Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 79 to 98 of 113 < previous   next >
TitleAuthor(s)Issue DateViews
 
Profiling and tracking a cyberlocker link sharer in a public forum
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
Profiling flash mob organizers in web discussion forums
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
59
Protecting digital data privacy in Computer Forensic Examination
Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011
2011
292
 
Protecting digital legal professional privilege LPP data
Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008
2008
Quantification of digital forensic hypotheses using probability theory
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013
51
 
Railway track possessing assigning using constraint satisfaction
Proceeding/Conference:Asian'96 Post Conference Workshop on Constraints and Constraint Programming
1996
 
Real-time multiple head shape detection and tracking system with decentralized trackers
Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings
2006
101
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP - The International Federation for Information Processing
2008
133
Recovery of heavily fragmented JPEG files
Proceeding/Conference:Digital Investigation
2016
163
Risk management of corporate confidential information in digital form
Proceeding/Conference:Proceedings - International Computer Software and Applications Conference
2004
119
The rules of time on NTFS file system
Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering
2007
157
 
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms
Proceeding/Conference:Public Key Cryptography. PKC 2000
2000
285
Security issues and challenges for cyber physical system
Proceeding/Conference:Proceedings - 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
2010
139
Sensitivity analysis for a Bitcoin simulation model
Proceeding/Conference:Forensic Science International
2022
 
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence
Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010
2010
206
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
119
Sockpuppet detection in online discussion forums
Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
148
 
Software pirates: a criminal investigation
Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012
2012
 
Strong Cryptographic Library - Implementation and Applications
Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference
1999
109