Discovery - Top 10

Journal/Proceeding/Conference

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 143 (Search time: 0.031 seconds).

TitleAuthor(s)Issue Date
 
Strong Cryptographic Library - Implementation and Applications
Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference
1999
 
1987
 
Digital evidence search kit
Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering
2005
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
 
Forensic investigation of peer-to-peer networks
Book:Handbook of research on computational forensics, digital crime, and investigation: methods and solutions
2009
 
Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph
Proceeding/Conference:Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife Proceedings
2019
 
An Incident Response Model for Industrial Control System Forensics Based on Historical Events
Proceeding/Conference:Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference on Critical Infrastructure Protection
2019
 
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines
Proceeding/Conference:Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International Conference on Digital Forensics (DigitalForensics 2020)
2020
 
Forensic analysis of a Siemens Programmable Logic Controller
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
Profiling flash mob organizers in web discussion forums
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
The cloud storage ecosystem – A new business model for internet piracy?
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
 
Applying machine learning to PLC event detection and logging for forensic purpose
Proceeding/Conference:13th Annual IFIP WG 11.9 International Conference on Digital Forensics
2017
Recovery of heavily fragmented JPEG files
Proceeding/Conference:Digital Investigation
2016
 
Threat analysis of an elevator control system
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2017
 
Extended abstract: Anti-DDoS technique using self-learning bloom filter
Proceeding/Conference:IEEE International Conference on Intelligence and Security Informatics (ISI)
2017
 
The Majority Report - Can we use big data to secure a better future?
Journal:International Journal of Business & Cyber Security
2016
 
Detecting Anomalous Behavior of PLC using Semi-supervised Machine Learning
Proceeding/Conference:IEEE Conference on Communications and Network Security (CNS)
2017
 
Challenges to Personal Data Protection in Cloud Computing
Journal:Journal of Law & Economic Regulation
2013
 
Validation Rules for Enhancing Foxy P2P Network Investigations
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
An Exploratory Study of Profiling Online Auction Offenders
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Web User Profiling and Identification Based on Browsing Behavior Analysis
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
 
Authorship attribution for forensic investigation with thousands of authors
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2014
 
An Empirical Study Profiling Internet Pirates
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013