Showing results 21 to 40 of 113
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Community detection in civil society online networks: Theoretical guide and empirical assessment Proceeding/Conference:DFRWS 2022 USA, Proceedings of the Twenty-Second Annual DFRWS USA | 2019 | |||
A complexity based model for quantifying forensic evidential probabilities Proceeding/Conference:Proceedings of the International Conference on Availability, Reliability and Security | 2010 | 119 | ||
Conferences in Research and Practice in Information Series(Proceedings of the 27th Australasian Computer Science Conference) Proceeding/Conference:Tuning the collision test for power | 2004 | 73 | ||
Consistency Issue on Live Systems Forensics Proceeding/Conference:Proceedings of Future Generation Communication and Networking, FGCN 2007 | 2007 | 120 | ||
A cost-effective digital forensic investigation model Proceeding/Conference:Annual IFIP WG 11.9 International Conference on Digital Forensics | 2009 | 111 | ||
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet | 2004 | 102 | ||
CWPR, a Chinese/Japanese word-processing system for use with the unix device-independent troff system Proceeding/Conference:International Conference on Computers and Applications | 1987 | 77 | ||
Cyber attacks and political events: the case of the Occupy Central Campaign Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | 118 | ||
Deepfake Noise Investigation and Detection Proceeding/Conference:DFRWS 2022 USA, Proceedings of the Twenty-Second Annual DFRWS USA | 2022 | |||
Delegation of Signing and Decryption Rights using PKI Proxy Memo Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering | 2004 | 78 | ||
Design of a Cyber Forensic Tool Proceeding/Conference:International Transnational Organized Crime Conference | 2002 | 85 | ||
Detecting Anomalous Behavior of PLC using Semi-supervised Machine Learning Proceeding/Conference:IEEE Conference on Communications and Network Security (CNS) | 2017 | 96 | ||
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines Proceeding/Conference:Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International Conference on Digital Forensics (DigitalForensics 2020) | 2020 | 25 | ||
Development of domestic and international computer forensics Proceeding/Conference:Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011 | 2011 | 143 | ||
The Differential Analysis of Reduced Skijack Variants from The First Round Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference | 2002 | 111 | ||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | 141 | ||
A dual cube hashing scheme for solving LPP integrity problem Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings | 2011 | 194 | ||
Dynamic integrity verification for software self-defense Proceeding/Conference:Proceedings of The 2005 International Conference on Security and Management, SAM'05 | 2005 | 79 | ||
An e-lottery scheme using Verifiable Random Function Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 303 | ||
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | 28 |