Browsing by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 102 to 121 of 143 < previous   next >
TitleAuthor(s)Issue Date
Quantification of digital forensic hypotheses using probability theory
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013
 
Railway track possessing assigning using constraint satisfaction
Proceeding/Conference:Asian'96 Post Conference Workshop on Constraints and Constraint Programming
1996
 
Railway track possession assignment using constraint satisfaction
Journal:Engineering Applications of Artificial Intelligence
1999
 
Real-time multiple head shape detection and tracking system with decentralized trackers
Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings
2006
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP - The International Federation for Information Processing
2008
Recovery of heavily fragmented JPEG files
Proceeding/Conference:Digital Investigation
2016
 
1981
 
2002
Risk management of corporate confidential information in digital form
Proceeding/Conference:Proceedings - International Computer Software and Applications Conference
2004
The rules of time on NTFS file system
Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering
2007
 
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms
Proceeding/Conference:Public Key Cryptography. PKC 2000
2000
 
Secure hierarchical identity based signature and its application
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
Security issues and challenges for cyber physical system
Proceeding/Conference:Proceedings - 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
2010
 
Security of Tseng-Jan's group signature schemes
Journal:Information Processing Letters
2000
 
2001
 
Selection of Temporal Aligned Video Frames for Video Stitching Application
Journal:Journal of Automation and Control Engineering
2014
Sensitivity analysis for a Bitcoin simulation model
Proceeding/Conference:Forensic Science International
2022
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005