Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 49 to 68 of 113 < previous   next >
TitleAuthor(s)Issue DateViews
 
Forensic analysis of a Siemens Programmable Logic Controller
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
89
 
Forensic analysis of pirated Chinese Shanzhai mobile phones
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
76
Forensic analysis of popular Chinese internet applications
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
 
Fragmented JPEG file recovery using pseudo headers
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
 
A Generic Bayesian Belief Model for Similar Cyber Crimes
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2013
44
 
The Hong Kong Telephone Directory Enquiry System
Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings
1996
119
Human face tracking system with multiple non-overlapping cameras
Proceeding/Conference:Proceedings - 3rd International Conference on Data Mining and Intelligent Information Technology Applications, ICMIA 2011
2011
103
A hybrid approach for authenticating MPEG-2 streaming data
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Identifying first seeders in foxy peer to peer networks
Proceeding/Conference:Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010 : revised selected papers
2010
 
Identifying static and dynamic volatile memory data from multiple dumps for live forensics
Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics
2010
174
Identifying volatile data from multiple memory dumps in live forensics
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
89
IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
Proceeding/Conference:Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN
2004
129
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC
2005
133
Improving disk sector integrity using 3-dimension hashing scheme
Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings
2007
137
 
Investigating and analyzing the web-based contents on Chinese Shanzhai mobile phones
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensic Engineering
2012
 
LCCT: a semisupervised model for sentiment classification
Proceeding/Conference:Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL
2015
106
 
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA
Proceeding/Conference:Frontiers in Artificial Intelligence and Applications
2014
58
 
Memory acquisition: A 2-Take approach
Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009
2009
 
A model for foxy peer-to-peer network investigations
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2009
 
Motion and edge adaptive interpolation de-interlacing algorithm
Proceeding/Conference:Proceedings of the 10th WSEAS International Conference on Computers
2006
79