Abstract is missing.
- The adaptability of electronic evidence acquisition guides for new technologiesBenjamin Turnbull. 1 [doi]
- Forensics in cyber-space: the legal challengesNigel Wilson. 2 [doi]
- Using a room metaphor for e-forensic working environmentsSabine Cikic, Sabina Jeschke, Fritz Lehmann-Grube, Jan Sablatnig. 3 [doi]
- Searching in space and time: a system for forensic analysis of large video repositoriesAnton van den Hengel, Rhys Hill, Henry Detmold, Anthony R. Dick. 4 [doi]
- Optical flow image analysis of facial expressions of human emotion: forensic applicationsCarmen Duthoit, Tamara Sztynda, S. K. L. Lal, Budi Thomas Jap, Johnson I. Agbinya. 5 [doi]
- Video motion detection beyond reasonable doubtZhuo Xiao, Amirsaman Poursoltanmohammadi, Matthew Sorell. 6 [doi]
- Methods to identify spammersTobias Eggendorfer. 7 [doi]
- Conducting forensic investigations of cyber attacks on automobile in-vehicle networksDennis K. Nilsson, Ulf Larson. 8 [doi]
- Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocolsHalil-Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel. 9 [doi]
- Voice over IP forensicsJill Slay, Matthew Simon. 10 [doi]
- Hiding Skype VoIP calls from parametric identificationMauro Migliardi, Roberto Podestá, Matteo Tebaldi, Massimo Maresca. 11 [doi]
- Automatic voice activity detection in different speech applicationsMarko Tuononen, Rosa González Hautamäki, Pasi Fränti. 12 [doi]
- Cheat-prevention and -analysis in online virtual worldsSabine Cikic, Sven Grottke, Fritz Lehmann-Grube, Jan Sablatnig. 13 [doi]
- The design of framework for detecting an insider's leak of confidential informationEunju Baek, Yeog Kim, Jinwon Sung, Sangjin Lee. 14 [doi]
- Timestamp evidence correlation by model based clock hypothesis testingSvein Yngvar Willassen. 15 [doi]
- Advanced JPEG carvingMichael I. Cohen. 16 [doi]
- Image tampering detection using Bayer interpolation and JPEG compressionMarie-Charlotte Poilpré, Patrick Perrot, Hugues Talbot. 17 [doi]
- Conditions for effective detection and identification of primary quantization of re-quantized JPEG imagesMatthew Sorell. 18 [doi]
- Recovering data from USB flash memory sticks that have been damaged or electronically erasedBraden J. Phillips, Cain D. Schmidt, Daniel R. Kelly. 19 [doi]
- Recovery of circumstantial digital evidence leading to an Anton Piller order: a case studyRoland MacKenzie, Matthew Sorell. 20 [doi]
- SVD-based watermark with quasi-one-way operation by reducing a singular value matrix rankKazuo Ohzeki, Masaru Sakurai. 21 [doi]
- Analysis of a zero location based authentication scheme for biomedical imagesAntionette W.-T. Goh, M. L. Dennis Wong, Raphael C.-W. Phan. 22 [doi]
- A new RST-invariant watermarking scheme based on texture featuresShipu Zheng, Yuesheng Zhu, Xing Wang. 23 [doi]
- Reversible and blind database watermarking using difference expansionGaurav Gupta, Josef Pieprzyk. 24 [doi]
- Explosive blast effects on latent fingerprintsValerian A. Kuznetsov, Jadranka Sunde, Michael Thomas. 25 [doi]
- DatatraceDNA®: a novel authentic technology for forensic detections and identificationsXinshi Luo, Sivakumar Balakrishnan, Peter Osvath, Gerry Swiegers. 26 [doi]
- Luminescence analysis for radiological and nuclear forensic applicationNigel A. Spooner, Barnaby W. Smith. 27 [doi]
- Document forensics based on steganographic anti-counterfeiting markings and mobile architecturesFokko Beekhof, Sviatoslav Voloshynovskiy, Oleksiy J. Koval, Renato Villán, Emre Topak. 28 [doi]
- FORWEB: file fingerprinting for automated network forensics investigationsJohn Haggerty, David Llewellyn-Jones, Mark John Taylor. 29 [doi]
- Forensics for Korean cell phoneKeonwoo Kim, Dowon Hong, Kyoil Chung. 30 [doi]
- High speed search for large-scale digital forensic investigationHyungkeun Jee, Jooyoung Lee, Dowon Hong. 31 [doi]
- Suspects' data hiding at remaining registry values of uninstalled programsYoung-Soo Kim, Sang-Su Lee, Dowon Hong. 32 [doi]
- Abduction and legal reasoningGiada Maggenti, Andrea Bracciali, Paolo Mancarella. 33 [doi]
- Cooperation forensic computing researchYoudong Zhang. 34 [doi]
- Effective pruning strategies for sequential pattern miningXu Yusheng, Zhixin Ma, Li Lian, Tharam S. Dillon. 35 [doi]
- A new method: multi-factor trend regression and its application to economy forecast in JiangxiYuechao Ding. 36 [doi]
- A customer satisfaction degree evaluation model based on support vector machineWang Ting, Hua Zhiwu. 37 [doi]
- Research and application on typical process knowledge discovery in mechanical manufacturing enterpriseXiaoliang Jia, Zhenming Zhang, Xitian Tian. 38 [doi]
- Study on the application of SVM in supplier primary electionLili Cai, Fugeng Song, Deling Yuan. 39 [doi]
- The data mining technology based on CIMS and its application on automotive remanufacturingKe Chen, Jia Wang. 40 [doi]
- The development and application of Chinese intelligent question answering system based on J2EE technologyShouning Qu, Bing Zhang, Xinsheng Yu, Qin Wang. 41 [doi]
- The method engineering process for multi-agent system developmentXiao Xue, Xueyan Zhang. 42 [doi]
- Towards self-tuning of dynamic resources for workloadsFu Duan, Yongjie Han, Qiuyong Zhao, Keming Xie. 43 [doi]
- A discussion information-structuring model based on the Toulmin formalismCaiquan Xiong, Ying Pan, Dehua Li. 44 [doi]
- A novel Network Intrusion Detection System (NIDS) based on signatures search of data miningZhengbing Hu, Zhitang Li, Junqi Wu. 45 [doi]
- Evaluating organization external knowledge acquisitionZhengqiang Bao, Kaizhou Gao, Xiangqing Li, Lei Guo, Hui Zhong. 46 [doi]
- Mining high utility itemsets in large high dimensional dataGuangzhu Yu, Keqing Li, Shihuang Shao. 47 [doi]
- Ontology-based research on wind power plant information interactionYong-li Zhu, Xin-ying Wang, Dong-ling Cheng. 48 [doi]
- Solving constrained optimization via a modified genetic particle swarm optimizationZhiming Liu 0007, Cheng Wang, Jian Li. 49 [doi]
- Process knowledge verification method based on petri netDaliang Wang, Dezheng Zhang, Lixin Gao, Jianming Liu, Huansheng Zhang. 50 [doi]
- Knowledge management in the ubiquitous software developmentJosé Miguel Rubio León. 51 [doi]
- A new cloud detection algorithm for FY-2C images over ChinaDeren Li, Xinyi Dong, Liangming Liu, Daxiang Xiang. 52 [doi]
- A PSO-based clustering algorithm for manufacturing cell designOrlando Durán, Nibaldo Rodríguez, Luiz Airton Consalter. 53 [doi]
- A remote sensing image fusion algorithm based on ordinal fast independent component analysisZhongni Wang, Xianchuan Yu, Li-bao Zhang. 54 [doi]
- An empirical research of multi-classifier fusion methods and diversity measure in remote sensing classificationHongchao Ma, Wei Zhou, Xinyi Dong, Honggen Xu. 55 [doi]
- An empirical study on improving the manufacturing informatization index system of ChinaWei Guo, Ke Chen, Jia Wang. 56 [doi]
- An enhanced ART2 neural network for clustering analysisJianhong Luo, Dezhao Chen. 57 [doi]
- CBERS-02 remote sensing data mining using decision tree algorithmXingping Wen, Guangdao Hu, Xiaofeng Yang. 58 [doi]
- Centrality research on the traditional Chinese medicine networkDezheng Zhang, Lixin Gao, Huansheng Zhang, Jianming Liu. 59 [doi]
- Cloud model-based data attributes reduction for clusteringRuzhi Xu, Peiyao Nie, Peiguang Lin, Dongsheng Chu. 60 [doi]
- Coupling analysis of regional economic structure systemYixin Zhang. 61 [doi]
- Grasping related words of unknown word for automatic extension of lexical dictionaryMyunggwon Hwang, Jong-An Park, Sunkyoung Baek, PanKoo Kim, Junho Choi. 62 [doi]
- Improvement of the drought monitoring model based on the cloud parameters method and remote sensing dataLiangming Liu, Daxiang Xiang, Xinyi Dong, Zheng Zhou. 63 [doi]
- Temporal and spatial analysis on labor productivity of radio and TV industry in ChinaChun Dong, Hongmei Zhang, Tao Wang, Yong Wang, Agen Qiu. 64 [doi]
- Research of a virtual 3D study pattern based on constructive theory in e-learningXinyu Duan, Ping Jiang. 65 [doi]
- Application of tetrahedral mesh model based on neural network in solid mineral reserve estimationJunfang Gong, Xincai Wu, Xiuguo Liu, Shengwen Li. 66 [doi]