Showing results 1 to 20 of 113
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
A 3D face reconstruction approach in enhancing the robustness and accuracy of face recognition Proceeding/Conference:Shanghai and Hong Kong Symposium on Science and Technology | 2009 | 137 | ||
A Bag-of-Gait Model for Gait Recognition Proceeding/Conference:Proceedings of the 2012 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2012 | 2012 | 83 | ||
A Forensic Logging System for Siemens Programmable Logic Controllers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2018 | 65 | ||
A privacy-preserving encryption scheme for an internet real-name registration system Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | 143 | ||
A topic model for building fine-grained domain-specific emotion lexicon Proceeding/Conference:Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Short Papers) | 2014 | 118 | ||
Airport counter allocation using constraint logic programming Proceeding/Conference:Proceedings of the third international conference on practical application of constraint technology | 1997 | 92 | ||
An Incident Response Model for Industrial Control System Forensics Based on Historical Events Proceeding/Conference:Critical Infrastructure Protection XIII: 13th IFIP WG 11.10 International Conference on Critical Infrastructure Protection | 2019 | 17 | ||
An information extraction framework for forensic investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | 53 | ||
An Integrated Audio Forensic Framework For Instant Message Investigation Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL) | 2015 | 120 | ||
Analysis of the digital evidence presented in the Yahoo! case Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | 165 | ||
An analysis of the Green Dam Youth Escort software Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | 156 | ||
Analyzing storage media of digital camera Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | 145 | ||
Analyzing the Error Rates of Bitcoin Clustering Heuristics Proceeding/Conference:The Eighteenth IFIP WG 11.9 International Conference on Digital Forensics, Virtual, 2022 | 2022 | |||
Applying machine learning to PLC event detection and logging for forensic purpose Proceeding/Conference:13th Annual IFIP WG 11.9 International Conference on Digital Forensics | 2017 | 32 | ||
Authorship attribution for forensic investigation with thousands of authors Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2014 | 54 | ||
Automatic 3D face texture mapping framework from single image Proceeding/Conference:Proceedings of the 1st International Conference on Internet Multimedia Computing and Service, ICIMCS'09 | 2009 | 139 | ||
Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph Proceeding/Conference:Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife Proceedings | 2019 | 75 | ||
Automatic online monitoring and data-mining internet forums Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | 120 | ||
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 | 153 | ||
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud Proceeding/Conference:Conference on Digital Forensics, Security, and Law | 2012 | 38 |