2017
DOI: 10.1016/j.forsciint.2017.01.010
|View full text |Cite
|
Sign up to set email alerts
|

Blind source computer device identification from recorded VoIP calls for forensic investigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The main disadvantage is the need to be familiar with the details of the attack in advance, especially relying on the key information of the attack. (2) In the aspect of electronic evidence analysis in dynamic environment [11][12][13][14], it is based on the research results of electronic evidence analysis technology in static environment, adding time factor to study. Literature [11] aimed at the increasing number of data and equipment to be analyzed in electronic forensics cases, taking time parameters as data correlation factors, and proposed an automatic clustering algorithm based on self-organizing maps, which reduced the influences of noise data on forensics algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…The main disadvantage is the need to be familiar with the details of the attack in advance, especially relying on the key information of the attack. (2) In the aspect of electronic evidence analysis in dynamic environment [11][12][13][14], it is based on the research results of electronic evidence analysis technology in static environment, adding time factor to study. Literature [11] aimed at the increasing number of data and equipment to be analyzed in electronic forensics cases, taking time parameters as data correlation factors, and proposed an automatic clustering algorithm based on self-organizing maps, which reduced the influences of noise data on forensics algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Aggarwal et al [14] proposed an MFCC feature extraction from an estimated noisy region of the speech. Jahanirad et al [4,15] investigated the use of entropy of Mel-cepstrum coefficients from near-silent segments. Anshan et al [16] used device self-noise estimated from the silent segments.…”
Section: Introductionmentioning
confidence: 99%