Showing results 39 to 58 of 113
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
An e-lottery scheme using Verifiable Random Function Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 316 | ||
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | 33 | ||
Efficient block-based motion segmentation method using motion vector consistency Proceeding/Conference:Proceedings of the IAPR Conference on Machine Vision Applications | 2005 | 56 | ||
An efficient bloom filter based solution for multiparty private matching Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06 | 2006 | 168 | ||
Empirical evaluation of information leakage detection using net-flow analysis Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | 55 | ||
An Empirical Study Profiling Internet Pirates Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | |||
Enchanced monitoring rule through direct node query for Foxy network investigation Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | 24 | ||
Evaluation of evidence in internet auction fraud investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | 139 | ||
An Exploratory Study of Profiling Online Auction Offenders Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | 21 | ||
Extended abstract: Anti-DDoS technique using self-learning bloom filter Proceeding/Conference:IEEE International Conference on Intelligence and Security Informatics (ISI) | 2017 | 94 | ||
Forensic analysis of a Siemens Programmable Logic Controller Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | 89 | ||
Forensic analysis of pirated Chinese Shanzhai mobile phones Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | 76 | ||
Forensic analysis of popular Chinese internet applications Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | |||
Fragmented JPEG file recovery using pseudo headers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | |||
A Generic Bayesian Belief Model for Similar Cyber Crimes Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | 44 | ||
The Hong Kong Telephone Directory Enquiry System Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings | 1996 | 119 | ||
Human face tracking system with multiple non-overlapping cameras Proceeding/Conference:Proceedings - 3rd International Conference on Data Mining and Intelligent Information Technology Applications, ICMIA 2011 | 2011 | 103 | ||
A hybrid approach for authenticating MPEG-2 streaming data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | |||
Identifying first seeders in foxy peer to peer networks Proceeding/Conference:Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010 : revised selected papers | 2010 | |||
Identifying static and dynamic volatile memory data from multiple dumps for live forensics Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics | 2010 | 174 |