Showing results 46 to 65 of 113
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Evaluation of evidence in internet auction fraud investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
An Exploratory Study of Profiling Online Auction Offenders Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
Extended abstract: Anti-DDoS technique using self-learning bloom filter Proceeding/Conference:IEEE International Conference on Intelligence and Security Informatics (ISI) | 2017 | ||
Forensic analysis of a Siemens Programmable Logic Controller Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
Forensic analysis of pirated Chinese Shanzhai mobile phones Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Forensic analysis of popular Chinese internet applications Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
Fragmented JPEG file recovery using pseudo headers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | ||
A Generic Bayesian Belief Model for Similar Cyber Crimes Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | ||
The Hong Kong Telephone Directory Enquiry System Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings | 1996 | ||
Human face tracking system with multiple non-overlapping cameras Proceeding/Conference:Proceedings - 3rd International Conference on Data Mining and Intelligent Information Technology Applications, ICMIA 2011 | 2011 | ||
A hybrid approach for authenticating MPEG-2 streaming data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Identifying first seeders in foxy peer to peer networks Proceeding/Conference:Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010 : revised selected papers | 2010 | ||
Identifying static and dynamic volatile memory data from multiple dumps for live forensics Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics | 2010 | ||
Identifying volatile data from multiple memory dumps in live forensics Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN | 2004 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | ||
Improving disk sector integrity using 3-dimension hashing scheme Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings | 2007 | ||
Investigating and analyzing the web-based contents on Chinese Shanzhai mobile phones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensic Engineering | 2012 | ||
LCCT: a semisupervised model for sentiment classification Proceeding/Conference:Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL | 2015 | ||
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA Proceeding/Conference:Frontiers in Artificial Intelligence and Applications | 2014 |