Showing results 70 to 89 of 113
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
The next generation for the forensic extraction of electronic evidence from mobile telephones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | |||
A Novel Object Segmentation Method for Silhouette Tracker in Video Surveillance Application Proceeding/Conference:International Conference on Computational Science and Computational Intelligence Proceedings | 2014 | 50 | ||
Object-based surveillance video retrieval system with real-time indexing methodology Proceeding/Conference:Lecture Notes in Computer Science | 2007 | 135 | ||
Photo forensics on shanzhai mobile phone Proceeding/Conference:Lecture Notes in Computer Science | 2013 | |||
PLC Forensics Based On Control Program Logic Change Detection Proceeding/Conference:Journal of Digital Forensics, Security and Law (JDFSL) | 2015 | 125 | ||
Privacy preserving confidential forensic investigation for shared or remote servers Proceeding/Conference:Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011 | 2011 | 160 | ||
Privacy preserving multiple keyword search for confidential investigation of remote forensics Proceeding/Conference:Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011 | 2011 | 131 | ||
Privacy reference monitor - A computer model for law compliant privacy protection Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2009 | |||
Processing Legal Documents in the Chinese-Speaking World: the Experience of HKLII Proceeding/Conference:Conference on Computerization of Law via the Internet | 2003 | 113 | ||
Profiling and tracking a cyberlocker link sharer in a public forum Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | |||
Profiling flash mob organizers in web discussion forums Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | 59 | ||
Protecting digital data privacy in Computer Forensic Examination Proceeding/Conference:IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2011 | 2011 | 292 | ||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 | |||
Quantification of digital forensic hypotheses using probability theory Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | 51 | ||
Railway track possessing assigning using constraint satisfaction Proceeding/Conference:Asian'96 Post Conference Workshop on Constraints and Constraint Programming | 1996 | |||
Real-time multiple head shape detection and tracking system with decentralized trackers Proceeding/Conference:International Conference on Intelligent System Design and Applications Proceedings | 2006 | 101 | ||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | |||
Reasoning about evidence using Bayesian networks Proceeding/Conference:IFIP - The International Federation for Information Processing | 2008 | 133 | ||
Recovery of heavily fragmented JPEG files Proceeding/Conference:Digital Investigation | 2016 | 163 | ||
Risk management of corporate confidential information in digital form Proceeding/Conference:Proceedings - International Computer Software and Applications Conference | 2004 | 119 |