The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICDF2C"( http://dblp.L3S.de/Venues/ICDF2C )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icdf2c

Publication years (Num. hits)
2009 (16) 2010-2011 (38) 2012 (21) 2013 (18) 2014-2015 (16) 2017 (18) 2018-2020 (29) 2021 (23) 2022 (29) 2023 (1)
Publication types (Num. hits)
inproceedings(198) proceedings(11)
Venues (Conferences, Journals, ...)
ICDF2C(209)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 209 publication records. Showing 209 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sanjay Goel, Pavel Gladyshev, Akatyev Nikolay, George Markowsky, Daryl Johnson (eds.) Digital Forensics and Cyber Crime - 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings Search on Bibsonomy ICDF2C The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mohsen M. Jozani, Gianluca Zanella, Maxium Khanov, Gokila Dorai, Esra Akbas The Need for Biometric Anti-spoofing Policies: The Case of Etsy. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Milos Stankovic, Tahir M. Khan Digital Forensics Tool Evaluation on Deleted Files. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Raymond H. Chan, Wye Kaye Yan, Jung Man Ma, Kai Mun Loh, Greger Chen Zhi En, Malcolm Y. H. Low, Habib Rehman, Thong Chee Phua MQTT Traffic Collection and Forensic Analysis Framework. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Maryna Veksler, Clara Caspard, Kemal Akkaya Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Samantha Klier, Harald Baier Towards Efficient On-Site CSAM Triage by Clustering Images from a Source Point of View. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fan Yang, Hao Cheng, Shanxiang Lyu Extracting Spread-Spectrum Hidden Data Based on Better Lattice Decoding. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jia Chen, Kunlin Chen, Yongjie Wang, Xuehu Yan, Longlong Li A General Steganalysis Method of QR Codes. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Michael Mundt, Harald Baier Cyber Crime Undermines Data Privacy Efforts - On the Balance Between Data Privacy and Security. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ruichu Yao, Kunsheng Tang, Yongshi Zhu, Bingbing Fan, Tian Luo, Yide Song PBPAFL: A Federated Learning Framework with Hybrid Privacy Protection for Sensitive Data. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhiyuan Hu, Linghang Shi, Huijun Chen, Jinghui Lu Android Mobile Terminal Security Assessment Based on Analytical Hierarchy Process (AHP). Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yutong Zeng, Honghao Yu, Tiejun Wu, Yong Chen, Xing Lan, Cheng Huang CSCD: A Cyber Security Community Detection Scheme on Online Social Networks. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0002, Mark Scanlon, Jimmy McGibney, John Sheppard 0002 Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Daniel Dolejska, Vladimír Veselý, Jan Pluskal, Michal Koutenský Shedding Light on Monopoly: Temporal Analysis of Drug Trades. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jiaxuan Zhou, Umit Karabiyik Forensic Analysis of Webex on the iOS Platform. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Francis N. Nwebonyi, Xiaoyu Du, Pavel Gladyshev Crime and Incident Watch for Smart Cities: A Sensor-Based Approach. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Xiaoyu Du, Francis N. Nwebonyi, Pavel Gladyshev Automating the Flow of Data Between Digital Forensic Tools Using Apache NiFi. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jiaxuan Zhou, Umit Karabiyik Watch Your WeChat Wallet: Digital Forensics Approach on WeChat Payments on Android. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Alejandro Guerra-Manzanares, Hayretdin Bahsi On the Application of Active Learning to Handle Data Evolution in Android Malware Detection. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Seyed Mohammad Hadi Mirsadeghi, Hayretdin Bahsi, Wissem Inbouli Deep Learning-Based Detection of Cyberattacks in Software-Defined Networks. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ke Zhang, Guanghua Zhang, Zhenguo Chen, Xiaojun Zuo IoT Malicious Traffic Detection Based on FSKDE and Federated DIOT-Pysyft. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Pavel Gladyshev, Sanjay Goel, Joshua James, George Markowsky, Daryl Johnson (eds.) Digital Forensics and Cyber Crime - 12th EAI International Conference, ICDF2C 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Qiuming Liu, Zhexin Yao, Zhen Wu, Zeyao Xu Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in VANET. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anass El Moadine, Gouenou Coatrieux, Reda Bellafqira Poisoning-Attack Detection Using an Auto-encoder for Deep Learning Models. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhoushi Sheng, Bo Yu, Chen Liang, Yongyi Zhang VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jia-Hui Xie, Di Wu, Bo-Hao Zhang, Hai Su, Huan Yang Can Image Watermarking Efficiently Protect Deep-Learning-Based Image Classifiers? - A Preliminary Security Analysis of an IP-Protecting Method. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Chengjie Li, Yunchun Zhang, Zixuan Li, Fan Feng, Zikun Liao, Xiaohui Cui The Lightweight Botnet Detection Model Based on the Improved UNet. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Abhishek Bhattarai, Maryna Veksler, Hadi Sahin, Ahmet Kurt, Kemal Akkaya Crypto Wallet Artifact Detection on Android Devices Using Advanced Machine Learning Techniques. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yueqi Li, Sanjay Goel, Kevin J. Williams Are External Auditors Capable of Dealing with Cybersecurity Risks? Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Rahul Varshney, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla Volatility Custom Profiling for Automated Hybrid ELF Malware Detection. Search on Bibsonomy ICDF2C The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Anthony Cheuk Tung Lai, Ken Wai Kin Wong, Johnny Tsz Wun Wong, Austin Tsz Wai Lau, Alan Po Lun Ho, Shuai Wang, Jogesh Muppala Backdoor Investigation and Incident Response: From Zero to Profit. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1M. A. Hannan Bin Azhar, Jake Timms, Benjamin Tilley Forensic Investigations of Google Meet and Microsoft Teams - Two Popular Conferencing Tools in the Pandemic. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Michael Mundt, Harald Baier Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xiaoyi Duan, You Li, Chengyuan Liu, Xiuying Li, Wenfeng Liu, Guoqian Li Research on the Method of Selecting the Optimal Feature Subset in Big Data for Energy Analysis Attack. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua Lightweight On-Demand Honeypot Deployment for Cyber Deception. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alexander Mühle, Andreas Grüner, Christoph Meinel Gotta Catch'em All! Improving P2P Network Crawling Strategies. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Tiffanie Edwards, Syria McCullough, Mohamed Nassar 0001, Ibrahim M. Baggili On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Richard Buurke, Nhien-An Le-Khac Accessing Secure Data on Android Through Application Analysis. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xiaoyu Cao, Neil Zhenqiang Gong Understanding the Security of Deepfake Detection. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zhenzhen Zhang, Henan Shi, Xinghao Jiang, Zhaohong Li, Jindou Liu A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Miguel Martín-Pérez, Ricardo J. Rodríguez Quantifying Paging on Recoverable Data from Windows User-Space Modules. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Elizabeth Wyss, Drew Davidson Parcae: A Blockchain-Based PRF Service for Everyone. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar (eds.) Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zhenzhou Tian, Hengchao Mao, Yaqian Huang, Jie Tian, Jinrui Li Fine-Grained Obfuscation Scheme Recognition on Binary Code. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Thomas Göbel, Frieder Uhlig, Harald Baier Find My IoT Device - An Efficient and Effective Approximate Matching Algorithm to Identify IoT Traffic Flows. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo 0011, Yong Fang 0002, Cheng Huang 0003 No Pie in the Sky: The Digital Currency Fraud Website Detection. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Fatima-Zahra Boujdad, David Niyitegeka, Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Génin, Mario Südholt A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Aikaterini Kanta, Iwen Coisel, Mark Scanlon PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Andrew Mahr, Robert Serafin, Cinthya Grajeda, Ibrahim M. Baggili Auto-Parser: Android Auto and Apple CarPlay Forensics. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Na Li, Haoyu Zhang, Zhihui Hu, Guang Kou, Huadong Dai Automated Software Vulnerability Detection via Pre-trained Context Encoder and Self Attention. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kong Huang, Ke Zhang, Jiongyi Chen, Menghan Sun, Wei Sun, Di Tang, Kehuan Zhang Understanding the Brains and Brawn of Illicit Streaming App. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Max Kilger, Kim-Kwang Raymond Choo Do Dark Web and Cryptocurrencies Empower Cybercriminals? Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Weicong Huang, Qisheng Guang, Dong Jiang, Lijun Chen 0006 Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function. Search on Bibsonomy ICDF2C The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1François Bouchaud, Thomas Vantroys, Gilles Grimaud Evidence Gathering in IoT Criminal Investigation. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Samuel Todd Bromley, John Sheppard 0002, Mark Scanlon, Nhien-An Le-Khac Retracing the Flow of the Stream: Investigating Kodi Streaming Services. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Gengqian Zhou, Jianwei Zhuge Adapting to Local Conditions: Similarities and Differences in Anonymous Online Market Between Chinese and English Speaking Communities. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marcel Busch, Florian Nicolai, Fabian Fleischer, Christian Rückert, Christoph Safferling, Felix C. Freiling Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tobias Latzo Efficient Fingerprint Matching for Forensic Event Reconstruction. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Edgar Padilla, Jaime C. Acosta, Christopher D. Kiekintveld Cybersecurity Methodology for Specialized Behavior Analysis. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Pasquale Ferrara, Gerard Draper-Gil, Ignacio Sanchez, Henrik Junklewitz, Laurent Beslay Modelling GOP Structure Effects on ENF-Based Video Forensics. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lukas Bortnik, Arturs Lavrenovs Android Dumpsys Analysis to Indicate Driver Distraction. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1John Sheppard 0002 A Partial Approach to Intrusion Detection. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiaqi Shi, Gang Wang, Ming Su, Xiaoguang Liu Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zhongmin Wang, Zhen Feng, Zhenzhou Tian Neural Representation Learning Based Binary Code Authorship Attribution. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tom Van der Mussele, Babak Habibnia, Pavel Gladyshev Remote Air-Gap Live Forensics. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marian Waltereit, Maximilian Uphoff, Peter Zdankin, Viktor Matkovic, Torben Weis A Digital Forensic Approach for Optimizing the Investigation of Hit-and-Run Accidents. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jieun Dokko, Michael Shin, Soo Young Park An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target Criminals. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Petr Matousek, Ivana Burgetova, Ondrej Rysavý, Malombe Victor On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. Search on Bibsonomy ICDF2C The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Frank Breitinger, Ibrahim M. Baggili (eds.) Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings Search on Bibsonomy ICDF2C The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Neil C. Rowe Associating Drives Based on Their Artifact and Metadata Distributions. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1John Vieyra, Mark Scanlon, Nhien-An Le-Khac Solid State Drive Forensics: Where Do We Stand? Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel J. Schelkoph, Gilbert L. Peterson, James S. Okolica Digital Forensics Event Graph Reconstruction. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Robert Schmicker, Frank Breitinger, Ibrahim M. Baggili AndroParse - An Android Feature Extraction Framework and Dataset. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hassan Hadi Latheeth Al-Maksousy, Michele C. Weigle Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jaryn Shen, Kim-Kwang Raymond Choo, Qingkai Zeng 0002 Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jieun Dokko, Michael Shin A Digital Forensic Investigation and Verification Model for Industrial Espionage. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Petr Matousek, Martin Schmiedecker (eds.) Digital Forensics and Cyber Crime - 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Avinash Singh, Adeyemi R. Ikuesan, Hein S. Venter Digital Forensic Readiness Framework for Ransomware Investigation. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Raquel Tabuyo-Benito, Hayretdin Bahsi, Pedro Peris-Lopez Forensics Analysis of an On-line Game over Steam Platform. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Trevor Haigh, Frank Breitinger, Ibrahim M. Baggili If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lorenz Liebler, Harald Baier On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Göbel, Harald Baier fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques. Search on Bibsonomy ICDF2C The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu 0020, Kunying Liu, Min Yu 0001 A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Irvin Homem Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David Lillis, Frank Breitinger, Mark Scanlon Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dominik Ernsberger, Adeyemi Richard Ikuesan, Hein S. Venter, Alf Zugenmaier A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Asif Iqbal 0012, Mathias Ekstedt, Hanan Alobaidli Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim M. Baggili An Overview of the Usage of Default Passwords. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charles B. Leopard, Neil C. Rowe, Michael R. McCarrin Memory Forensics and the Macintosh OS X Operating System. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pu Ren, Mingquan Zhou, Jin Liu, Yachun Fan, Wenshuo Zhao, Wuyang Shui Sketch-Based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Konstantia Barmpatsalou, Tiago Cruz 0001, Edmundo Monteiro, Paulo Simões 0001 Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Edward Allen Barton, M. A. Hannan Bin Azhar Open Source Forensics for a Multi-platform Drone System. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lorenz Liebler, Harald Baier Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory Forensics. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1John MacRae, Virginia N. L. Franqueira On Locky Ransomware, Al Capone and Brexit. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl Real-Time Forensics Through Endpoint Visibility. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Vondrácek, Jan Pluskal, Ondrej Rysavý Automation of MitM Attack on Wi-Fi Networks. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ming Xu 0001, Jinkai Sun, Ning Zheng 0001, Tong Qiao, Yiming Wu 0001, Kai Shi, Haidong Ge, Tao Yang A Novel File Carving Algorithm for EVTX Logs. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Neil C. Rowe Finding and Rating Personal Names on Drives for Forensic Needs. Search on Bibsonomy ICDF2C The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 209 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license