Showing results 32 to 51 of 67
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
The Hong Kong Telephone Directory Enquiry System Proceeding/Conference:Asia Pacific Software Engineering Conference Proceedings | 1996 | ||
A hybrid approach for authenticating MPEG-2 streaming data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication Proceeding/Conference:IEEE Wireless Communications and Networking Conference, WCNC | 2005 | ||
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA Proceeding/Conference:Frontiers in Artificial Intelligence and Applications | 2014 | ||
Memory acquisition: A 2-Take approach Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
A model for foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | ||
Motion estimation method for blurred videos and application of deblurring with spatially varying blur kernels Proceeding/Conference:Proceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010 | 2010 | ||
The next generation for the forensic extraction of electronic evidence from mobile telephones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | ||
PLC Forensics Based On Control Program Logic Change Detection Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL) | 2015 | ||
Privacy reference monitor - A computer model for law compliant privacy protection Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2009 | ||
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII Proceeding/Conference:Conference on Computerization of Law via the Internet | 2003 | ||
Profiling flash mob organizers in web discussion forums Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | ||
Protecting digital data privacy in Computer Forensic Examination Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011 | 2011 | ||
Quantification of digital forensic hypotheses using probability theory Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | ||
Real-time multiple head shape detection and tracking system with decentralized trackers Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings | 2006 | ||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Risk management of corporate confidential information in digital form Proceeding/Conference:Proceedings - International Computer Software and Applications Conference | 2004 | ||
The rules of time on NTFS file system Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering | 2007 | ||
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms Proceeding/Conference:Public Key Cryptography. PKC 2000 | 2000 | ||
Sensitivity analysis for a Bitcoin simulation model Proceeding/Conference:Forensic Science International | 2022 |