Showing results 1 to 20 of 113
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
What an Investigator Needs to Know about Encryption & Tracking Technologies Proceeding/Conference:Asia Cyber Crime Summit | 2001 | |||
Web User Profiling and Identification Based on Browsing Behavior Analysis Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | 30 | ||
Watershed segmentation with boundary curvature ratio based merging criterion Proceeding/Conference:Proceedings of the 9th IASTED International Conference on Signal and Image Processing | 2007 | 176 | ||
Very Fast Telephone Directory Search using Large Memory Resident Data Structures Proceeding/Conference:Proceedings of the IASTED Conference on Software Engineering (SE'98) | 1998 | |||
Validation Rules for Enhancing Foxy P2P Network Investigations Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | 38 | ||
Validation of rules used in foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | 79 | ||
Two improved partially blind signature schemes from bilinear pairings Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 110 | ||
Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL) | 2015 | 86 | ||
Towards a better similarity measure for keyword profiling via clustering Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings | 2013 | 44 | ||
Tools and technology for computer forensics: Research and development in Hong Kong (invited paper) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | |||
Time and Location Topic Model for analyzing Linkg forum data Proceeding/Conference:2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) | 2020 | 8 | ||
Threat analysis of an elevator control system Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2017 | 92 | ||
The cloud storage ecosystem – A new business model for internet piracy? Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | |||
Temporal analysis of HFS+ and Mac OS X in digital investigations Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | 30 | ||
Super-resolution of faces using texture mapping on a generic 3D model Proceeding/Conference:International Conference on Image and Graphics Proceedings | 2009 | 188 | ||
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | 109 | ||
Software pirates: a criminal investigation Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012 | 2012 | |||
Sockpuppet detection in online discussion forums Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | 148 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | 119 | ||
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010 | 2010 | 206 |