Login / Signup
Transferring trusted logs across vulnerable paths for digital forensics.
Akihiro Tomono
Minoru Uehara
Yuji Shimada
Published in:
MoMM (2009)
Keyphrases
</>
digital forensics
forensic analysis
law enforcement
computer forensics
transfer learning
shortest path
optimal path
path finding
authorship attribution
website
social media
mobile robot
distributed environment
path length
log analysis
health sciences