Browsing "Computer Science: Conference papers" by Author rp00111

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 70 to 89 of 113 < previous   next >
TitleAuthor(s)Issue DateViews
The next generation for the forensic extraction of electronic evidence from mobile telephones
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013
A Novel Object Segmentation Method for Silhouette Tracker in Video Surveillance Application
Proceeding/Conference:International Conference on Computational Science and Computational Intelligence Proceedings
2014
50
 
2007
135
 
Photo forensics on shanzhai mobile phone
Proceeding/Conference:Lecture Notes in Computer Science
2013
 
PLC Forensics Based On Control Program Logic Change Detection
Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL)
2015
125
Privacy preserving confidential forensic investigation for shared or remote servers
Proceeding/Conference:Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011
2011
160
Privacy preserving multiple keyword search for confidential investigation of remote forensics
Proceeding/Conference:Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011
2011
131
Privacy reference monitor - A computer model for law compliant privacy protection
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2009
 
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII
Proceeding/Conference:Conference on Computerization of Law via the Internet
2003
113
 
Profiling and tracking a cyberlocker link sharer in a public forum
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2015
Profiling flash mob organizers in web discussion forums
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2016
59
Protecting digital data privacy in Computer Forensic Examination
Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011
2011
292
 
Protecting digital legal professional privilege LPP data
Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008
2008
Quantification of digital forensic hypotheses using probability theory
Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
2013
51
 
Railway track possessing assigning using constraint satisfaction
Proceeding/Conference:Asian'96 Post Conference Workshop on Constraints and Constraint Programming
1996
 
Real-time multiple head shape detection and tracking system with decentralized trackers
Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings
2006
101
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2012
 
Reasoning about evidence using Bayesian networks
Proceeding/Conference:IFIP - The International Federation for Information Processing
2008
133
Recovery of heavily fragmented JPEG files
Proceeding/Conference:Digital Investigation
2016
163
Risk management of corporate confidential information in digital form
Proceeding/Conference:Proceedings - International Computer Software and Applications Conference
2004
119