|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6505 occurrences of 3767 keywords
|
|
|
Results
Found 23679 publication records. Showing 23679 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
54 | Ricci S. C. Ieong, H. C. Leung |
Deriving cse-specific live forensics investigation procedures from FORZA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 175-180, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FORZA, digital forensics framework, live forensics |
46 | Maaria Nuutinen, Leena Norros |
Core task analysis in accident investigation: analysis of maritime accidents in piloting situations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 11(2), pp. 129-150, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Accident models, Expert cooperation, Pilotage, Maritime, Practices, Accident investigation |
43 | Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos |
Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 470-495, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
43 | Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law |
Forensic Investigation of Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 355-378, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
42 | Jolanta Cybulka |
Applying the c.DnS Design Pattern to Obtain an Ontology for Investigation Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCI ![In: Computational Collective Intelligence. Semantic Web, Social Networks and Multiagent Systems, First International Conference, ICCCI 2009, Wroclaw, Poland, October 5-7, 2009. Proceedings, pp. 516-527, 2009, Springer, 978-3-642-04440-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Constructive descriptions and situations ontology, ontology of criminal and investigation processes, investigation management system |
41 | Anish Das Sarma, Alpa Jain, Divesh Srivastava |
I4E: interactive investigation of iterative information extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 795-806, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
explain, interactive investigation, information extraction, debugging, diagnose, repair |
37 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 160-165, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
37 | Chung C. Chang, Kuo H. Hua |
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 161-170, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
case-based reasoning (CBR), experts systems (ES), computerassisted instruction (CAI), crime investigation, coastal patrol |
36 | Gian Luca Marcialis, Fabio Roli, Pietro Coli, Giovanni Delogu |
A Fingerprint Forensic Tool for Criminal Investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 23-52, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Christopher A. Canning, Baoying Wang |
Trends in Information Security Regulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 516-528, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Lodovico Marziale, Santhi Movva, Golden G. Richard III, Vassil Roussev, Loren Schwiebert |
Massively Threaded Digital Forensics Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 234-256, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Bo Zhou 0001, Qi Shi 0001, Madjid Merabti |
A Novel Intrusion Detection System for Smart Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 307-333, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Xiaoling Chen, Rohan D. W. Perera, Ziqian Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi |
Deception Detection on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 334-354, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Antonio Savoldi, Paolo Gubian |
Embedded Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 396-423, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Stefan Katzenbeisser 0001, Huajian Liu, Martin Steinebach |
Challenges and Solutions in Multimedia Document Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 155-175, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Gian Piero Zarri |
Conceptual Tools for Dealing with 'Narrative' Terrorism Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 447-469, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Hong Cai, Sos S. Agaian |
A Novel Multilevel DCT Based Reversible Data Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 204-233, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Matthew Sorell |
Digital Camera Photographic Provenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 104-129, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Lynn Margaret Batten, Lei Pan 0002 |
Testing Digital Forensic Software Tools Used in Expert Testimony. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 257-278, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Patrizio Campisi, Emanuele Maiorana, Alessandro Neri 0001 |
Privacy Enhancing Technologies in Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 1-22, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Thomas M. Chen |
Identity Theft through the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 379-395, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Adel Elmaghraby, Deborah W. Keeling, Michael Losavio |
Legal Issues for Research and Practice in Computational Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 496-515, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Roberto Caldelli, Irene Amerini, Francesco Picchioni, Alessia De Rosa, Francesca Uccheddu |
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 130-154, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Xi Zhao, Anthony T. S. Ho |
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 176-203, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Michael I. Cohen |
Network Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 279-306, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Tim Rawlinson, Abhir Bhalerao, Li Wang 0005 |
Principles and Methods for Face Recognition and Face Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 53-78, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Pawel T. Puslecki |
Biometrical Processing of Faces in Security and Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 79-103, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Cosimo Anglano |
Forensic Implications of Virtualization Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation ![In: Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions, pp. 424-446, 2010, IGI Global, 9781605668369. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Timothy Neville, Matthew Sorell |
Audit Log for Forensic Photography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 142-152, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
crime investigation, forensic investigation, digital negative, Digital photography |
35 | Anna Götmar, Jonas Lundberg |
Effective recommendations in loosely coupled accident investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCE ![In: Proceedings of the 14th European Conference on Cognitive Ergonomics: invent! explore!, ECCE 2007, London, UK, August 28-31, 2007, pp. 11-18, 2007, ACM, 978-1-84799-849-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
recommendations, accident investigation |
35 | Martin P. Robillard, Wesley Coelho, Gail C. Murphy |
How Effective Developers Investigate Source Code: An Exploratory Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 30(12), pp. 889-903, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
program investigation, Software evolution, program understanding, empirical software engineering |
33 | Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Michael Freemon, Von Welch, Randy Butler |
Palantir: a framework for collaborative incident response and investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 38-51, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-site collaboration, digital investigation, incident response |
33 | Svein Yngvar Willassen |
Using simplified event calculus in digital investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1438-1442, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
propositional logic, event calculus, digital investigation |
33 | Witold Halas, Victor Taranenko, Antoni Swic, Georgij Taranenko |
Investigation of Influence of Grinding Regimes on Surface Tension State. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: New Frontiers in Applied Artificial Intelligence, 21st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2008, Wroclaw, Poland, June 18-20, 2008, Proceedings, pp. 749-756, 2008, Springer, 978-3-540-69045-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
grinding, surface tension state, influence, investigation |
32 | Martin P. Robillard, Putra Manggala |
Reusing Program Investigation Knowledge for Code Understanding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPC ![In: The 16th IEEE International Conference on Program Comprehension, ICPC 2008, Amsterdam, The Netherlands, June 10-13, 2008, pp. 202-211, 2008, IEEE Computer Society, 978-0-7695-3176-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Fredrik Sundt Breien, Ingerid Rødseth |
Usability factors of 3D criminal archive in an augmented reality environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, Norway, October 14-18, 2006, pp. 385-388, 2006, ACM, 1-59593-325-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
criminal investigation, usability, augmented reality, computer graphics, tangible user interfaces |
28 | Sukanya Manna, Tom Gedeon |
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 14-20, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Gain of Words, Gain of Sentences, term significance, Information retrieval, summarization, investigation |
28 | Steve Counsell, George Loizou, Rajaa Najjar |
Quality of manual data collection in Java software: an empirical investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 12(3), pp. 275-293, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Java, Software metrics, Data collection, Empirical investigation |
28 | Slim Rekhis, Noureddine Boudriga |
A formal logic-based language and an automated verification tool for computer forensic investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 287-291, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
S-TLA+, S-TLC, formal forensic investigation, temporal logic of security actions |
26 | Long Chen 0022, Guoyin Wang 0001 |
An Efficient Piecewise Hashing Method for Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 635-638, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
File system investigation, Hash, Digital forensics, Computer forensics |
26 | Meredith Ringel Morris, Eric Horvitz |
S3: Storable, Shareable Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (1) ![In: Human-Computer Interaction - INTERACT 2007, 11th IFIP TC 13 International Conference, Rio de Janeiro, Brazil, September 10-14, 2007, Proceedings, Part I, pp. 120-123, 2007, Springer, 978-3-540-74794-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
persistent search, Web search, exploratory search, investigation |
26 | Bob Breeden, Judie Mulholland |
Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 288-292, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ICAC, internet crimes against children, proactive investigation, training, forensics, law enforcement |
26 | Jennifer Jie Xu 0001, Hsinchun Chen |
CrimeNet explorer: a framework for criminal network knowledge discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 23(2), pp. 201-226, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
complete-link algorithm, crime investigation, clustering, visualization, knowledge discovery, social network analysis, multidimensional scaling, Law enforcement, concept space, precision and recall |
26 | Robert Schaefer |
Software maturity: design as dark art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 34(1), pp. 1-36, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Bayrem Triki, Slim Rekhis, Noureddine Boudriga |
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 179-186, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless digital investigation, wireless sensor networks, wormhole attacks |
24 | Yousheng Liu, Yuxian Wang, Huazhi Xiao |
Application of Active Service Component in Intelligent Investigation System of Specialty Provision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFITA (3) ![In: International Forum on Information Technology and Applications, IFITA 2009, Chengdu, China, 15-17 May 2009, pp. 364-368, 2009, IEEE Computer Society, 978-0-7695-3600-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
demand perception, intellectualization, code generation initiative, investigation system of specialty provision, component, active service |
24 | Jewan Bang, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee 0002 |
Analysis of Time Information for Digital Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 1858-1864, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Time, File system, Windows, Digital Investigation |
24 | Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen |
Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligence and Security Informatics ![In: Intelligence and Security Informatics, Techniques and Applications, pp. 121-134, 2008, Springer, 978-3-540-69207-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Forum-based Community, Gray Web Forum, Forum Analysis & Investigation, Crime Lead Discovering, Content Analysis |
24 | Yong-Dal Shin |
New Digital Forensics Investigation Procedure Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM (1) ![In: NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 1, pp. 528-531, 2008, IEEE Computer Society, 978-0-7695-3322-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital crime, digital forensics, investigation |
24 | Marilyn Sue Bogner |
The How and Why of Incident Investigation: Implications for Health Information Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USAB ![In: HCI and Usability for Medicine and Health Care, Third Symposium of the Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society, USAB 2007, Graz, Austria, November, 22, 2007, Proceedings, pp. 323-334, 2007, Springer, 978-3-540-76804-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Incident Investigation, Health Information Technology, Systems, Error, Behavior, User Support |
24 | Wen-Chin Li, Don Harris |
Confucius in Western Cockpits: The Investigation of Long-Term Versus Short-Term Orientation Culture and Aviation Accidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (13) ![In: Engineering Psychology and Cognitive Ergonomics, 7th International Conference, EPCE 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 716-722, 2007, Springer, 978-3-540-73330-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Confucian, Human Factors Analysis and Classification System, Human Error, Cross-culture, Accident Investigation |
24 | Han-Shik Kim, Byung-Seok Kang, Sangheon Pack, Chul-Hee Kang |
Route Investigation for Secure Routing in Mobile Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 163-168, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Martin P. Robillard, Gail C. Murphy |
Automatically Inferring Concern Code from Program Investigation Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 18th IEEE International Conference on Automated Software Engineering (ASE 2003), 6-10 October 2003, Montreal, Canada, pp. 225-235, 2003, IEEE Computer Society, 0-7695-2035-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Massimiliano Di Penta, Sandro Morasca, Alberto Sillitti |
3rd International Workshop on Designing Empirical Studies: Assessing the Effectiveness of Agile Methods (IWDES 2009). ![Search on Bibsonomy](Pics/bibsonomy.png) |
XP ![In: Agile Processes in Software Engineering and Extreme Programming, 10th International Conference, XP 2009, Pula, Sardinia, Italy, May 25-29, 2009. Proceedings, pp. 234-235, 2009, Springer, 978-3-642-01852-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data collection, Empirical investigation |
22 | Bruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese |
Artificial intelligence applied to computer forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 883-888, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
artificial intelligence, multiagent systems, computer forensics, JADE, digital investigation |
22 | Xinyan Zhao, Ge Wei, Lu Tingjie |
Study on consumer demands and merchant participation motives of mobile payment services in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 250-255, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
consumer demands, merchant participation motives, mobile payment, investigation |
22 | Xinyan Zhao, Wei Ge, Tingjie Lu |
Study on consumer demands and merchant participation motives of mobile payment services in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1447-1451, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
consumer demands, merchant participation motives, mobile payment, investigation |
22 | Bruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese, Hugo C. Junior |
MADIK: A Collaborative Multi-agent ToolKit to Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2008 Workshops, OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS 2008, Monterrey, Mexico, November 9-14, 2008. Proceedings, pp. 20-21, 2008, Springer, 978-3-540-88874-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaborative multi-agent systems, computer forensics, JADE, digital investigation, JESS |
22 | Reid Holmes, Andrew Begel |
Deep intellisense: a tool for rehydrating evaporated information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: Proceedings of the 2008 International Working Conference on Mining Software Repositories, MSR 2008 (Co-located with ICSE), Leipzig, Germany, May 10-11, 2008, Proceedings, pp. 23-26, 2008, ACM, 978-1-60558-024-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
code investigation, mining repositories |
22 | Yacine Djemaiel, Noureddine Boudriga |
A global marking scheme for tracing cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 170-174, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
global marking, malicious activity, digital investigation, security attack |
22 | Nayot Poolsapassit, Indrajit Ray |
Investigating Computer Attacks Using Attack Trees. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 331-343, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Forensic investigation, computer attacks, log file filtering, attack tree |
22 | Bruce A. Reinig, Robert O. Briggs, Morgan M. Shepherd, Jerome Yen, Jay F. Nunamaker Jr. |
Developing and validating an instrument to measure the impact of group support technology on affective reward. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 798-807, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
group support technology, group productivity, user resistance, excitation transfer, affective reward, emotionally unfulfilled, laboratory investigation, groupware, human factors, business data processing, social aspects of automation, team effectiveness |
22 | Daniel D. Harrison, M. P. Weir |
High-Speed Triangulation-Based 3-D Imaging with Orthonormal Data Projections and Error Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 12(4), pp. 409-416, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
surface topography measurement, triangulation-based 3-D imaging, orthonormal data projections, charge-injection-device image sensor, laser-based investigation system, printed-circuit board inspection, laser beam applications, surface topography measurement, computer vision, error detection, inspection, CCD image sensors, CCD image sensors, printed circuit testing |
22 | Robert Law |
Using student blogs for documentation in software development projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2011, Darmstadt, Germany, June 27-29, 2011, pp. 366, 2011, ACM, 978-1-4503-0697-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Mario Trottini, Krishnamurty Muralidhar, Rathindra Sarathy |
A Preliminary Investigation of the Impact of Gaussian Versus t-Copula for Data Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 127-138, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tail Dependence, Copula, Data Perturbation, Data Masking |
19 | Chris W. Johnson 0001 |
Using IEC 61508 to Guide the Investigation of Computer-Related Incidents and Accidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings, pp. 410-424, 2003, Springer, 3-540-20126-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Peng Ji, Junzhou Luo |
A Feedback and Investigation Based Resources Discovery and Management Model on Computational Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (2) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II, pp. 211-214, 2003, Springer, 3-540-21993-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Robert L. Sedlmeyer, Marc J. Lipman |
Computer-aided investigation in graph theory (abstract only). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the 13th ACM Annual Conference on Computer Science, New Orleans, Louisiana, USA, 1985, pp. 418, 1985, ACM, 0-89791-150-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
18 | Mayu Iwata, Takahiro Hara, Shojiro Nishio |
How Different are Preferences of Children and Adults on Web Pages? ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 394-399, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Children, Preference, Web page, Investigation |
18 | Matthew Simon, Jill Slay |
Recovery of Skype Application Activity Data from Physical Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 283-288, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Electronic evidence, RAM forensics, Volatile memory forensics, Computer forensics, Digital evidence, Digital investigation |
18 | Norsaremah Salleh, Emilia Mendes, John C. Grundy, Giles St. J. Burch |
An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (1) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 577-586, 2010, ACM, 978-1-60558-719-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
conscientiousness, five-factor model, formal experiment, higher education, pair programming, empirical investigation, personality type |
18 | Wen-Chin Li, Don Harris, Lon-Wen Li, Thomas Wang |
The Differences of Aviation Human Factors between Individualism and Collectivism Culture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (4) ![In: Human-Computer Interaction. Interacting in Various Application Domains, 13th International Conference, HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings, Part IV, pp. 723-730, 2009, Springer, 978-3-642-02582-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Human Factors, Cross-culture, Aviation Safety, Accident Investigation |
18 | SeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee 0002 |
A Stepwise Methodology for Tracing Computer Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 1852-1857, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
selectively acquisition, pre-investigation, PIM |
18 | Feng Jing |
Application of 3S Technology to the Updating Survey of Land. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESIAT (1) ![In: 2009 International Conference on Environmental Science and Information Application Technology, ESIAT 2009, Wuhan, China, 4-5 July 2009, 3 Volumes, pp. 604-607, 2009, IEEE Computer Society, 978-0-7695-3682-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3S technology, land survey, updating investigation |
18 | Yan Zhang, Bin Xu, Qiao Liang |
Groundwater Quality Research Based on PDA and 3S Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESIAT (2) ![In: 2009 International Conference on Environmental Science and Information Application Technology, ESIAT 2009, Wuhan, China, 4-5 July 2009, 3 Volumes, pp. 301-305, 2009, IEEE Computer Society, 978-0-7695-3682-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Groundwater Quality Investigation, Jinghui Canal irrigation zones, GIS, PDA, groundwater |
18 | Marcel Worring, Rita Cucchiara |
Multimedia in forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009, pp. 1153-1154, 2009, ACM, 978-1-60558-608-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
forensic investigation, forensic mining, multimedia search, pattern recognition, computer vision, surveillance |
18 | Yiming Yang, Subramaniam Ganapathy, Abhay Harpale |
Protein identification as an information retrieval problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2009, Boston, MA, USA, July 19-23, 2009, pp. 752-753, 2009, ACM, 978-1-60558-483-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
interdisciplinary investigation, vector space models, tandem mass spectra, protein identification |
18 | Sebastian Adam, Kizito Ssamula Mukasa, Kai Breiner, Marcus Trapp |
An apartment-based metaphor for intuitive interaction with ambient assisted living applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (1) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 1, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 67-75, 2008, BCS, 978-1-906124-04-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
apartment metaphor, navigation structure, ubiquitous interactivity, usability, accessibility, ambient intelligence, metaphor, ambient assisted living, empirical investigation |
18 | Bogdan Werth, Scott Moss |
Intrusion of Agent-Based Social Simulation in Economic Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MABS ![In: Multi-Agent-Based Simulation IX, International Workshop, MABS 2008, Estoril, Portugal, May 12-13, 2008, Revised Selected Papers, pp. 17-32, 2008, Springer, 978-3-642-01990-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
transaction cost theory, investigation of economic theory, outsourcing, agent-based modeling, model validation, offshoring, transaction cost economics |
18 | Li Ding, Brandon Dixon |
Using an edge-dual graph and k-connectivity to identify strong connections in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 475-480, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
crime investigation, strong connections, social network analysis, law enforcement, k-connectivity |
18 | Paolo Casari, Michele Rossi, Michele Zorzi |
Fountain codes and their application to broadcasting in underwater networks: performance modeling and relevant tradeoffs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Underwater Networks ![In: Proceedings of the Third Workshop on Underwater Networks, WUWNET 2008, San Francisco, California, USA, September 15, 2007, pp. 11-18, 2008, ACM, 978-1-60558-185-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
performance investigation, modeling, broadcast, underwater acoustic networks, hybrid ARQ, fountain codes |
18 | Alta de Waal, Jacobus Venter, Etienne Barnard |
Applying Topic Modeling to Forensic Data. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 115-126, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
analysis phase, evidence mining, topic modeling, Digital investigation |
18 | Katrin Franke |
Stroke-Morphology Analysis Using Super-Imposed Writing Movements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings, pp. 204-217, 2008, Springer, 978-3-540-85302-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
residual ink trace, writing behavior, combined on/offline handwriting analysis, forensic investigation, signature verification |
18 | Katrin Franke, Sargur N. Srihari |
Computational Forensics: An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings, pp. 1-10, 2008, Springer, 978-3-540-85302-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Forensic science, Investigation services, Artificial intelligence, Computational science, Computer science, Law enforcement |
18 | Thomas Wilde, Thomas Hess |
Forschungsmethoden der Wirtschaftsinformatik. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinf. ![In: Wirtschaftsinf. 49(4), pp. 280-287, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Information Systems, Methodology, Comparison, Research Methods, Empirical Investigation, Longitudinal Analysis |
18 | Philippe A. Palanque, Sandra Basnyat, David Navarre |
Improving Interactive Systems Usability Using Formal Description Techniques: Application to HealthCare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USAB ![In: HCI and Usability for Medicine and Health Care, Third Symposium of the Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society, USAB 2007, Graz, Austria, November, 22, 2007, Proceedings, pp. 21-40, 2007, Springer, 978-3-540-76804-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Incident and Accident Investigation, Human-Computer Interaction, Medical Informatics, Formal Description Techniques, Patient Monitoring |
18 | I. F. Shishkin, A. G. Sergushev |
Space-Extensive Targets Radar Search in the Presence of Noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IF&GIS ![In: Third International Workshop on Information Fusion and Geographical Information Systems - IF&GIS'07, St. Petersburg, Russia, May 27-29, 2007. Proceedings, pp. 316-322, 2007, Springer, 978-3-540-37628-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Theory of search, search of space-extensive targets, efficiency of searching aids, search of traces on the sea surface, investigation of traces in water areas |
18 | Amy J. Ko, Brad A. Myers, Michael J. Coblenz, Htet Htet Aung |
An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 32(12), pp. 971-987, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Program investigation, program comprehension, program understanding, empirical software engineering, information foraging, information scent |
18 | Daniela E. Damian, James Chisan |
An Empirical Study of the Complex Relationships between Requirements Engineering Processes and Other Processes that Lead to Payoffs in Productivity, Quality, and Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 32(7), pp. 433-453, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
process interactions, Requirements engineering, process improvement, empirical investigation |
18 | James William Rust |
Corporate management of computer forensics evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 175-178, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
management, information security, computer forensics, hackers, digital evidence, investigation, incident response |
18 | Martin P. Robillard, Gail C. Murphy |
Just-in-time concern modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-3, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
program investigation, separation of concerns, inconsistency management, concern modeling |
18 | Greg Goth, Barton C. Massey |
In the News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 22(6), pp. 98-102, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Medsphere, SpikeSource, Center for Open Source Investigation, Gluecode, Cloudscape, SourceForge.net, JBoss, Business Readiness Rating, Java Enterprise Middleware Server, GNU Lesser General Public License, Larry Wall, OSCON, O'Reilly, Drupal Content Management Systems Conference, Asterisk OSS, Linux desktop, Linux, open source software, open source software, PHP, Perl, Ruby on Rails, WebSphere |
18 | Imran Majid, Martin P. Robillard |
NaCIN: an Eclipse plug-in for program navigation-based concern inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eTX ![In: Proceedings of the 2005 OOPSLA workshop on Eclipse Technology eXchange, ETX 2005, San Diego, California, USA, October 16-17, 2005, pp. 70-74, 2005, ACM, 1-59593-342-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
concern inference, program investigation, program navigation, concern modeling |
18 | Katerina Pastra, Horacio Saggion, Yorick Wilks |
Intelligent Indexing of Crime Scene Photographs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 18(1), pp. 55-61, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
text-based image indexing, relational fact, crime investigation technology, image retrieval, image indexing |
18 | Daniel Micusík, Viera Stopjaková, Lubica Benusková |
Application of Feed-forward Artificial Neural Networks to the Identification of Defective Analog Integrated Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 11(1), pp. 71-79, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Circuits response investigation, Fault modelling and simulation, Resilient-backpropagation neural networks, Signal filtering, Supply current analysis |
18 | Klaus Julisch, Marc Dacier |
Mining intrusion detection alarms for actionable knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-26, 2002, Edmonton, Alberta, Canada, pp. 366-375, 2002, ACM, 1-58113-567-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
alarm investigation, episode rules, data mining, intrusion detection, conceptual clustering |
18 | Martin J. Shepperd, Chris Schofield |
Estimating Software Project Effort Using Analogies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 23(11), pp. 736-743, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
estimation process, case-based reasoning, analogy, Effort prediction, empirical investigation |
17 | Jun Moriyama, Yasushi Kato, Yoshika Aoki, Akihito Kito, Maryam Behnoodi, Youichi Miyagawa, Masashi Matsuura |
Self-efficacy and learning experience of information education: in case of junior high school. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 23(2), pp. 309-325, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 |
A Field Guide to Hidden Accounting Information Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 146-150, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng |
Criminal Record Matching Based on the Vector Space Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 386, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 23679 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|