Filtered By
AnalysisX
Category [filter]
2X
Spy Files Release Volume [filter]
Results
61 Total
1.0

Anatomy of a Social Network: Finding Hidden Connections and True Influencers in Target Data

Document

Anatomy of a Social Network Finding Hidden Connections and True Influencers in Target Data ©2011 Ntrepid Corporation. All rights reserved. PROPRIETARY Analytics Data Collect, Curate, and Index ...
1.0

Speech intelligence for security and defense (getting state-of-the-art speech recognition research from university lab to the real world)

Document

Speech intelligence for security and defense (getting state-of-the-art speech recognition research from university lab to the real world) Pavel Mat!"ka% 'e)r Sc-.ar/ an1 2an 34on/a6 7ernock8 Phonex...
1.0

Layer 7 Identity Mangement for Lawful Interception

Document

ixDPI Information eXtraction through Deep Packet Inspection Layer 7 Identity Management for Lawful Interception Patrick Paul, VP Operation & Product Management, Qosmos October 1st, 2008 A New C...
1.0

SCL 5020SE

Document

Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: System Approach: GSM networks are most popular and widespread wireless communication media across the world, having a wide ...
1.0

Network Forensics r8

Document

G OVE RNM E NTAL SE CU RITY S OL UT I O N S Product Information Network Forensic CONFIDENTIAL page 2 CONFIDENTIAL page 3 CONFIDENTIAL page 4 CONFIDENTIAL page 5 S OL UT I O N S S ...
1.0

I2-Analytical Investigation Techniques

Document

I2-Analytical Investigation Techniques CONFIDENTIAL 1 I2-Analytical Investigation Techniques (Details) • Analytical Investigation Techniques – 5 days General Analyst/Telephone Analyst/Financia...
1.0

MELANIE

Document

MELANIE Trained Models for Language Identification (Trained language model for classification with MP/SQ Mel-LM-SQ, Mel-LM,MP) CONFIDENTIAL – Subject to–change prior notice!prior notice! CONFIDENT...
1.0

MELANIE

Document

MELANIE Word Spotting WS CONFIDENTIAL – Subject to–change prior notice!prior notice! CONFIDENTIAL Subjectwithout to change without 1 MELANIE - Word Spotting, WS Functionality Speech signals are...
1.0

The Search for Results in Voice Analysis: how different identification technologies can work together effectively

Document

ISS World 2007 DUBAI, UAE – February 27, 2007 THE SEARCH FOR RESULTS IN VOICE ANALYSIS: how different identification technologies can work together effectively Luciano Piovano Government Intellige...
1.0

Sleuth-Hound

Document

SLEUTH-HOUND SOFTWARE SLEUTH-HOUND SOFTWARE MAIN VIEW POSITIONS HISTORY DATABASE FEATURES: • Remotely control and visualize the GPS position of one or more GPS tracking devices; • Geotracking ac...
1.0

Boosting Monitoring Centers with IP Metadata

Document

Boosting Monitoring Centers with IP Metadata Jerome Tollet October 2011 What is Network Intelligence Technology?  Feeding Detailed Traffic Visibility to Applications Applications using metadata...
1.0

Paradigm Shifts

Document

Paradigm Shifts James Donnelly Vice President of Sales Glimmerglass Networks 1 Glimmerglass Networks, Inc. Confidential.Copyright Copyright 2011. AllAll Rights Reserved. Glimmerglass, Inc. Confide...
1.0

NiceTrack Horizon Insight

Document

Na·· lntent. lnsight. lmpacC The NiceTrack Honzon lnsigN 19 tne NICE lntel.geneo plotform for ma5$ inlen:opUon R INllVSiS of vory h91' volumes and llde9 ot Gommurucallone data 1e.g. lelephony IP ...
1.0

IKAR Lab

Document

ll<AR Lab Most popular audio forensic lab in the world. 350 installations in more than 60 countries worldwide • Spe!:lker identification • Speech enhancement and audio restoration • Authenticity ...
1.0

MTTS

Document

Altron’s location based GSM/UMTS mobile terminals tracking system (MTTS) for mobile providers and law enforcement agencies 1. Overview MTTS hardware and software platform is used for seamless GSM/U...
1.0

UFED

Document

cellebrife mobile data sccurcd UFED The Comprehensive Mobile Forensic Solution Addressing the growing need for fast. flexible mobile forensics, Cellebrite?s Universal Forensic Extraction...
1.0

TSE 7517-1

Document

GOVER N MEN TAL SE CUR ITY SOL UTIO NS Product Information TSE 7517-01 Video & Audio RF Detection 95 66 28 4 5 43 69 78 6 4 6 03 74 47 1 TSE 7517-01 Video & Audio RF Detection 1 7 7 8 18 0 ...
1.0

TSE 7517-02, ECM6

Document

GOVER N MEN TAL SE CUR ITY SOL UTIO NS Product Information Advanced Video & Audio RF Detection System TSE 7517-2, ECM6 CONFIDENTIAL page 2 CONFIDENTIAL page 3 CONFIDENTIAL page 4 S O...
1.0

MELANIE

Document

MELANIE Topic Spotting TOP CONFIDENTIAL – Subject to–change prior notice!prior notice! CONFIDENTIAL Subjectwithout to change without 1 MELANIE - Topic Spotting, TOP Production Module for fast a...
1.0

Managing Virtual Identities Across IP Networks

Document

Enabling True Network Intelligence Everywhere Managing Virtual Identities Across IP Networks Jean-Philippe Lion Vice President, EMEA Sales ISS Prague, June 2009 A New Complex Situation Creates ...
1.0

Extracting Intelligence from multilingual SMS

Document

http://scanandtarget.com/ - [email protected] Extracting intelligence from multilingual SMS, IM, e-mails… 1 Agenda http://scanandtarget.com/ - [email protected] Scan & Targe...
1.0

Siemens Intelligence Platform

Document

Siemens Intelligence Platform ISS Dubai – Feb 26th, 2007 Non contractual; Commercial in confidence; Subject to change without notice Copyright © Siemens Networks GmbH & Co. KG 2007 Agenda ! Ch...
1.0

FinFireWire

Document

Tactical IT Intrusion Portfolio FINFIREWIRE Technical Surveillance Units and Forensic Experts often face a situation where they need to access a running computer system without shutting it down in...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh