Browsing by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 2 to 21 of 23 < previous   next >
TitleAuthor(s)Issue Date
 
A privacy-preserving encryption scheme for an internet real-name registration system
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A topic model for building fine-grained domain-specific emotion lexicon
Proceeding/Conference:Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Short Papers)
2014
 
An information extraction framework for forensic investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
An Integrated Audio Forensic Framework For Instant Message Investigation
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
 
Analysis of the digital evidence presented in the Yahoo! case
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
An Empirical Study Profiling Internet Pirates
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
 
An Exploratory Study of Profiling Online Auction Offenders
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
1987
 
Fragmented JPEG file recovery using pseudo headers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
 
PLC Forensics Based On Control Program Logic Change Detection
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
Protecting digital data privacy in Computer Forensic Examination
Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011
2011
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
 
1989
 
Validation of rules used in foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012