Showing results 59 to 78 of 113
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Identifying volatile data from multiple memory dumps in live forensics Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | 89 | ||
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN | 2004 | 129 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | 133 | ||
Improving disk sector integrity using 3-dimension hashing scheme Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings | 2007 | 137 | ||
Investigating and analyzing the web-based contents on Chinese Shanzhai mobile phones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensic Engineering | 2012 | |||
LCCT: a semisupervised model for sentiment classification Proceeding/Conference:Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL | 2015 | 106 | ||
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA Proceeding/Conference:Frontiers in Artificial Intelligence and Applications | 2014 | 58 | ||
Memory acquisition: A 2-Take approach Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | |||
A model for foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | |||
Motion and edge adaptive interpolation de-interlacing algorithm Proceeding/Conference:Proceedings of the 10th WSEAS International Conference on Computers | 2006 | 79 | ||
Motion estimation method for blurred videos and application of deblurring with spatially varying blur kernels Proceeding/Conference:Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010 | 2010 | |||
The next generation for the forensic extraction of electronic evidence from mobile telephones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | |||
A Novel Object Segmentation Method for Silhouette Tracker in Video Surveillance Application Proceeding/Conference:International Conference on Computational Science and Computational Intelligence Proceedings | 2014 | 50 | ||
Object-based surveillance video retrieval system with real-time indexing methodology Proceeding/Conference:Lecture Notes in Computer Science | 2007 | 135 | ||
Photo forensics on shanzhai mobile phone Proceeding/Conference:Lecture Notes in Computer Science | 2013 | |||
PLC Forensics Based On Control Program Logic Change Detection Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL) | 2015 | 125 | ||
Privacy preserving confidential forensic investigation for shared or remote servers Proceeding/Conference:Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | 160 | ||
Privacy preserving multiple keyword search for confidential investigation of remote forensics Proceeding/Conference:Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011 | 2011 | 131 | ||
Privacy reference monitor - A computer model for law compliant privacy protection Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2009 | |||
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII Proceeding/Conference:Conference on Computerization of Law via the Internet | 2003 | 113 |