Discovery - Top 10

Journal/Proceeding/Conference

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 143 (Search time: 0.029 seconds).

TitleAuthor(s)Issue DateViews
 
Watershed segmentation with boundary curvature ratio based merging criterion
Proceeding/Conference:Proceedings of the 9th IASTED International Conference on Signal and Image Processing
2007
176
 
Time and Location Topic Model for analyzing Linkg forum data
Proceeding/Conference:2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE)
2020
8
 
1981
 
Very Fast Telephone Directory Search using Large Memory Resident Data Structures
Proceeding/Conference:Proceedings of the IASTED Conference on Software Engineering (SE'98)
1998
 
A cost-effective digital forensic investigation model
Proceeding/Conference:Annual IFIP WG 11.9 International Conference on Digital Forensics
2009
122
The next generation for the forensic extraction of electronic evidence from mobile telephones
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013
The cloud storage ecosystem – A new business model for internet piracy?
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
 
Validation of rules used in foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
79
 
Forward-secure multisignature and blind signature schemes
Journal:Applied Mathematics and Computation
2005
411
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
55
 
2007
135
 
Enchanced monitoring rule through direct node query for Foxy network investigation
Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012
2012
24
Two improved partially blind signature schemes from bilinear pairings
Proceeding/Conference:Lecture Notes in Computer Science
2005
110
A Forensic Logging System for Siemens Programmable Logic Controllers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2018
65
An analysis of the Green Dam Youth Escort software
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
168
 
LCCT: a semisupervised model for sentiment classification
Proceeding/Conference:Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL
2015
106
 
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA
Proceeding/Conference:Frontiers in Artificial Intelligence and Applications
2014
58
Towards a better similarity measure for keyword profiling via clustering
Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings
2013
44
 
2011
102
 
Threat analysis of an elevator control system
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2017
92
 
Secure hierarchical identity based signature and its application
Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2004
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
33
 
A Generic Bayesian Belief Model for Similar Cyber Crimes
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
44
 
Maintaining hard disk integrity with digital legal professional privilege (LPP) data
Journal:IEEE Transactions on Information Forensics and Security
2013
76
 
2005
135