The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "E-Forensics"( http://dblp.L3S.de/Venues/E-Forensics )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eforensics

Publication years (Num. hits)
2008 (67) 2009 (25) 2010 (30) 2011 (1)
Publication types (Num. hits)
inproceedings(120) proceedings(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 49 occurrences of 42 keywords

Results
Found 123 publication records. Showing 123 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Xuejia Lai, Dawu Gu, Bo Jin, Yongquan Wang, Hui Li (eds.) Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers Search on Bibsonomy e-Forensics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Can Mo, Hui Li 0006, Hui Zhu 0001 A Stream Pattern Matching Method for Traffic Analysis. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lianhai Wang, Lijuan Xu, Shuhui Zhang Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou Live Memory Acquisition through FireWire. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hao Peng 0002, Songnian Lu, Jianhua Li 0001, Aixin Zhang, Dandan Zhao An Anonymity Scheme Based on Pseudonym in P2P Networks. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiaodong Lin 0001, Rongxing Lu, Kevin Foxton, Xuemin (Sherman) Shen An Efficient Searchable Encryption Scheme and Its Application in Network Forensics. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hong Guo, Bo Jin, Daoli Huang Research and Review on Computer Forensics. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ning Ding 0001, Dawu Gu, Zhiqiang Liu 0001 Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yi Wang Study on Supervision of Integrity of Chain of Custody in Computer Forensics. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai On Different Categories of Cybercrime in China. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marti Ksionsk, Ping Ji 0002, Weifeng Chen 0001 Attacks on BitTorrent - An Experimental Study. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin Text Content Filtering Based on Chinese Character Reconstruction from Radicals. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ying Zhang Face and Lip Tracking for Person Identification. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lei Gong, Yong Zhao, Jianhua Liao Research on the Application Security Isolation Model. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen Enhance Information Flow Tracking with Function Recognition. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiaodong Lin 0001, Chenxi Zhang, Theodora Dule On Achieving Encrypted File Recovery. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhenxing Lei, Theodora Dule, Xiaodong Lin 0001 A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Przemyslaw Blaskiewicz, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Digital Signatures for e-Government - A Long-Term Security Architecture. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun A Privilege Separation Method for Security Commercial Transactions. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Saif M. Al-Kuwari, Stephen D. Wolthusen On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hwei-Ming Ying, Vrizlynn L. L. Thing A Novel Inequality-Based Fragmented File Carving Technique. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lynn Margaret Batten, Lei Pan 0002 Using Relationship-Building in Event Profiling for Digital Forensic Investigations. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xudong Zhu, Hui Li 0006, Zhijing Liu Behavior Clustering for Anomaly Detection. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo Digital Forensic Analysis on Runtime Instruction Flow. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Beihua Wu SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web Applications. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junkai Yi, Shuo Tang, Hui Li 0027 Data Recovery Based on Intelligent Pattern Matching. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun Investigating the Implications of Virtualization for Digital Forensics. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liping Ding, Jian Gu, Yongji Wang 0002, JingZheng Wu Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xinyan Zha, Sartaj Sahni Fast in-Place File Carving for Digital Forensics. Search on Bibsonomy e-Forensics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Clare Sullivan Digital Identity - The Legal Person?. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF legal person, national identity scheme, Digital identity
1Benjamin P. Turnbull, Grant Osborne, Matthew Simon Legal and Technical Implications of Collecting Wireless Data as an Evidence Source. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hybrid Evo-lutionary Algorithm, EANN, Neural Network, Handwritten Character Recognition
1Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet Vocal Forgery in Forensic Sciences. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF disguised voices, identification, SVM classifier, voice conversion
1Heikki Kokkinen, Janne Nöyränen Forensics for Detecting P2P Network Originated MP3 Files on the User Device. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Peer-to-peer, P2P, copyright, forensics, MP3, legal, binary classification
1Chang-Tsun Li Detection of Block Artifacts for Digital Forensic Analysis. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block detection, block artifacts detection, Digital forensics, computational forensics
1Timothy Neville, Matthew Sorell Audit Log for Forensic Photography. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF crime investigation, forensic investigation, digital negative, Digital photography
1Sabine Cikic, Fritz Lehmann-Grube, Jan Sablatnig Surveillance and Datenschutz in Virtual Environments. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF virtual surveillance, privacy, virtual environment
1Yue Li 0013, Chang-Tsun Li Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PRNU noise pattern, source device identification, Digital forensics, integrity verification
1Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri Image Encryption Using Chaotic Signal and Max-Heap Tree. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Max-Heap Tree, Chaotic Signal, Image Encryption
1Sriram Raghavan, Andrew J. Clark, George M. Mohay FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy Investigating Encrypted Material. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext
1Jill Slay, Elena Sitnikova The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, forensics, process control systems, SCADA
1Matthew Sorell (eds.) Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Milton H. Luoma, Vicki Miller Luoma Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multinational litigation, electronic discovery, privacy rights, litigation rights
1Xue-Guang Wang, Zhen-Chuan Chai A Provable Security Scheme of ID-Based Threshold Decryption. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Threshold decryption, provable security, ID based cryptography
1Heum Park, SunHo Cho, Hyuk-Chul Kwon Cyber Forensics Ontology for Cyber Criminal Investigation. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal investigation, cyber forensics, ontology, digital evidence, cyber crime
1Kosta Haltis, Lee Andersson, Matthew Sorell, Russell S. A. Brinkworth Surveillance Applications of Biologically-Inspired Smart Cameras. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF digital video processing, Surveillance, image enhancement, motion detection, biological vision
1Simon Knight 0002, Simon Moschou, Matthew Sorell Analysis of Sensor Photo Response Non-Uniformity in RAW Images. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF source identification, sensor noise, reference noise pattern, digital forensic
1Trupti Shiralkar, Michael K. Lavine, Benjamin P. Turnbull A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Discrete Pascal Transform, Fragile Watermarking, Biomedical Image, Content Authentication
1Lei Pan 0002, Lynn Margaret Batten Robust Correctness Testing for Digital Forensic Tools. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF correctness testing, data carving tools, digital forensics
1Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff Developing Speaker Recognition System: From Prototype to Practical Application. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Roberto Caldelli, Irene Amerini, Francesco Picchioni Distinguishing between Camera and Scanned Images by Means of Frequency Analysis. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF source identification, sensor noise, digital forensic, scanner
1Chang-Tsun Li, Yue Li 0013 Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Medical image authentication, digital watermarking, data hiding, digital forensics, integrity verification
1Liangming Liu, Daxiang Xiang, Xinyi Dong, Zheng Zhou Improvement of the drought monitoring model based on the cloud parameters method and remote sensing data. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michael I. Cohen Advanced JPEG carving. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marie-Charlotte Poilpré, Patrick Perrot, Hugues Talbot Image tampering detection using Bayer interpolation and JPEG compression. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Braden J. Phillips, Cain D. Schmidt, Daniel R. Kelly Recovering data from USB flash memory sticks that have been damaged or electronically erased. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu Cloud model-based data attributes reduction for clustering. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dennis K. Nilsson, Ulf Larson Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jianhong Luo, Dezhao Chen An enhanced ART2 neural network for clustering analysis. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shipu Zheng, Yuesheng Zhu, Xing Wang A new RST-invariant watermarking scheme based on texture features. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mauro Migliardi, Roberto Podestá, Matteo Tebaldi, Massimo Maresca Hiding Skype VoIP calls from parametric identification. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhengbing Hu, Zhitang Li, Junqi Wu A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yuechao Ding A new method: multi-factor trend regression and its application to economy forecast in Jiangxi. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhongni Wang, Xianchuan Yu, Li-bao Zhang A remote sensing image fusion algorithm based on ordinal fast independent component analysis. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hyungkeun Jee, Jooyoung Lee, Dowon Hong High speed search for large-scale digital forensic investigation. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tobias Eggendorfer Methods to identify spammers. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yong-li Zhu, Xin-ying Wang, Dong-ling Cheng Ontology-based research on wind power plant information interaction. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Carmen Duthoit, Tamara Sztynda, S. K. L. Lal, Budi Thomas Jap, Johnson I. Agbinya Optical flow image analysis of facial expressions of human emotion: forensic applications. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ke Chen, Jia Wang The data mining technology based on CIMS and its application on automotive remanufacturing. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shouning Qu, Bing Zhang, Xinsheng Yu, Qin Wang 0006 The development and application of Chinese intelligent question answering system based on J2EE technology. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1John Haggerty, David Llewellyn-Jones, Mark John Taylor FORWEB: file fingerprinting for automated network forensics investigations. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kazuo Ohzeki, Masaru Sakurai SVD-based watermark with quasi-one-way operation by reducing a singular value matrix rank. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nigel A. Spooner, Barnaby W. Smith Luminescence analysis for radiological and nuclear forensic application. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lili Cai, Fugeng Song, Deling Yuan Study on the application of SVM in supplier primary election. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xu Yusheng, Zhixin Ma, Li Lian, Tharam S. Dillon Effective pruning strategies for sequential pattern mining. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xinshi Luo, Sivakumar Balakrishnan, Peter Osvath, Gerry Swiegers DatatraceDNA®: a novel authentic technology for forensic detections and identifications. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1José Miguel Rubio León Knowledge management in the ubiquitous software development. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xinyu Duan, Ping Jiang Research of a virtual 3D study pattern based on constructive theory in e-learning. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Keonwoo Kim, Dowon Hong, Kyoil Chung Forensics for Korean cell phone. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xiaoliang Jia, Zhenming Zhang, Xitian Tian Research and application on typical process knowledge discovery in mechanical manufacturing enterprise. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yixin Zhang Coupling analysis of regional economic structure system. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Eunju Baek, Yeog Kim, Jinwon Sung, Sangjin Lee 0002 The design of framework for detecting an insider's leak of confidential information. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Fu Duan, Yongjie Han, Qiuyong Zhao, Keming Xie Towards self-tuning of dynamic resources for workloads. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wei Guo, Ke Chen, Jia Wang An empirical study on improving the manufacturing informatization index system of China. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Young-Soo Kim, Sang-Su Lee, Dowon Hong Suspects' data hiding at remaining registry values of uninstalled programs. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Giada Maggenti, Andrea Bracciali, Paolo Mancarella Abduction and legal reasoning. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dezheng Zhang, Lixin Gao, Huansheng Zhang, Jianming Liu Centrality research on the traditional Chinese medicine network. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sabine Cikic, Sven Grottke, Fritz Lehmann-Grube, Jan Sablatnig Cheat-prevention and -analysis in online virtual worlds. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Benjamin P. Turnbull The adaptability of electronic evidence acquisition guides for new technologies. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Gaurav Gupta 0002, Josef Pieprzyk Reversible and blind database watermarking using difference expansion. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Orlando Durán, Nibaldo Rodríguez, Luiz Airton Consalter A PSO-based clustering algorithm for manufacturing cell design. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhiming Liu 0007, Cheng Wang, Jian Li Solving constrained optimization via a modified genetic particle swarm optimization. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jill Slay, Matthew Simon Voice over IP forensics. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Matthew Sorell, Lang White (eds.) 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008 Search on Bibsonomy E-Forensics The full citation details ... 2008 DBLP  BibTeX  RDF
1Svein Yngvar Willassen Timestamp evidence correlation by model based clock hypothesis testing. Search on Bibsonomy e-Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 123 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license