Showing results 9 to 28 of 113
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
An Integrated Audio Forensic Framework For Instant Message Investigation Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL) | 2015 | 139 | ||
Analysis of the digital evidence presented in the Yahoo! case Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | 176 | ||
An analysis of the Green Dam Youth Escort software Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | 168 | ||
Analyzing storage media of digital camera Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | 154 | ||
Analyzing the Error Rates of Bitcoin Clustering Heuristics Proceeding/Conference:The Eighteenth IFIP WG 11.9 International Conference on Digital Forensics, Virtual, 2022 | 2022 | |||
Applying machine learning to PLC event detection and logging for forensic purpose Proceeding/Conference:13th Annual IFIP WG 11.9 International Conference on Digital Forensics | 2017 | |||
Authorship attribution for forensic investigation with thousands of authors Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2014 | 63 | ||
Automatic 3D face texture mapping framework from single image Proceeding/Conference:Proceedings of the 1st International Conference on Internet Multimedia Computing and Service, ICIMCS'09 | 2009 | |||
Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph Proceeding/Conference:Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife Proceedings | 2019 | 2 | ||
Automatic online monitoring and data-mining internet forums Proceeding/Conference:Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | 145 | ||
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 | 163 | ||
Cloud Forensics Investigation: Tracing Infringing Sharing of Copyrighted Content in Cloud Proceeding/Conference:Conference on Digital Forensics, Security, and Law | 2012 | 60 | ||
Community detection in civil society online networks: Theoretical guide and empirical assessment Proceeding/Conference:DFRWS 2022 USA, Proceedings of the Twenty-Second Annual DFRWS USA | 2019 | |||
A complexity based model for quantifying forensic evidential probabilities Proceeding/Conference:Proceedings of the International Conference on Availability, Reliability and Security | 2010 | 124 | ||
Conferences in Research and Practice in Information Series(Proceedings of the 27th Australasian Computer Science Conference) Proceeding/Conference:Tuning the collision test for power | 2004 | 84 | ||
Consistency Issue on Live Systems Forensics Proceeding/Conference:Proceedings of Future Generation Communication and Networking, FGCN 2007 | 2007 | |||
A cost-effective digital forensic investigation model Proceeding/Conference:Annual IFIP WG 11.9 International Conference on Digital Forensics | 2009 | 122 | ||
Cross-Referencing for Bilingual Electronic Legal Documents in HKLII Proceeding/Conference:Proceedings of The 6th Conference on Computerisation of Law via the Internet | 2004 | 122 | ||
CWPR, a Chinese/Japanese word-processing system for use with the unix device-independent troff system Proceeding/Conference:International Conference on Computers and Applications | 1987 | |||
Cyber attacks and political events: the case of the Occupy Central Campaign Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | 130 |