1 |
Kulesh Shanmugasundaram, Nasir Memon, 'Automatic Reassembly of Document Fragments Via Context Based Statistical Models,' Proceedings of the 19th Annual Computer SecurityApplications Conference (ACSAC). LasVegas, NV, USA, 2003, pp. 152-159
|
2 |
McDaniel, Hossain Heydari .M. 'Content Based File Type Detection Algorithms.' 6th Annual Hawaii International Conference on System Sciences(HICSS), Hawaii, USA, 2003, pp. 108-114
|
3 |
Binglong Li, Qingxian Wang, Junyong Luo, et al. 'Classifying model of Document Fragments and the Research' of its Key Issue J. Journal of Harbin Institute of Technology, 2006, pp. 834-839
|
4 |
Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo 'A STATII STIICAL TEST SUIlTE FOR RANDOM AND PSEUDORANDOM NUMBER GENERATORS FOR CRYPTOGRAPHIIC APPLIICATIIONS', NIST Special Publication 800-22, (with revisions dated May 15, 2001)
|
5 |
Binglong Li, Qingxian Wang, and Junyong Luo, 'Forensic Analysis of Document fragment based on SVM', 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP'06), pp.236-239
|
6 |
Oliver de Vel, 'Augmented sequence spectrum kernels for semi-structured document categorization', Proceedings of the Workshop on Text Mining and Link Analysis, 18th International Joint Conference on Artificial Intelligence (IJCAI), 2003, pp. 213-221
|
7 |
Louretta, Good Practice Guide for computer based Electronics Evidence version 3.0, Association of Chief Police Officers, 2003
|
8 |
한양대학교 자연과학연구소, 암호통신문 탐지기술 연구 및 S/W 개발, 한국 정보보호센터, 1999년 12월
|
9 |
www.guidancesoftware.com
|
10 |
D. Salomon, Data Compression - The Complete Reference - 4th edition, Spinger-Verlag, 2007
|
11 |
N. I. of Standards and Technology, Special publication 800-22: A Statistical Test Suite for Random and Pseudo-random Number Generators for Cryptographic Applications. http://scrc.nist.gov/rng /rng.pdf, 2000
|