Showing results 1 to 20 of 143
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
A 3D face reconstruction approach in enhancing the robustness and accuracy of face recognition Proceeding/Conference:Shanghai and Hong Kong Symposium on Science and Technology | 2009 | ||
A Bag-of-Gait Model for Gait Recognition Proceeding/Conference:Proceedings of the 2012 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2012 | 2012 | ||
A Forensic Logging System for Siemens Programmable Logic Controllers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2018 | ||
A privacy-preserving encryption scheme for an internet real-name registration system Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | ||
A topic model for building fine-grained domain-specific emotion lexicon Proceeding/Conference:Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Short Papers) | 2014 | ||
Airport counter allocation using constraint logic programming Proceeding/Conference:Proceedings of the third international conference on practical application of constraint technology | 1997 | ||
An Incident Response Model for Industrial Control System Forensics Based on Historical Events Proceeding/Conference:Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference on Critical Infrastructure Protection | 2019 | ||
An information extraction framework for forensic investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | ||
An Integrated Audio Forensic Framework For Instant Message Investigation Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL) | 2015 | ||
Analysis of the digital evidence presented in the Yahoo! case Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | ||
An analysis of the Green Dam Youth Escort software Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
Analyzing storage media of digital camera Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
Analyzing the Error Rates of Bitcoin Clustering Heuristics Proceeding/Conference:The Eighteenth IFIP WG 11.9 International Conference on Digital Forensics, Virtual, 2022 | 2022 | ||
Applying machine learning to PLC event detection and logging for forensic purpose Proceeding/Conference:13th Annual IFIP WG 11.9 International Conference on Digital Forensics | 2017 | ||
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme Journal:International Journal of Network Security | 2007 | ||
Authorship attribution for forensic investigation with thousands of authors Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2014 | ||
Automatic 3D face texture mapping framework from single image Proceeding/Conference:Proceedings of the 1st International Conference on Internet Multimedia Computing and Service, ICIMCS'09 | 2009 | ||
Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph Proceeding/Conference:Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife Proceedings | 2019 | ||
Automatic online monitoring and data-mining internet forums Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | ||
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 |