Showing results 44 to 63 of 68
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Profiling flash mob organizers in web discussion forums Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
Protecting digital data privacy in Computer Forensic Examination Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011 | 2011 | ||
Quantification of digital forensic hypotheses using probability theory Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | ||
Real-time multiple head shape detection and tracking system with decentralized trackers Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings | 2006 | ||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Risk management of corporate confidential information in digital form Proceeding/Conference:Proceedings - International Computer Software and Applications Conference | 2004 | ||
The rules of time on NTFS file system Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering | 2007 | ||
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms Proceeding/Conference:Public Key Cryptography. PKC 2000 | 2000 | ||
Sensitivity analysis for a Bitcoin simulation model Proceeding/Conference:Forensic Science International | 2022 | ||
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010 | 2010 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | ||
Sockpuppet detection in online discussion forums Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | ||
Software pirates: a criminal investigation Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012 | 2012 | ||
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | ||
Temporal analysis of HFS+ and Mac OS X in digital investigations Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | ||
The cloud storage ecosystem – A new business model for internet piracy? Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
Tools and technology for computer forensics: Research and development in Hong Kong (invited paper) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Towards a better similarity measure for keyword profiling via clustering Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings | 2013 | ||
Two improved partially blind signature schemes from bilinear pairings Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Validation of rules used in foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 |