Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Xuejia Lai, Dawu Gu, Bo Jin, Yongquan Wang, Hui Li (eds.) |
Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![Springer, 978-3-642-23601-3 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Can Mo, Hui Li 0006, Hui Zhu 0001 |
A Stream Pattern Matching Method for Traffic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 131-140, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lianhai Wang, Lijuan Xu, Shuhui Zhang |
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 90-98, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou |
Live Memory Acquisition through FireWire. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 159-167, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hao Peng 0002, Songnian Lu, Jianhua Li 0001, Aixin Zhang, Dandan Zhao |
An Anonymity Scheme Based on Pseudonym in P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 287-293, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodong Lin 0001, Rongxing Lu, Kevin Foxton, Xuemin (Sherman) Shen |
An Efficient Searchable Encryption Scheme and Its Application in Network Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 66-78, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hong Guo, Bo Jin, Daoli Huang |
Research and Review on Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 224-233, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ning Ding 0001, Dawu Gu, Zhiqiang Liu 0001 |
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 241-255, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Wang |
Study on Supervision of Integrity of Chain of Custody in Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 200-206, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai |
On Different Categories of Cybercrime in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 277-281, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marti Ksionsk, Ping Ji 0002, Weifeng Chen 0001 |
Attacks on BitTorrent - An Experimental Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 79-89, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin |
Text Content Filtering Based on Chinese Character Reconstruction from Radicals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 234-240, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ying Zhang |
Face and Lip Tracking for Person Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 282-286, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Gong, Yong Zhao, Jianhua Liao |
Research on the Application Security Isolation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 294-300, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen |
Enhance Information Flow Tracking with Function Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 179-184, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodong Lin 0001, Chenxi Zhang, Theodora Dule |
On Achieving Encrypted File Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 1-13, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhenxing Lei, Theodora Dule, Xiaodong Lin 0001 |
A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 53-65, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Przemyslaw Blaskiewicz, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Digital Signatures for e-Government - A Long-Term Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 256-270, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun |
A Privilege Separation Method for Security Commercial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 185-192, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Saif M. Al-Kuwari, Stephen D. Wolthusen |
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 207-223, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong |
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 122-130, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hwei-Ming Ying, Vrizlynn L. L. Thing |
A Novel Inequality-Based Fragmented File Carving Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 28-39, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lynn Margaret Batten, Lei Pan 0002 |
Using Relationship-Building in Event Profiling for Digital Forensic Investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 40-52, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xudong Zhu, Hui Li 0006, Zhijing Liu |
Behavior Clustering for Anomaly Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 14-27, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng |
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 99-109, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo |
Digital Forensic Analysis on Runtime Instruction Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 168-178, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Beihua Wu |
SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 271-276, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Junkai Yi, Shuo Tang, Hui Li 0027 |
Data Recovery Based on Intelligent Pattern Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 193-199, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun |
Investigating the Implications of Virtualization for Digital Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 110-121, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liping Ding, Jian Gu, Yongji Wang 0002, JingZheng Wu |
Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 301-311, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xinyan Zha, Sartaj Sahni |
Fast in-Place File Carving for Digital Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers, pp. 141-158, 2010, Springer, 978-3-642-23601-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Clare Sullivan |
Digital Identity - The Legal Person?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 195-211, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
legal person, national identity scheme, Digital identity |
1 | Benjamin P. Turnbull, Grant Osborne, Matthew Simon |
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 36-41, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia |
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 1-9, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hybrid Evo-lutionary Algorithm, EANN, Neural Network, Handwritten Character Recognition |
1 | Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet |
Vocal Forgery in Forensic Sciences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 179-185, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
disguised voices, identification, SVM classifier, voice conversion |
1 | Heikki Kokkinen, Janne Nöyränen |
Forensics for Detecting P2P Network Originated MP3 Files on the User Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 10-18, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Peer-to-peer, P2P, copyright, forensics, MP3, legal, binary classification |
1 | Chang-Tsun Li |
Detection of Block Artifacts for Digital Forensic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 173-178, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
block detection, block artifacts detection, Digital forensics, computational forensics |
1 | Timothy Neville, Matthew Sorell |
Audit Log for Forensic Photography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 142-152, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
crime investigation, forensic investigation, digital negative, Digital photography |
1 | Sabine Cikic, Fritz Lehmann-Grube, Jan Sablatnig |
Surveillance and Datenschutz in Virtual Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 212-219, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virtual surveillance, privacy, virtual environment |
1 | Yue Li 0013, Chang-Tsun Li |
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 166-172, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PRNU noise pattern, source device identification, Digital forensics, integrity verification |
1 | Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri |
Image Encryption Using Chaotic Signal and Max-Heap Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 19-28, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Max-Heap Tree, Chaotic Signal, Image Encryption |
1 | Sriram Raghavan, Andrew J. Clark, George M. Mohay |
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 83-94, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy |
Investigating Encrypted Material. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 29-35, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext |
1 | Jill Slay, Elena Sitnikova |
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 77-82, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, forensics, process control systems, SCADA |
1 | Matthew Sorell (eds.) |
Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![Springer, 978-3-642-02311-8 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Milton H. Luoma, Vicki Miller Luoma |
Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 186-194, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multinational litigation, electronic discovery, privacy rights, litigation rights |
1 | Xue-Guang Wang, Zhen-Chuan Chai |
A Provable Security Scheme of ID-Based Threshold Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 122-129, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Threshold decryption, provable security, ID based cryptography |
1 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 160-165, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
1 | Kosta Haltis, Lee Andersson, Matthew Sorell, Russell S. A. Brinkworth |
Surveillance Applications of Biologically-Inspired Smart Cameras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 65-76, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
digital video processing, Surveillance, image enhancement, motion detection, biological vision |
1 | Simon Knight 0002, Simon Moschou, Matthew Sorell |
Analysis of Sensor Photo Response Non-Uniformity in RAW Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 130-141, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
source identification, sensor noise, reference noise pattern, digital forensic |
1 | Trupti Shiralkar, Michael K. Lavine, Benjamin P. Turnbull |
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 116-121, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua |
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 42-53, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Discrete Pascal Transform, Fragile Watermarking, Biomedical Image, Content Authentication |
1 | Lei Pan 0002, Lynn Margaret Batten |
Robust Correctness Testing for Digital Forensic Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 54-64, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
correctness testing, data carving tools, digital forensics |
1 | Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff |
Developing Speaker Recognition System: From Prototype to Practical Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 102-115, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Caldelli, Irene Amerini, Francesco Picchioni |
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 95-101, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
source identification, sensor noise, digital forensic, scanner |
1 | Chang-Tsun Li, Yue Li 0013 |
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 153-159, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Medical image authentication, digital watermarking, data hiding, digital forensics, integrity verification |
1 | Liangming Liu, Daxiang Xiang, Xinyi Dong, Zheng Zhou |
Improvement of the drought monitoring model based on the cloud parameters method and remote sensing data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 63, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael I. Cohen |
Advanced JPEG carving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 16, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marie-Charlotte Poilpré, Patrick Perrot, Hugues Talbot |
Image tampering detection using Bayer interpolation and JPEG compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 17, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Braden J. Phillips, Cain D. Schmidt, Daniel R. Kelly |
Recovering data from USB flash memory sticks that have been damaged or electronically erased. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 19, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu |
Cloud model-based data attributes reduction for clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 60, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dennis K. Nilsson, Ulf Larson |
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 8, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jianhong Luo, Dezhao Chen |
An enhanced ART2 neural network for clustering analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 57, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shipu Zheng, Yuesheng Zhu, Xing Wang |
A new RST-invariant watermarking scheme based on texture features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 23, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Migliardi, Roberto Podestá, Matteo Tebaldi, Massimo Maresca |
Hiding Skype VoIP calls from parametric identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 11, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhengbing Hu, Zhitang Li, Junqi Wu |
A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 45, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yuechao Ding |
A new method: multi-factor trend regression and its application to economy forecast in Jiangxi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 36, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhongni Wang, Xianchuan Yu, Li-bao Zhang |
A remote sensing image fusion algorithm based on ordinal fast independent component analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 54, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hyungkeun Jee, Jooyoung Lee, Dowon Hong |
High speed search for large-scale digital forensic investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 31, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Eggendorfer |
Methods to identify spammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 7, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yong-li Zhu, Xin-ying Wang, Dong-ling Cheng |
Ontology-based research on wind power plant information interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 48, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Carmen Duthoit, Tamara Sztynda, S. K. L. Lal, Budi Thomas Jap, Johnson I. Agbinya |
Optical flow image analysis of facial expressions of human emotion: forensic applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 5, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ke Chen, Jia Wang |
The data mining technology based on CIMS and its application on automotive remanufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 40, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shouning Qu, Bing Zhang, Xinsheng Yu, Qin Wang 0006 |
The development and application of Chinese intelligent question answering system based on J2EE technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 41, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | John Haggerty, David Llewellyn-Jones, Mark John Taylor |
FORWEB: file fingerprinting for automated network forensics investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 29, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohzeki, Masaru Sakurai |
SVD-based watermark with quasi-one-way operation by reducing a singular value matrix rank. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 21, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nigel A. Spooner, Barnaby W. Smith |
Luminescence analysis for radiological and nuclear forensic application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 27, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lili Cai, Fugeng Song, Deling Yuan |
Study on the application of SVM in supplier primary election. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 39, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xu Yusheng, Zhixin Ma, Li Lian, Tharam S. Dillon |
Effective pruning strategies for sequential pattern mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 35, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xinshi Luo, Sivakumar Balakrishnan, Peter Osvath, Gerry Swiegers |
DatatraceDNA®: a novel authentic technology for forensic detections and identifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 26, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | José Miguel Rubio León |
Knowledge management in the ubiquitous software development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 51, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xinyu Duan, Ping Jiang |
Research of a virtual 3D study pattern based on constructive theory in e-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 65, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Keonwoo Kim, Dowon Hong, Kyoil Chung |
Forensics for Korean cell phone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 30, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoliang Jia, Zhenming Zhang, Xitian Tian |
Research and application on typical process knowledge discovery in mechanical manufacturing enterprise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 38, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yixin Zhang |
Coupling analysis of regional economic structure system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 61, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel |
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 9, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Eunju Baek, Yeog Kim, Jinwon Sung, Sangjin Lee 0002 |
The design of framework for detecting an insider's leak of confidential information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 14, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Fu Duan, Yongjie Han, Qiuyong Zhao, Keming Xie |
Towards self-tuning of dynamic resources for workloads. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 43, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wei Guo, Ke Chen, Jia Wang |
An empirical study on improving the manufacturing informatization index system of China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 56, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Young-Soo Kim, Sang-Su Lee, Dowon Hong |
Suspects' data hiding at remaining registry values of uninstalled programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 32, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Giada Maggenti, Andrea Bracciali, Paolo Mancarella |
Abduction and legal reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 33, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dezheng Zhang, Lixin Gao, Huansheng Zhang, Jianming Liu |
Centrality research on the traditional Chinese medicine network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 59, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sabine Cikic, Sven Grottke, Fritz Lehmann-Grube, Jan Sablatnig |
Cheat-prevention and -analysis in online virtual worlds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 13, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin P. Turnbull |
The adaptability of electronic evidence acquisition guides for new technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 1, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Gupta 0002, Josef Pieprzyk |
Reversible and blind database watermarking using difference expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 24, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Orlando Durán, Nibaldo Rodríguez, Luiz Airton Consalter |
A PSO-based clustering algorithm for manufacturing cell design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 53, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhiming Liu 0007, Cheng Wang, Jian Li |
Solving constrained optimization via a modified genetic particle swarm optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 49, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jill Slay, Matthew Simon |
Voice over IP forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 10, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Sorell, Lang White (eds.) |
1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-Forensics ![ICST/ACM, 978-963-9799-19-6 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Svein Yngvar Willassen |
Timestamp evidence correlation by model based clock hypothesis testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008, pp. 15, 2008, ICST/ACM, 978-963-9799-19-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|