Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 20 to 39 of 113 < previous   next >
TitleAuthor(s)Issue DateViews
 
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud
Proceeding/Conference:Conference on Digital Forensics, Security, and Law
2012
60
 
Community detection in civil society online networks: Theoretical guide and empirical assessment
Proceeding/Conference:DFRWS 2022 USA, Proceedings of the Twenty-Second Annual DFRWS USA
2019
 
A complexity based model for quantifying forensic evidential probabilities
Proceeding/Conference:Proceedings of the International Conference on Availability, Reliability and Security
2010
124
 
2004
84
Consistency Issue on Live Systems Forensics
Proceeding/Conference:Proceedings of Future Generation Communication and Networking, FGCN 2007
2007
 
A cost-effective digital forensic investigation model
Proceeding/Conference:Annual IFIP WG 11.9 International Conference on Digital Forensics
2009
122
 
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII
Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet
2004
122
CWPR, a Chinese/Japanese word-processing system for use with the unix device-independent troff system
Proceeding/Conference:International Conference on Computers and Applications
1987
 
Cyber attacks and political events: the case of the Occupy Central Campaign
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
130
 
Deepfake Noise Investigation and Detection
Proceeding/Conference:DFRWS 2022 USA, Proceedings of the Twenty-Second Annual DFRWS USA
2022
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
91
 
Design of a Cyber Forensic Tool
Proceeding/Conference:International Transnational Organized Crime Conference
2002
93
 
Detecting Anomalous Behavior of PLC using Semi-supervised Machine Learning
Proceeding/Conference:IEEE Conference on Communications and Network Security (CNS)
2017
144
 
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines
Proceeding/Conference:Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International Conference on Digital Forensics (DigitalForensics 2020)
2020
Development of domestic and international computer forensics
Proceeding/Conference:Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011
2011
159
 
The Differential Analysis of Reduced Skijack Variants from The First Round
Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference
2002
127
 
Digital evidence search kit
Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering
2005
157
A dual cube hashing scheme for solving LPP integrity problem
Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings
2011
209
Dynamic integrity verification for software self-defense
Proceeding/Conference:Proceedings of The 2005 International Conference on Security and Management, SAM'05
2005
95
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
316