Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 21 to 40 of 113 < previous   next >
TitleAuthor(s)Issue DateViews
 
Community detection in civil society online networks: Theoretical guide and empirical assessment
Proceeding/Conference:DFRWS 2022 USA, Proceedings of the Twenty-Second Annual DFRWS USA
2019
 
A complexity based model for quantifying forensic evidential probabilities
Proceeding/Conference:Proceedings of the International Conference on Availability, Reliability and Security
2010
119
 
2004
73
Consistency Issue on Live Systems Forensics
Proceeding/Conference:Proceedings of Future Generation Communication and Networking, FGCN 2007
2007
120
 
A cost-effective digital forensic investigation model
Proceeding/Conference:Annual IFIP WG 11.9 International Conference on Digital Forensics
2009
111
 
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII
Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet
2004
102
CWPR, a Chinese/Japanese word-processing system for use with the unix device-independent troff system
Proceeding/Conference:International Conference on Computers and Applications
1987
77
 
Cyber attacks and political events: the case of the Occupy Central Campaign
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
118
 
Deepfake Noise Investigation and Detection
Proceeding/Conference:DFRWS 2022 USA, Proceedings of the Twenty-Second Annual DFRWS USA
2022
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
78
 
Design of a Cyber Forensic Tool
Proceeding/Conference:International Transnational Organized Crime Conference
2002
85
 
Detecting Anomalous Behavior of PLC using Semi-supervised Machine Learning
Proceeding/Conference:IEEE Conference on Communications and Network Security (CNS)
2017
96
 
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines
Proceeding/Conference:Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International Conference on Digital Forensics (DigitalForensics 2020)
2020
25
Development of domestic and international computer forensics
Proceeding/Conference:Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011
2011
143
 
The Differential Analysis of Reduced Skijack Variants from The First Round
Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference
2002
111
 
Digital evidence search kit
Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering
2005
141
A dual cube hashing scheme for solving LPP integrity problem
Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings
2011
194
Dynamic integrity verification for software self-defense
Proceeding/Conference:Proceedings of The 2005 International Conference on Security and Management, SAM'05
2005
79
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
303
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
28