Showing results 30 to 49 of 113
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Delegation of Signing and Decryption Rights using PKI Proxy Memo Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering | 2004 | ||
Design of a Cyber Forensic Tool Proceeding/Conference:International Transnational Organized Crime Conference | 2002 | ||
Detecting Anomalous Behavior of PLC using Semi-supervised Machine Learning Proceeding/Conference:IEEE Conference on Communications and Network Security (CNS) | 2017 | ||
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines Proceeding/Conference:Advances in Digital Forensics XVI: 16th IFIP WG 11.9 International Conference on Digital Forensics (DigitalForensics 2020) | 2020 | ||
Development of domestic and international computer forensics Proceeding/Conference:Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011 | 2011 | ||
The Differential Analysis of Reduced Skijack Variants from The First Round Proceeding/Conference:Proceedings of The ChinaCrypt2002 Conference | 2002 | ||
Digital evidence search kit Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering | 2005 | ||
A dual cube hashing scheme for solving LPP integrity problem Proceeding/Conference:IEEE Symposium on Security and Privacy Proceedings | 2011 | ||
Dynamic integrity verification for software self-defense Proceeding/Conference:Proceedings of The 2005 International Conference on Security and Management, SAM'05 | 2005 | ||
An e-lottery scheme using Verifiable Random Function Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | ||
Efficient block-based motion segmentation method using motion vector consistency Proceeding/Conference:Proceedings of the IAPR Conference on Machine Vision Applications | 2005 | ||
An efficient bloom filter based solution for multiparty private matching Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06 | 2006 | ||
Empirical evaluation of information leakage detection using net-flow analysis Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | ||
An Empirical Study Profiling Internet Pirates Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | ||
Enchanced monitoring rule through direct node query for Foxy network investigation Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | ||
Evaluation of evidence in internet auction fraud investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
An Exploratory Study of Profiling Online Auction Offenders Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
Extended abstract: Anti-DDoS technique using self-learning bloom filter Proceeding/Conference:IEEE International Conference on Intelligence and Security Informatics (ISI) | 2017 | ||
Forensic analysis of a Siemens Programmable Logic Controller Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 |