基础知识和原理,wireshark工具的使用以及网络包分析的方法。 Chapter 1: The World of Network Analysis Chapter 2: Introduction to Wireshark Chapter 3: Capture Traffic Chapter 4: Create and Apply Capture Filters Chapter 5: Define Glob
NingBo-Univeristy
- 权威人士对数字图像取证方面的讲解,很系统很全面,同时附有较好的参考文献,供大家学习~-The authority of digital image forensics explanation, a system is very comprehensive, accompanied with a better reference, for them to learn
cmfd_framework
- OPENCV下编写的数字取证平台,算法很多很全,请参照论文"An Evaluation of Popular Copy-Move Forgery Detection Approaches" Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, Elli Angelopoulou. In: IEEE Transactions on Information
Android-forensics
- android forensic file pdf version
forensics.tools.cybersecurity.pdf.tar
- cybersecurtiy handbook for forensic analyse
s300.nasm
- Optical router, VoIP setup, SAN, IP based printer, Camera,Two server class of machines (64 bit) , NS3, Fire Sensors Tools : CAINE 5.0 (Computer Aided Investigative Environment) or latest 64 bit version or equivalen
forensics
- Frensic Research Guide
NMF-NMF-SQ-Hashing
- 通过强大和安全的形象散列 非负矩阵因式分解,在信息取证与安全,376-390,2007年IEEE交易。NMF-NMF-SQ哈希- V. Monga, and M. K. Mihcak, Robust and secure image hashing via non-negative matrix factorizations, IEEE Transactions on Information Forensics and Sec
ImageForensics-master
- source code for image forensics
WinHex-v17.9-SR-2
- WinHex - is a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security. An advanced tool for everyday and emergency use: inspect and
WinHex-17.9-(RainbowSky.ru)
- WinHex is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security.
Extracting-the-Deleted-SMS
- 本文介绍了对Android 手机物理内存镜像进行关键字搜索获取删除短信数据的案件检验实例。本案中嫌 疑人已对涉案手机进行了数据删除操作,现有手机取证工具只能获取部分删除短信数据。但通过获取该手机物 理存储镜像,并结合案情选定关键词对镜像进行关键字搜索,最终提取到了与案件相关的删除短信数据,为 Android 手机检验中删除短信检验提供了一种新的方法。-This paper introduces a digital foren
CameraFingerprint_1.0
- 利用PRNU的图像指纹识别算法,可用于进行图像认证,来源辨别等。主要用于数字图像取证方面。-PRNU image use fingerprint recognition algorithm, can be used for image authentication, and other sources to identify. Mainly used for digital image forensics.
Camera-fingerprint
- 用photo response non uniformity PRNU算法提取Camera Fingerprint的全部文献,用于做图像以及视频取证, 反取证的科研工作者一起交流学习 -uniformity PRNU algorithms to extract all the literature Camera Fingerprint with photo response non, used to make images and vi
JPEG_AntiForensic
- 【论文源代码】M. C. Stamm and K. J. R. Liu, Anti-Forensics of Digital Image Compression , IEEE Trans. on Information Forensics and Security, vol. 6, no. 3, pp. 1050 - 1065, Sep. 2011.-This code was written by Matthew C. Stamm a
sea---Xufeng-Lin
- 【论文源代码】Xufeng Lin and Chang-Tsun Li, Preprocessing Reference Sensor Pattern Noise via Spectrum Equalization, IEEE Transactions on Information Forensics and Security, vol.11, no.1, pp.126-140, Jan. 2016-Sorce Code for the
illum_maps
- 论文源代码 :[2013TIFS] Exposing digital image forgeries by illumination color classification-Some notes on A) Compilation B) Execution of the code C) Parameters D) General remarks on our work in color constancy and im
kali工具集部分翻译
- kali linux工具集翻译,包括漏洞分析,数据库攻击,密码攻击,逆向工程,数字取证。(Kali Linux tool set translation, including vulnerability analysis, database attacks, password attacks, reverse engineering, digital forensics.)
4. Information Forensics & Security
- Base Papers for Network Security
sift-master
- SIFT具有比其他大多数grep选择略有不同的焦点。代码搜索、日志搜索/数字取证和数据处理是主要用例,但主要目标是提供安全的默认值,并使其易于为特定的用例配置。(sift has a slightly different focus than most other grep alternatives. Code search, log search / digital forensics and data processing are