Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 39 to 58 of 113 < previous   next >
TitleAuthor(s)Issue DateViews
An e-lottery scheme using Verifiable Random Function
Proceeding/Conference:Lecture Notes in Computer Science
2005
316
 
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
33
 
Efficient block-based motion segmentation method using motion vector consistency
Proceeding/Conference:Proceedings of the IAPR Conference on Machine Vision Applications
2005
56
An efficient bloom filter based solution for multiparty private matching
Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06
2006
168
 
Empirical evaluation of information leakage detection using net-flow analysis
Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013
2013
55
 
An Empirical Study Profiling Internet Pirates
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
 
Enchanced monitoring rule through direct node query for Foxy network investigation
Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012
2012
24
Evaluation of evidence in internet auction fraud investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
139
 
An Exploratory Study of Profiling Online Auction Offenders
Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics
2014
21
 
Extended abstract: Anti-DDoS technique using self-learning bloom filter
Proceeding/Conference:IEEE International Conference on Intelligence and Security Informatics (ISI)
2017
94
 
Forensic analysis of a Siemens Programmable Logic Controller
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
89
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
76
Forensic analysis of popular Chinese internet applications
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
 
Fragmented JPEG file recovery using pseudo headers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A Generic Bayesian Belief Model for Similar Cyber Crimes
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
44
 
The Hong Kong Telephone Directory Enquiry System
Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings
1996
119
Human face tracking system with multiple non-overlapping cameras
Proceeding/Conference:Proceedings - 3rd International Conference on Data Mining and Intelligent Information Technology Applications, ICMIA 2011
2011
103
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Identifying first seeders in foxy peer to peer networks
Proceeding/Conference:Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010 : revised selected papers
2010
 
Identifying static and dynamic volatile memory data from multiple dumps for live forensics
Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics
2010
174