Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Xuejia Lai, Dawu Gu, Bo Jin, Yongquan Wang, Hui Li (eds.) |
Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers |
e-Forensics |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Can Mo, Hui Li 0006, Hui Zhu 0001 |
A Stream Pattern Matching Method for Traffic Analysis. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lianhai Wang, Lijuan Xu, Shuhui Zhang |
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou |
Live Memory Acquisition through FireWire. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hao Peng 0002, Songnian Lu, Jianhua Li 0001, Aixin Zhang, Dandan Zhao |
An Anonymity Scheme Based on Pseudonym in P2P Networks. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodong Lin 0001, Rongxing Lu, Kevin Foxton, Xuemin (Sherman) Shen |
An Efficient Searchable Encryption Scheme and Its Application in Network Forensics. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hong Guo, Bo Jin, Daoli Huang |
Research and Review on Computer Forensics. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ning Ding 0001, Dawu Gu, Zhiqiang Liu 0001 |
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Wang |
Study on Supervision of Integrity of Chain of Custody in Computer Forensics. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai |
On Different Categories of Cybercrime in China. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marti Ksionsk, Ping Ji 0002, Weifeng Chen 0001 |
Attacks on BitTorrent - An Experimental Study. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin |
Text Content Filtering Based on Chinese Character Reconstruction from Radicals. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ying Zhang |
Face and Lip Tracking for Person Identification. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Gong, Yong Zhao, Jianhua Liao |
Research on the Application Security Isolation Model. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen |
Enhance Information Flow Tracking with Function Recognition. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodong Lin 0001, Chenxi Zhang, Theodora Dule |
On Achieving Encrypted File Recovery. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhenxing Lei, Theodora Dule, Xiaodong Lin 0001 |
A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Przemyslaw Blaskiewicz, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Digital Signatures for e-Government - A Long-Term Security Architecture. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun |
A Privilege Separation Method for Security Commercial Transactions. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Saif M. Al-Kuwari, Stephen D. Wolthusen |
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong |
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hwei-Ming Ying, Vrizlynn L. L. Thing |
A Novel Inequality-Based Fragmented File Carving Technique. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lynn Margaret Batten, Lei Pan 0002 |
Using Relationship-Building in Event Profiling for Digital Forensic Investigations. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xudong Zhu, Hui Li 0006, Zhijing Liu |
Behavior Clustering for Anomaly Detection. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng |
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo |
Digital Forensic Analysis on Runtime Instruction Flow. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Beihua Wu |
SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web Applications. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Junkai Yi, Shuo Tang, Hui Li 0027 |
Data Recovery Based on Intelligent Pattern Matching. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun |
Investigating the Implications of Virtualization for Digital Forensics. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Liping Ding, Jian Gu, Yongji Wang 0002, JingZheng Wu |
Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xinyan Zha, Sartaj Sahni |
Fast in-Place File Carving for Digital Forensics. |
e-Forensics |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Clare Sullivan |
Digital Identity - The Legal Person?. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
legal person, national identity scheme, Digital identity |
1 | Benjamin P. Turnbull, Grant Osborne, Matthew Simon |
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fariborz Mahmoudi, Mohsen Mirzashaeri, Ehsan Shahamatnia, Saed Faridnia |
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Hybrid Evo-lutionary Algorithm, EANN, Neural Network, Handwritten Character Recognition |
1 | Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet |
Vocal Forgery in Forensic Sciences. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
disguised voices, identification, SVM classifier, voice conversion |
1 | Heikki Kokkinen, Janne Nöyränen |
Forensics for Detecting P2P Network Originated MP3 Files on the User Device. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Peer-to-peer, P2P, copyright, forensics, MP3, legal, binary classification |
1 | Chang-Tsun Li |
Detection of Block Artifacts for Digital Forensic Analysis. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
block detection, block artifacts detection, Digital forensics, computational forensics |
1 | Timothy Neville, Matthew Sorell |
Audit Log for Forensic Photography. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
crime investigation, forensic investigation, digital negative, Digital photography |
1 | Sabine Cikic, Fritz Lehmann-Grube, Jan Sablatnig |
Surveillance and Datenschutz in Virtual Environments. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
virtual surveillance, privacy, virtual environment |
1 | Yue Li 0013, Chang-Tsun Li |
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
PRNU noise pattern, source device identification, Digital forensics, integrity verification |
1 | Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri |
Image Encryption Using Chaotic Signal and Max-Heap Tree. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Max-Heap Tree, Chaotic Signal, Image Encryption |
1 | Sriram Raghavan, Andrew J. Clark, George M. Mohay |
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy |
Investigating Encrypted Material. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext |
1 | Jill Slay, Elena Sitnikova |
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
security, forensics, process control systems, SCADA |
1 | Matthew Sorell (eds.) |
Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Milton H. Luoma, Vicki Miller Luoma |
Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
multinational litigation, electronic discovery, privacy rights, litigation rights |
1 | Xue-Guang Wang, Zhen-Chuan Chai |
A Provable Security Scheme of ID-Based Threshold Decryption. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Threshold decryption, provable security, ID based cryptography |
1 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
1 | Kosta Haltis, Lee Andersson, Matthew Sorell, Russell S. A. Brinkworth |
Surveillance Applications of Biologically-Inspired Smart Cameras. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
digital video processing, Surveillance, image enhancement, motion detection, biological vision |
1 | Simon Knight 0002, Simon Moschou, Matthew Sorell |
Analysis of Sensor Photo Response Non-Uniformity in RAW Images. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
source identification, sensor noise, reference noise pattern, digital forensic |
1 | Trupti Shiralkar, Michael K. Lavine, Benjamin P. Turnbull |
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
|
1 | M. L. Dennis Wong, Antionette W.-T. Goh, Hong Siang Chua |
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Discrete Pascal Transform, Fragile Watermarking, Biomedical Image, Content Authentication |
1 | Lei Pan 0002, Lynn Margaret Batten |
Robust Correctness Testing for Digital Forensic Tools. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
correctness testing, data carving tools, digital forensics |
1 | Pasi Fränti, Juhani Saastamoinen, Ismo Kärkkäinen, Tomi Kinnunen, Ville Hautamäki, Ilja Sidoroff |
Developing Speaker Recognition System: From Prototype to Practical Application. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Caldelli, Irene Amerini, Francesco Picchioni |
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
source identification, sensor noise, digital forensic, scanner |
1 | Chang-Tsun Li, Yue Li 0013 |
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Medical image authentication, digital watermarking, data hiding, digital forensics, integrity verification |
1 | Liangming Liu, Daxiang Xiang, Xinyi Dong, Zheng Zhou |
Improvement of the drought monitoring model based on the cloud parameters method and remote sensing data. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael I. Cohen |
Advanced JPEG carving. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marie-Charlotte Poilpré, Patrick Perrot, Hugues Talbot |
Image tampering detection using Bayer interpolation and JPEG compression. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Braden J. Phillips, Cain D. Schmidt, Daniel R. Kelly |
Recovering data from USB flash memory sticks that have been damaged or electronically erased. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ruzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu |
Cloud model-based data attributes reduction for clustering. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dennis K. Nilsson, Ulf Larson |
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jianhong Luo, Dezhao Chen |
An enhanced ART2 neural network for clustering analysis. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shipu Zheng, Yuesheng Zhu, Xing Wang |
A new RST-invariant watermarking scheme based on texture features. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Migliardi, Roberto Podestá, Matteo Tebaldi, Massimo Maresca |
Hiding Skype VoIP calls from parametric identification. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhengbing Hu, Zhitang Li, Junqi Wu |
A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yuechao Ding |
A new method: multi-factor trend regression and its application to economy forecast in Jiangxi. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhongni Wang, Xianchuan Yu, Li-bao Zhang |
A remote sensing image fusion algorithm based on ordinal fast independent component analysis. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hyungkeun Jee, Jooyoung Lee, Dowon Hong |
High speed search for large-scale digital forensic investigation. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Eggendorfer |
Methods to identify spammers. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yong-li Zhu, Xin-ying Wang, Dong-ling Cheng |
Ontology-based research on wind power plant information interaction. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Carmen Duthoit, Tamara Sztynda, S. K. L. Lal, Budi Thomas Jap, Johnson I. Agbinya |
Optical flow image analysis of facial expressions of human emotion: forensic applications. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ke Chen, Jia Wang |
The data mining technology based on CIMS and its application on automotive remanufacturing. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shouning Qu, Bing Zhang, Xinsheng Yu, Qin Wang 0006 |
The development and application of Chinese intelligent question answering system based on J2EE technology. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | John Haggerty, David Llewellyn-Jones, Mark John Taylor |
FORWEB: file fingerprinting for automated network forensics investigations. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohzeki, Masaru Sakurai |
SVD-based watermark with quasi-one-way operation by reducing a singular value matrix rank. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nigel A. Spooner, Barnaby W. Smith |
Luminescence analysis for radiological and nuclear forensic application. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lili Cai, Fugeng Song, Deling Yuan |
Study on the application of SVM in supplier primary election. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xu Yusheng, Zhixin Ma, Li Lian, Tharam S. Dillon |
Effective pruning strategies for sequential pattern mining. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xinshi Luo, Sivakumar Balakrishnan, Peter Osvath, Gerry Swiegers |
DatatraceDNA®: a novel authentic technology for forensic detections and identifications. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | José Miguel Rubio León |
Knowledge management in the ubiquitous software development. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xinyu Duan, Ping Jiang |
Research of a virtual 3D study pattern based on constructive theory in e-learning. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Keonwoo Kim, Dowon Hong, Kyoil Chung |
Forensics for Korean cell phone. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoliang Jia, Zhenming Zhang, Xitian Tian |
Research and application on typical process knowledge discovery in mechanical manufacturing enterprise. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yixin Zhang |
Coupling analysis of regional economic structure system. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Halil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel |
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Eunju Baek, Yeog Kim, Jinwon Sung, Sangjin Lee 0002 |
The design of framework for detecting an insider's leak of confidential information. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Fu Duan, Yongjie Han, Qiuyong Zhao, Keming Xie |
Towards self-tuning of dynamic resources for workloads. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wei Guo, Ke Chen, Jia Wang |
An empirical study on improving the manufacturing informatization index system of China. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Young-Soo Kim, Sang-Su Lee, Dowon Hong |
Suspects' data hiding at remaining registry values of uninstalled programs. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Giada Maggenti, Andrea Bracciali, Paolo Mancarella |
Abduction and legal reasoning. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dezheng Zhang, Lixin Gao, Huansheng Zhang, Jianming Liu |
Centrality research on the traditional Chinese medicine network. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sabine Cikic, Sven Grottke, Fritz Lehmann-Grube, Jan Sablatnig |
Cheat-prevention and -analysis in online virtual worlds. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin P. Turnbull |
The adaptability of electronic evidence acquisition guides for new technologies. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Gupta 0002, Josef Pieprzyk |
Reversible and blind database watermarking using difference expansion. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Orlando Durán, Nibaldo Rodríguez, Luiz Airton Consalter |
A PSO-based clustering algorithm for manufacturing cell design. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zhiming Liu 0007, Cheng Wang, Jian Li |
Solving constrained optimization via a modified genetic particle swarm optimization. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jill Slay, Matthew Simon |
Voice over IP forensics. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Sorell, Lang White (eds.) |
1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008 |
E-Forensics |
2008 |
DBLP BibTeX RDF |
|
1 | Svein Yngvar Willassen |
Timestamp evidence correlation by model based clock hypothesis testing. |
e-Forensics |
2008 |
DBLP DOI BibTeX RDF |
|