Showing results 68 to 87 of 143
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Identifying first seeders in foxy peer to peer networks Proceeding/Conference:Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010 : revised selected papers | 2010 | ||
Identifying static and dynamic volatile memory data from multiple dumps for live forensics Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics | 2010 | ||
Identifying volatile data from multiple memory dumps in live forensics Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN | 2004 | ||
IFIP Advances in Information and Communication Technology: Preface Journal:IFIP Advances in Information and Communication Technology | 2010 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | ||
Improving disk sector integrity using 3-dimension hashing scheme Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings | 2007 | ||
Intrusion detection routers: Design, implementation and evaluation using an experimental testbed Journal:IEEE Journal on Selected Areas in Communications | 2006 | ||
Investigating and analyzing the web-based contents on Chinese Shanzhai mobile phones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensic Engineering | 2012 | ||
K-Dimensional hashing scheme for hard disk integrity verification in computer forensics Journal:Journal of Zhejiang University: Science C | 2011 | ||
Knowledge-based system for rostering Journal:Expert Systems With Applications | 1993 | ||
LCCT: a semisupervised model for sentiment classification Proceeding/Conference:Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL | 2015 | ||
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA Proceeding/Conference:Frontiers in Artificial Intelligence and Applications | 2014 | ||
Maintaining hard disk integrity with digital legal professional privilege (LPP) data Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Memory acquisition: A 2-Take approach Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
A model for foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | ||
Modeling the initial stage of a file sharing process on a BitTorrent network Journal:Peer-to-Peer Networking and Applications | 2014 | ||
Motion and edge adaptive interpolation de-interlacing algorithm Proceeding/Conference:Proceedings of the 10th WSEAS International Conference on Computers | 2006 | ||
Motion estimation method for blurred videos and application of deblurring with spatially varying blur kernels Proceeding/Conference:Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010 | 2010 | ||
New differential cryptanalytic results for reduced-round CAST-128 Journal:IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2010 |