researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
Filter by Tag
OR
AND
NOT
1
Meta-Environment
analysis
architecture
control systems
data-flow
e-science
meta-model
multimedia
ontologies
ontology
open-source
p2p
rule-based
security
source-to-source
systematic-approach
testing
watermarking
Filter by Author
[+]
OR
AND
NOT
1
Antionette W.-T. Goh
Benjamin Turnbull
Bo Jin
Chang-Tsun Li
Dawu Gu
Daxiang Xiang
Dezheng Zhang
Dowon Hong
Fariborz Mahmoudi
Fritz Lehmann-Grube
Huansheng Zhang
Hui Li
Jan Sablatnig
Jia Wang
Jian Gu
Lianhai Wang
Matthew Sorell
Sabine Cikic
Xiaodong Lin
Xinyi Dong
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
application
applications
china
data
detection
digital
e
evidence
forensic
forensics
images
information
method
model
network
research
study
system
using
e-Forensics (eforensics)
Editions
Publications
Viewing Publication 1 - 100 from 123
2011
Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers
Xuejia Lai
,
Dawu Gu
,
Bo Jin
,
Yongquan Wang
,
Hui Li
, editors,
Volume 56 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2011.
[doi]
1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-FORENSICS 2008, Adelaide, Australia, January 21-23, 2008
Matthew Sorell
,
Lang White
, editors,
ACM,
2011.
[doi]
2010
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles
Saif Al-Kuwari
,
Stephen D. Wolthusen
.
eforensics 2011
:
207-223
[doi]
Using Relationship-Building in Event Profiling for Digital Forensic Investigations
Lynn Margaret Batten
,
Lei Pan
.
eforensics 2011
:
40-52
[doi]
Digital Signatures for e-Government - A Long-Term Security Architecture
Przemyslaw Blaskiewicz
,
Przemyslaw Kubiak
,
Miroslaw Kutylowski
.
eforensics 2011
:
256-270
[doi]
A Privilege Separation Method for Security Commercial Transactions
Yasha Chen
,
Jun Hu
,
Xinmao Gai
,
Yu Sun
.
eforensics 2011
:
185-192
[doi]
Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree
Liping Ding
,
Jian Gu
,
Yongji Wang
,
JingZheng Wu
.
eforensics 2011
:
301-311
[doi]
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
Ning Ding
,
Dawu Gu
,
Zhiqiang Liu
.
eforensics 2011
:
241-255
[doi]
Research on the Application Security Isolation Model
Lei Gong
,
Yong Zhao
,
Jianhua Liao
.
eforensics 2011
:
294-300
[doi]
Research and Review on Computer Forensics
Hong Guo
,
Bo Jin
,
Daoli Huang
.
eforensics 2011
:
224-233
[doi]
Text Content Filtering Based on Chinese Character Reconstruction from Radicals
Wenlei He
,
Gongshen Liu
,
Jun Luo
,
Jiuchuan Lin
.
eforensics 2011
:
234-240
[doi]
Attacks on BitTorrent - An Experimental Study
Marti Ksionsk
,
Ping Ji
,
Weifeng Chen
.
eforensics 2011
:
79-89
[doi]
A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space
Zhenxing Lei
,
Theodora Dule
,
Xiaodong Lin
.
eforensics 2011
:
53-65
[doi]
Digital Forensic Analysis on Runtime Instruction Flow
Juanru Li
,
Dawu Gu
,
Chaoguo Deng
,
Yuhao Luo
.
eforensics 2011
:
168-178
[doi]
On Achieving Encrypted File Recovery
Xiaodong Lin
,
Chenxi Zhang
,
Theodora Dule
.
eforensics 2011
:
1-13
[doi]
An Efficient Searchable Encryption Scheme and Its Application in Network Forensics
Xiaodong Lin
,
Rongxing Lu
,
Kevin Foxton
,
Xuemin (Sherman) Shen
.
eforensics 2011
:
66-78
[doi]
A Stream Pattern Matching Method for Traffic Analysis
Can Mo
,
Hui Li
,
Hui Zhu
.
eforensics 2011
:
131-140
[doi]
An Anonymity Scheme Based on Pseudonym in P2P Networks
Hao Peng
,
Songnian Lu
,
Jianhua Li
,
Aixin Zhang
,
Dandan Zhao
.
eforensics 2011
:
287-293
[doi]
Investigating the Implications of Virtualization for Digital Forensics
Zheng Song
,
Bo Jin
,
Yinghong Zhu
,
Yongqing Sun
.
eforensics 2011
:
110-121
[doi]
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images
Lianhai Wang
,
Lijuan Xu
,
Shuhui Zhang
.
eforensics 2011
:
90-98
[doi]
Study on Supervision of Integrity of Chain of Custody in Computer Forensics
Yi Wang
.
eforensics 2011
:
200-206
[doi]
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow
Yong Wang
,
Dawu Gu
,
Jianping Xu
,
Mi Wen
,
Liwen Deng
.
eforensics 2011
:
99-109
[doi]
SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web Applications
Beihua Wu
.
eforensics 2011
:
271-276
[doi]
On Different Categories of Cybercrime in China
Aidong Xu
,
Yan Gong
,
Yongquan Wang
,
Nayan Ai
.
eforensics 2011
:
277-281
[doi]
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System
Lijuan Xu
,
Lianhai Wang
,
Lei Zhang
,
Zhigang Kong
.
eforensics 2011
:
122-130
[doi]
Data Recovery Based on Intelligent Pattern Matching
Junkai Yi
,
Shuo Tang
,
Hui Li
.
eforensics 2011
:
193-199
[doi]
A Novel Inequality-Based Fragmented File Carving Technique
Hwei-Ming Ying
,
Vrizlynn L. L. Thing
.
eforensics 2011
:
28-39
[doi]
Fast in-Place File Carving for Digital Forensics
Xinyan Zha
,
Sartaj Sahni
.
eforensics 2011
:
141-158
[doi]
Face and Lip Tracking for Person Identification
Ying Zhang
.
eforensics 2011
:
282-286
[doi]
Live Memory Acquisition through FireWire
Lei Zhang
,
Lianhai Wang
,
Ruichao Zhang
,
Shuhui Zhang
,
Yang Zhou
.
eforensics 2011
:
159-167
[doi]
Enhance Information Flow Tracking with Function Recognition
Kan Zhou
,
Shiqiu Huang
,
Zhengwei Qi
,
Jian Gu
,
Beijun Shen
.
eforensics 2011
:
179-184
[doi]
Behavior Clustering for Anomaly Detection
Xudong Zhu
,
Hui Li
,
Zhijing Liu
.
eforensics 2011
:
14-27
[doi]
2009
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis
Roberto Caldelli
,
Irene Amerini
,
Francesco Picchioni
.
eforensics 2009
:
95-101
[doi]
Surveillance and Datenschutz in Virtual Environments
Sabine Cikic
,
Fritz Lehmann-Grube
,
Jan Sablatnig
.
eforensics 2009
:
212-219
[doi]
Developing Speaker Recognition System: From Prototype to Practical Application
Pasi Fränti
,
Juhani Saastamoinen
,
Ismo Kärkkäinen
,
Tomi Kinnunen
,
Ville Hautamäki
,
Ilja Sidoroff
.
eforensics 2009
:
102-115
[doi]
Surveillance Applications of Biologically-Inspired Smart Cameras
Kosta Haltis
,
Lee Andersson
,
Matthew Sorell
,
Russell S. A. Brinkworth
.
eforensics 2009
:
65-76
[doi]
Analysis of Sensor Photo Response Non-Uniformity in RAW Images
Simon Knight
,
Simon Moschou
,
Matthew Sorell
.
eforensics 2009
:
130-141
[doi]
Forensics for Detecting P2P Network Originated MP3 Files on the User Device
Heikki Kokkinen
,
Janne Nöyränen
.
eforensics 2009
:
10-18
[doi]
Detection of Block Artifacts for Digital Forensic Analysis
Chang-Tsun Li
.
eforensics 2009
:
173-178
[doi]
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis
Yue Li
,
Chang-Tsun Li
.
eforensics 2009
:
166-172
[doi]
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking
Chang-Tsun Li
,
Yue Li
.
eforensics 2009
:
153-159
[doi]
Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights
Milton H. Luoma
,
Vicki Miller Luoma
.
eforensics 2009
:
186-194
[doi]
Image Encryption Using Chaotic Signal and Max-Heap Tree
Fariborz Mahmoudi
,
Rasul Enayatifar
,
Mohsen Mirzashaeri
.
eforensics 2009
:
19-28
[doi]
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network
Fariborz Mahmoudi
,
Mohsen Mirzashaeri
,
Ehsan Shahamatnia
,
Saed Faridnia
.
eforensics 2009
:
1-9
[doi]
Investigating Encrypted Material
Niall McGrath
,
Pavel Gladyshev
,
M. Tahar Kechadi
,
Joe Carthy
.
eforensics 2009
:
29-35
[doi]
Audit Log for Forensic Photography
Timothy Neville
,
Matthew Sorell
.
eforensics 2009
:
142-152
[doi]
Robust Correctness Testing for Digital Forensic Tools
Lei Pan
,
Lynn Margaret Batten
.
eforensics 2009
:
54-64
[doi]
Cyber Forensics Ontology for Cyber Criminal Investigation
Heum Park
,
SunHo Cho
,
Hyuk-Chul Kwon
.
eforensics 2009
:
160-165
[doi]
Vocal Forgery in Forensic Sciences
Patrick Perrot
,
Mathieu Morel
,
Joseph Razik
,
Gérard Chollet
.
eforensics 2009
:
179-185
[doi]
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence
Sriram Raghavan
,
Andrew Clark
,
George M. Mohay
.
eforensics 2009
:
83-94
[doi]
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC
Trupti Shiralkar
,
Michael Lavine
,
Benjamin Turnbull
.
eforensics 2009
:
116-121
[doi]
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems
Jill Slay
,
Elena Sitnikova
.
eforensics 2009
:
77-82
[doi]
Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers
Matthew Sorell
, editor,
Volume 8 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2009.
[doi]
Digital Identity - The Legal Person?
Clare Sullivan
.
eforensics 2009
:
195-211
[doi]
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source
Benjamin Turnbull
,
Grant Osborne
,
Matthew Simon
.
eforensics 2009
:
36-41
[doi]
A Provable Security Scheme of ID-Based Threshold Decryption
Xue-Guang Wang
,
Zhen-Chuan Chai
.
eforensics 2009
:
122-129
[doi]
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt
M. L. Dennis Wong
,
Antionette W.-T. Goh
,
Hong Siang Chua
.
eforensics 2009
:
42-53
[doi]
2008
Document forensics based on steganographic anti-counterfeiting markings and mobile architectures
Fokko Beekhof
,
Sviatoslav Voloshynovskiy
,
Oleksiy J. Koval
,
Renato Villán
,
Emre Topak
.
eforensics 2011
:
28
[doi]
Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols
Halil-Ibrahim Bulbul
,
Ihsan Batmaz
,
Mesut Ozel
.
eforensics 2011
:
9
[doi]
Study on the application of SVM in supplier primary election
Lili Cai
,
Fugeng Song
,
Deling Yuan
.
eforensics 2011
:
39
[doi]
Cheat-prevention and -analysis in online virtual worlds
Sabine Cikic
,
Sven Grottke
,
Fritz Lehmann-Grube
,
Jan Sablatnig
.
eforensics 2011
:
13
[doi]
Using a room metaphor for e-forensic working environments
Sabine Cikic
,
Sabina Jeschke
,
Fritz Lehmann-Grube
,
Jan Sablatnig
.
eforensics 2011
:
3
[doi]
Advanced JPEG carving
Michael I. Cohen
.
eforensics 2011
:
16
[doi]
A new method: multi-factor trend regression and its application to economy forecast in Jiangxi
Yuechao Ding
.
eforensics 2011
:
36
[doi]
Towards self-tuning of dynamic resources for workloads
Fu Duan
,
Yongjie Han
,
Qiuyong Zhao
,
Keming Xie
.
eforensics 2011
:
43
[doi]
A PSO-based clustering algorithm for manufacturing cell design
Orlando Durán
,
Nibaldo Rodríguez
,
Luiz Airton Consalter
.
eforensics 2011
:
53
[doi]
Optical flow image analysis of facial expressions of human emotion: forensic applications
Carmen Duthoit
,
Tamara Sztynda
,
S. K. L. Lal
,
Budi Thomas Jap
,
Johnson I. Agbinya
.
eforensics 2011
:
5
[doi]
Methods to identify spammers
Tobias Eggendorfer
.
eforensics 2011
:
7
[doi]
Analysis of a zero location based authentication scheme for biomedical images
Antionette W.-T. Goh
,
M. L. Dennis Wong
,
Raphael C.-W. Phan
.
eforensics 2011
:
22
[doi]
Application of tetrahedral mesh model based on neural network in solid mineral reserve estimation
Junfang Gong
,
Xincai Wu
,
Xiuguo Liu
,
Shengwen Li
.
eforensics 2011
:
66
[doi]
FORWEB: file fingerprinting for automated network forensics investigations
John Haggerty
,
David Llewellyn-Jones
,
Mark John Taylor
.
eforensics 2011
:
29
[doi]
Grasping related words of unknown word for automatic extension of lexical dictionary
Myunggwon Hwang
,
Jong-An Park
,
Sunkyoung Baek
,
PanKoo Kim
,
Junho Choi
.
eforensics 2011
:
62
[doi]
High speed search for large-scale digital forensic investigation
Hyungkeun Jee
,
Jooyoung Lee
,
Dowon Hong
.
eforensics 2011
:
31
[doi]
Research and application on typical process knowledge discovery in mechanical manufacturing enterprise
Xiaoliang Jia
,
Zhenming Zhang
,
Xitian Tian
.
eforensics 2011
:
38
[doi]
Forensics for Korean cell phone
Keonwoo Kim
,
Dowon Hong
,
Kyoil Chung
.
eforensics 2011
:
30
[doi]
Explosive blast effects on latent fingerprints
Valerian A. Kuznetsov
,
Jadranka Sunde
,
Michael Thomas
.
eforensics 2011
:
25
[doi]
Knowledge management in the ubiquitous software development
José Miguel Rubio León
.
eforensics 2011
:
51
[doi]
Improvement of the drought monitoring model based on the cloud parameters method and remote sensing data
Liangming Liu
,
Daxiang Xiang
,
Xinyi Dong
,
Zheng Zhou
.
eforensics 2011
:
63
[doi]
DatatraceDNA®: a novel authentic technology for forensic detections and identifications
Xinshi Luo
,
Sivakumar Balakrishnan
,
Peter Osvath
,
Gerry Swiegers
.
eforensics 2011
:
26
[doi]
An enhanced ART2 neural network for clustering analysis
Jianhong Luo
,
Dezhao Chen
.
eforensics 2011
:
57
[doi]
Recovery of circumstantial digital evidence leading to an Anton Piller order: a case study
Roland MacKenzie
,
Matthew Sorell
.
eforensics 2011
:
20
[doi]
Abduction and legal reasoning
Giada Maggenti
,
Andrea Bracciali
,
Paolo Mancarella
.
eforensics 2011
:
33
[doi]
Hiding Skype VoIP calls from parametric identification
Mauro Migliardi
,
Roberto Podestá
,
Matteo Tebaldi
,
Massimo Maresca
.
eforensics 2011
:
11
[doi]
Conducting forensic investigations of cyber attacks on automobile in-vehicle networks
Dennis K. Nilsson
,
Ulf Larson
.
eforensics 2011
:
8
[doi]
SVD-based watermark with quasi-one-way operation by reducing a singular value matrix rank
Kazuo Ohzeki
,
Masaru Sakurai
.
eforensics 2011
:
21
[doi]
Recovering data from USB flash memory sticks that have been damaged or electronically erased
Braden J. Phillips
,
Cain D. Schmidt
,
Daniel R. Kelly
.
eforensics 2011
:
19
[doi]
Voice over IP forensics
Jill Slay
,
Matthew Simon
.
eforensics 2011
:
10
[doi]
Conditions for effective detection and identification of primary quantization of re-quantized JPEG images
Matthew Sorell
.
eforensics 2011
:
18
[doi]
Luminescence analysis for radiological and nuclear forensic application
Nigel A. Spooner
,
Barnaby W. Smith
.
eforensics 2011
:
27
[doi]
A customer satisfaction degree evaluation model based on support vector machine
Wang Ting
,
Hua Zhiwu
.
eforensics 2011
:
37
[doi]
Automatic voice activity detection in different speech applications
Marko Tuononen
,
Rosa González Hautamäki
,
Pasi Fränti
.
eforensics 2011
:
12
[doi]
The adaptability of electronic evidence acquisition guides for new technologies
Benjamin Turnbull
.
eforensics 2011
:
1
[doi]
Timestamp evidence correlation by model based clock hypothesis testing
Svein Yngvar Willassen
.
eforensics 2011
:
15
[doi]
Forensics in cyber-space: the legal challenges
Nigel Wilson
.
eforensics 2011
:
2
[doi]
Video motion detection beyond reasonable doubt
Zhuo Xiao
,
Amirsaman Poursoltanmohammadi
,
Matthew Sorell
.
eforensics 2011
:
6
[doi]
A discussion information-structuring model based on the Toulmin formalism
Caiquan Xiong
,
Ying Pan
,
Dehua Li
.
eforensics 2011
:
44
[doi]
Mining high utility itemsets in large high dimensional data
Guangzhu Yu
,
Keqing Li
,
Shihuang Shao
.
eforensics 2011
:
47
[doi]
Effective pruning strategies for sequential pattern mining
Xu Yusheng
,
Zhixin Ma
,
Li Lian
,
Tharam S. Dillon
.
eforensics 2011
:
35
[doi]
Cooperation forensic computing research
Youdong Zhang
.
eforensics 2011
:
34
[doi]
Ontology-based research on wind power plant information interaction
Yong-li Zhu
,
Xin-ying Wang
,
Dong-ling Cheng
.
eforensics 2011
:
48
[doi]
Sign in
or
sign up
to see more results.