Discovery - Top 10

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 54 (Search time: 0.004 seconds).

TitleAuthor(s)Issue Date
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
 
1987
 
1989
 
PLC Forensics Based On Control Program Logic Change Detection
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
 
A 3D face reconstruction approach in enhancing the robustness and accuracy of face recognition
Proceeding/Conference:Shanghai and Hong Kong Symposium on Science and Technology
2009
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
Fragmented JPEG file recovery using pseudo headers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
 
Analysis of the digital evidence presented in the Yahoo! case
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
 
A privacy-preserving encryption scheme for an internet real-name registration system
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A topic model for building fine-grained domain-specific emotion lexicon
Proceeding/Conference:Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Short Papers)
2014
 
An information extraction framework for forensic investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Validation of rules used in foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
An Integrated Audio Forensic Framework For Instant Message Investigation
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
 
Validation Rules for Enhancing Foxy P2P Network Investigations
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
An Exploratory Study of Profiling Online Auction Offenders
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
An Empirical Study Profiling Internet Pirates
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
 
Web User Profiling and Identification Based on Browsing Behavior Analysis
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
Protecting digital data privacy in Computer Forensic Examination
Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011
2011
Profiling flash mob organizers in web discussion forums
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
The cloud storage ecosystem – A new business model for internet piracy?
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016