|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 806 occurrences of 449 keywords
|
|
|
Results
Found 10938 publication records. Showing 10938 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Mark Hartong, Rajni Goel, Duminda Wijesekera |
A Framework for Investigating Railroad Accidents. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
Positive train control, centralized logging, accident investigations |
31 | Golden G. Richard III, Vassil Roussev, Lodovico Marziale |
In-Place File Carving. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
File carving, in-place carving |
31 | Mark Pollitt, Sujeet Shenoi (eds.) |
Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, February 13-16, 2005 |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Martin S. Olivier, Sujeet Shenoi (eds.) |
Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006 |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Patrick Juola |
Authorship Attribution for Electronic Documents. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Simson L. Garfinkel, David J. Malan, Karl-Alexander Dubec, Christopher C. Stevens, Cecile Pham |
AFF: An Open Extensible Format for Disk Imaging. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Kenneth Straka, Gavin Manes |
Passive Detection of NAT Routers and Client Counting. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Shelly Seier, David Greer, Gavin Manes |
Linking Individuals to Digital Information. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Anthony G. Persaud, Yong Guan |
Collusion Detection Using Multimedia Fingerprints. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Paul Burke, Philip Craiger |
Assessing Trace Evidence Left by Secure Deletion Programs. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Scott Piper, Mark Davis, Sujeet Shenoi |
Countering Hostile Forensic Techniques. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | James S. Okolica, Gilbert L. Peterson, Robert F. Mills |
Using PLSI-U to Detect Insider Threats from Email Traffic. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier |
Applying Machine Trust Models to Forensic Investigations. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Jacobus Venter |
Process Flow Diagrams for Training and Operations. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter |
Analysis of Web Proxy Logs. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Sudhir Aggarwal, Bob Breeden, Peter Henry, Judie Mulholland |
A Training Tool for Internet Crimes Against Children Cases. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Mark Hartong, Rajni Goel, Duminda Wijesekera |
Use-Misuse Case Driven Analysis of Positive Train Control. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Mark Davis, Richard Kennedy, Kristina Pyles, Amanda Strickler, Sujeet Shenoi |
Detecting Data Concealment Programs Using File System Analysis. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Mark Pollitt, Anthony Whitledge |
Exploring Big Haystacks: Data Mining and Knowledge Management. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Indrajit Ray |
Remote Upload of Evidence over Mobile Ad Hoc Networks. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Tinus Strauss, Martin S. Olivier, Derrick G. Kourie |
Logical Traffic Isolation Using Differentiated Services. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Pavel Gershteyn, Mark Davis, Sujeet Shenoi |
Forensic Analysis of BIOS Chips. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Eric Cronin, Micah Sherr, Matt Blaze |
On the Reliability of Network Eavesdropping Tools. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Golden G. Richard III, Vassil Roussev |
File System Support for Digital Evidence Bags. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Tetsuya Ishii |
Criminal Regulation of Anti-Forensic Tools in Japan. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon |
Identifying Digital Cameras Using CFA Interpolation. |
IFIP Int. Conf. Digital Forensics |
2006 |
DBLP BibTeX RDF |
|
31 | Benjamin P. Turnbull, Barry Blundell, Jill Slay |
Googling Forensics. |
Australian Computer, Network & Information Forensics Conference |
2005 |
DBLP BibTeX RDF |
|
31 | Gilbert L. Peterson |
Forensic Analysis of Digital Image Tampering. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Michael Losavio |
Non-Technical Manipulation of Digital Data - Legal, Ethical and Social Issues. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Anthony G. Persaud, Yong Guan |
A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Christopher Swenson, Gavin Manes, Sujeet Shenoi |
Imaging and Analysis of GSM SIM Cards. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter |
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Mark Davis, Gavin Manes, Sujeet Shenoi |
A Network-Based Architecture for Storing Digital Evidence. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi |
Extracting Concealed Data from BIOS Chips. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Nicole Beebe, Jan Guynes Clark |
Dealing with Terabyte Datasets in Digital Investigations. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Svein Yngvar Willassen |
Forensic Analysis of Mobile Phone Internal Memory. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi |
Detecting Hidden Data in Ext2/Ext3 File Systems. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael |
Making Decisions about Legal Responses to Cyber Attacks. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Philip Craiger |
Recovering Digital Evidence from Linux Systems. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Pallavi Kahai, Mannivannan Srinivasan, Kameswara Rao Namuduri |
Forensic Profiling System. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Jill Slay, Kris Jorgensen |
Applying Filter Clusters to Reduce Search State Space. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Yusuf Motara, Barry Irwin |
In-Kernel Cryptographic Executable Verification. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier |
Exploring Forensic Data with Self-Organizing Maps. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Thomas Duval, Bernard Jouga, Laurent Roger |
The Mitnick Case: How Bayes Could Have Helped. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Michael D. Hoeschele, Marcus K. Rogers |
Detecting Social Engineering. |
IFIP Int. Conf. Digital Forensics |
2005 |
DBLP BibTeX RDF |
|
31 | Bradley L. Schatz, George M. Mohay, Andrew J. Clark |
Generalising Event Forensics Across Multiple Domains. |
Australian Computer, Network & Information Forensics Conference |
2004 |
DBLP BibTeX RDF |
|
31 | George M. Mohay, Kevin Chen, Andrew J. Clark |
ECF - Event Correlation for Forensics. |
Australian Computer, Network & Information Forensics Conference |
2003 |
DBLP BibTeX RDF |
|
31 | David Cartwright |
Architectural Innovations for Enterprise Forensics. |
Australian Computer, Network & Information Forensics Conference |
2003 |
DBLP BibTeX RDF |
|
31 | Melisa Bleasdale, Scott Mann, John Patzakis |
Computer Forensics in the Global Enterprise. |
Australian Computer, Network & Information Forensics Conference |
2003 |
DBLP BibTeX RDF |
|
31 | Ashwin Swaminathan, Min Wu 0001, K. J. Ray Liu |
Digital Image Forensics via Intrinsic Fingerprints. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ashwin Swaminathan, Min Wu 0001, K. J. Ray Liu |
Nonintrusive Component Forensics of Visual Sensors Using Output Images. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
27 | David Billard, Rolf Hauri |
Making sense of unstructured flash-memory dumps. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
file carving, flash-memory dumps, cell phone, computer forensics, forensics |
27 | Chang-Tsun Li, Yue Li 0013 |
Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour Images. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
digital crime, digital watermarking, digital forensics, computational forensics, Image authentication |
27 | Olivier Y. de Vel |
Learning Semi-Structured Document Categorization Using Bounded-Length Spectrum Sub-Sequence Kernels. |
Data Min. Knowl. Discov. |
2006 |
DBLP DOI BibTeX RDF |
bounded-length spectrum, support vector machines, kernel, suffix tree, digital forensics, computer forensics, document categorization, Naive Bayes classifier |
24 | Yan Zhang, Ying Lin |
Research on the Key Technology of Secure Computer Forensics. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
integerity, secure evidence, computer forensics, digital evidence |
24 | Thomas Gloe, Rainer Böhme |
The 'Dresden Image Database' for benchmarking digital image forensics. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
camera model identification, image source identification, benchmarking, forgery detection, digital image forensics |
24 | Grant Osborne, Benjamin P. Turnbull, Jill Slay |
The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
digital forensics, information visualisation |
24 | Robert F. Erbacher |
Validation for Digital Forensics. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Legal and Privacy Issues, Validation, Computer Security, Error, Digital Forensics |
24 | Jingshan Huang, Alec Yasinsac, Patrick J. Hayes |
Knowledge Sharing and Reuse in Digital Forensics. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
heterogeneous semantics and semantic integration, knowledge sharing, digital forensics, ontology matching |
24 | George Abboud, Jeffrey S. Marean, Roman V. Yampolskiy |
Steganography and Visual Cryptography in Computer Forensics. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
depiction forensic fonts, visualization, digital forensics |
24 | Syed Naqvi, Gautier Dallons, Christophe Ponsard |
Applying Digital Forensics in the Future Internet Enterprise Systems - European SME's Perspective. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
Networked Enterprise Security, Digital Forensics, Future Internet |
24 | Fred Cohen |
Fonts for Forensics. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
depiction forensic fonts, visualization, digital forensics |
24 | Amelia Phillips, Kara L. Nance |
Computer Forensics Investigators or Private Investigators: Who Is Investigating the Drive?. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
certification, digital forensics, licensing |
24 | |
Mobile Phone Forensics: Challenges, Analysis and Tools Classification. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
SIM, Mobile, Analysis, Tools, Messages, Evidence, Forensics, Pyramid |
24 | Antonio Savoldi, Paolo Gubian, Isao Echizen |
How to Deal with Blurriness in Live Forensics: A Case of Study. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Live forensics, Volatile memory, Blurriness, Error measure |
24 | Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu |
A Comparative Study of Forensic Science and Computer Forensics. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Forensic Science, Computer Forensics, Comparative Study |
24 | Lin Chen, Zhitang Li, Cuixia Gao, Lan Liu 0003 |
Dynamic Forensics Based on Intrusion Tolerance. |
ISPA |
2009 |
DBLP DOI BibTeX RDF |
dynamic forensics, finite state machine, intrusion tolerance |
24 | Wiger van Houten, Zeno J. M. H. Geradts |
Using Sensor Noise to Identify Low Resolution Compressed Videos from YouTube. |
IWCF |
2009 |
DBLP DOI BibTeX RDF |
Photo Response Non Uniformity, Video Camera Identification, Pattern Noise, MSN Messenger, Windows Live Messenger, Digital Forensics, YouTube, Low resolution |
24 | Yong-Dal Shin |
New Digital Forensics Investigation Procedure Model. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
digital crime, digital forensics, investigation |
24 | Benjamin P. Turnbull, Jill Slay |
Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
wireless networking, digital evidence, network forensics |
24 | Bruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese, Hugo C. Junior |
MADIK: A Collaborative Multi-agent ToolKit to Computer Forensics. |
OTM Workshops |
2008 |
DBLP DOI BibTeX RDF |
collaborative multi-agent systems, computer forensics, JADE, digital investigation, JESS |
24 | Eric Kee, Hany Farid |
Printer profiling for forensics and ballistics. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
document authentication, printer ballistics, digital forensics, digital tampering |
24 | Laurence D. Merkle |
Automated network forensics. |
GECCO (Companion) |
2008 |
DBLP DOI BibTeX RDF |
computational intelligence, network forensics |
24 | Akira Otaka, Tsuyoshi Takagi, Osamu Takahashi |
Network Forensics on Mobile Ad-Hoc Networks. |
KES (3) |
2008 |
DBLP DOI BibTeX RDF |
backward incidence, mobile ad hoc networks, security policy, network forensics |
24 | Brian D. Carrier, Clay Shields |
The session token protocol for forensics and traceback. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
TCP traceback, auditing and intrusion detection, privacy, Digital forensics, digital investigations |
24 | Bruce Schneier, John Kelsey |
Secure Audit Logs to Support Computer Forensics. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
authenthication, intrusion detection, auditing, computer forensics, hash chains, audit logs |
24 | Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu 0001 |
Extracting compiler provenance from program binaries. |
PASTE |
2010 |
DBLP DOI BibTeX RDF |
program provenance, static binary analysis, forensics |
24 | Kamaruddin Malik Mohamad, Mustafa Mat Deris |
Fragmentation Point Detection of JPEG Images at DHT Using Validator. |
FGIT |
2009 |
DBLP DOI BibTeX RDF |
File Carving, Digital Forensics, Digital Evidence, Data Recovery |
24 | Craig S. Wright, Dave Kleiman, Shyaam Sundhar R. S. |
Overwriting Hard Drive Data: The Great Wiping Controversy. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Data Wipe, Secure Wipe, Digital Forensics, Format |
24 | Daniel M. Purcell, Sheau-Dong Lang |
Forensic Artifacts of Microsoft Windows Vista System. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Windows Vista, NTFS, symbolic link, recycle bin, paging file, print spooling, artifacts, forensics, thumbnail |
24 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
24 | Rodrigo Chandia, Jesús González 0004, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi |
Security Strategies for SCADA Networks. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA networks, forensics, security services |
24 | Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang |
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Forensics and Evidence, internet attacks, website systems |
24 | Yun Q. Shi 0001, Chunhua Chen 0001, Guorong Xuan, Wei Su 0001 |
Steganalysis Versus Splicing Detection. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
splicing detection, natural image model, Steganography, steganalysis, digital forensics, tampering detection |
24 | Bhavani Thuraisingham |
Multimedia systems security. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
multimedia data management, security, data mining, privacy, policies, digital watermarking, video analysis, multimedia systems, surveillance, computer forensics |
24 | Yun Q. Shi 0001, Chunhua Chen 0001, Wen Chen 0002 |
A natural image model approach to splicing detection. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
block discrete cosine transform, splicing detection, statistical moment, markov process, digital forensics |
24 | Yong-Ho Kim, Dong Hwi Lee, Kuinam J. Kim |
A Stable Evidence Collection Procedure of a Volatile Data in Research. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
Information Security, Digital Forensics, Digital Evidence |
24 | Lawrence W. Hill |
An inexpensive method to shield wireless devices during hardware forensic investigation in a laboratory setting. |
SIGITE Conference |
2007 |
DBLP DOI BibTeX RDF |
Faraday shield, RF filtering and shielding, cellular telephony, electromagnetic radiation, IT education, forensics, laboratory |
24 | Deborah A. Frincke, S. Oudekirk, B. Popovsky |
Editorial: Special issue on resources for the computer security and information assurance curriculum: Issue 1. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
security, protection, Computer forensics |
24 | Bob Breeden, Judie Mulholland |
Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
ICAC, internet crimes against children, proactive investigation, training, forensics, law enforcement |
24 | Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis |
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
Privacy Enhancing Technologies, Network Forensics |
24 | Young Chul Kwon, Sang Won Lee, Songchun Moon |
Personal Computer Privacy: Analysis for Korean PC Users. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
data forensics, privacy |
24 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Security, Honeypots, Forensics, Honeynets |
24 | Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou |
Scalable discovery of hidden emails from large folders. |
KDD |
2005 |
DBLP DOI BibTeX RDF |
hidden email, text mining, forensics |
24 | Michael A. Caloyannides |
Digital "Evidence" and Reasonable Doubt. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
analog data, privacy, digital forensics, digital evidence, data entry |
24 | Giovanni Vigna, Andrew Mitchel |
Mnemosyne: Designing and Implementing Network Short-Term Memory. |
ICECCS |
2002 |
DBLP DOI BibTeX RDF |
Incident Analysis, Intrusion Detection, Network Security, Network Forensics |
24 | Philip A. Collier, Barry J. Spaul |
A forensic methodology for countering computer crime. |
Artif. Intell. Rev. |
1992 |
DBLP DOI BibTeX RDF |
Forensics, Computer crime |
22 | Herminia Beatriz Parra de Gallo, Marcela Vegetti |
OntoFoCE and ObE Forensics. Email-traceability supporting tools for digital forensics. |
J. Univers. Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Qingqing Wang, Dengpan Ye |
Robust Anti-forensics on Audio Forensics System. |
ICIC (5) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Elena Becker, Maanak Gupta, Feras M. Awaysheh |
Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements. |
DASC/PiCom/CBDCom/CyberSciTech |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 10938 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|