Showing results 102 to 121 of 143
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Quantification of digital forensic hypotheses using probability theory Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | ||
Railway track possessing assigning using constraint satisfaction Proceeding/Conference:Asian'96 Post Conference Workshop on Constraints and Constraint Programming | 1996 | ||
Railway track possession assignment using constraint satisfaction Journal:Engineering Applications of Artificial Intelligence | 1999 | ||
Real-time multiple head shape detection and tracking system with decentralized trackers Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings | 2006 | ||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP - The International Federation for Information Processing | 2008 | ||
Recovery of heavily fragmented JPEG files Proceeding/Conference:Digital Investigation | 2016 | ||
Rectal thermometer mediated cross-infection with Salmonella wandsworth in a paediatric ward Journal:Journal of Hospital Infection | 1981 | ||
2002 | |||
Risk management of corporate confidential information in digital form Proceeding/Conference:Proceedings - International Computer Software and Applications Conference | 2004 | ||
The rules of time on NTFS file system Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering | 2007 | ||
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms Proceeding/Conference:Public Key Cryptography. PKC 2000 | 2000 | ||
Secure hierarchical identity based signature and its application Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2004 | ||
Security issues and challenges for cyber physical system Proceeding/Conference:Proceedings - 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010 | 2010 | ||
Security of Tseng-Jan's group signature schemes Journal:Information Processing Letters | 2000 | ||
Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers Journal:Information Processing Letters | 2001 | ||
Selection of Temporal Aligned Video Frames for Video Stitching Application Journal:Journal of Automation and Control Engineering | 2014 | ||
Sensitivity analysis for a Bitcoin simulation model Proceeding/Conference:Forensic Science International | 2022 | ||
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010 | 2010 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 |