Login / Signup
e-Forensics
2008
2011
2008
2011
Keyphrases
Publications
volume 56, 2011
Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers
e-Forensics
56 (2011)
2010
Przemyslaw Blaskiewicz
,
Przemyslaw Kubiak
,
Miroslaw Kutylowski
Digital Signatures for e-Government - A Long-Term Security Architecture.
e-Forensics
(2010)
Yong Wang
,
Dawu Gu
,
Jianping Xu
,
Mi Wen
,
Liwen Deng
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow.
e-Forensics
(2010)
Can Mo
,
Hui Li
,
Hui Zhu
A Stream Pattern Matching Method for Traffic Analysis.
e-Forensics
(2010)
Juanru Li
,
Dawu Gu
,
Chaoguo Deng
,
Yuhao Luo
Digital Forensic Analysis on Runtime Instruction Flow.
e-Forensics
(2010)
Yi Wang
Study on Supervision of Integrity of Chain of Custody in Computer Forensics.
e-Forensics
(2010)
Saif Al-Kuwari
,
Stephen D. Wolthusen
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles.
e-Forensics
(2010)
Hwei-Ming Ying
,
Vrizlynn L. L. Thing
A Novel Inequality-Based Fragmented File Carving Technique.
e-Forensics
(2010)
Ying Zhang
Face and Lip Tracking for Person Identification.
e-Forensics
(2010)
Xinyan Zha
,
Sartaj Sahni
Fast in-Place File Carving for Digital Forensics.
e-Forensics
(2010)
Wenlei He
,
Gongshen Liu
,
Jun Luo
,
Jiuchuan Lin
Text Content Filtering Based on Chinese Character Reconstruction from Radicals.
e-Forensics
(2010)
Lei Zhang
,
Lianhai Wang
,
Ruichao Zhang
,
Shuhui Zhang
,
Yang Zhou
Live Memory Acquisition through FireWire.
e-Forensics
(2010)
Xudong Zhu
,
Hui Li
,
Zhijing Liu
Behavior Clustering for Anomaly Detection.
e-Forensics
(2010)
Ning Ding
,
Dawu Gu
,
Zhiqiang Liu
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose.
e-Forensics
(2010)
Hao Peng
,
Songnian Lu
,
Jianhua Li
,
Aixin Zhang
,
Dandan Zhao
An Anonymity Scheme Based on Pseudonym in P2P Networks.
e-Forensics
(2010)
Lijuan Xu
,
Lianhai Wang
,
Lei Zhang
,
Zhigang Kong
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System.
e-Forensics
(2010)
Lynn Margaret Batten
,
Lei Pan
Using Relationship-Building in Event Profiling for Digital Forensic Investigations.
e-Forensics
(2010)
Yasha Chen
,
Jun Hu
,
Xinmao Gai
,
Yu Sun
A Privilege Separation Method for Security Commercial Transactions.
e-Forensics
(2010)
Junkai Yi
,
Shuo Tang
,
Hui Li
Data Recovery Based on Intelligent Pattern Matching.
e-Forensics
(2010)
Lei Gong
,
Yong Zhao
,
Jianhua Liao
Research on the Application Security Isolation Model.
e-Forensics
(2010)
Aidong Xu
,
Yan Gong
,
Yongquan Wang
,
Nayan Ai
On Different Categories of Cybercrime in China.
e-Forensics
(2010)
Xiaodong Lin
,
Rongxing Lu
,
Kevin Foxton
,
Xuemin (Sherman) Shen
An Efficient Searchable Encryption Scheme and Its Application in Network Forensics.
e-Forensics
(2010)
Zhenxing Lei
,
Theodora Dule
,
Xiaodong Lin
A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space.
e-Forensics
(2010)
Hong Guo
,
Bo Jin
,
Daoli Huang
Research and Review on Computer Forensics.
e-Forensics
(2010)
Zheng Song
,
Bo Jin
,
Yinghong Zhu
,
Yongqing Sun
Investigating the Implications of Virtualization for Digital Forensics.
e-Forensics
(2010)
Beihua Wu
SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web Applications.
e-Forensics
(2010)
Lianhai Wang
,
Lijuan Xu
,
Shuhui Zhang
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images.
e-Forensics
(2010)
Kan Zhou
,
Shiqiu Huang
,
Zhengwei Qi
,
Jian Gu
,
Beijun Shen
Enhance Information Flow Tracking with Function Recognition.
e-Forensics
(2010)
Liping Ding
,
Jian Gu
,
Yongji Wang
,
JingZheng Wu
Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree.
e-Forensics
(2010)
Xiaodong Lin
,
Chenxi Zhang
,
Theodora Dule
On Achieving Encrypted File Recovery.
e-Forensics
(2010)
Marti Ksionsk
,
Ping Ji
,
Weifeng Chen
Attacks on BitTorrent - An Experimental Study.
e-Forensics
(2010)
2009
Simon Knight
,
Simon Moschou
,
Matthew Sorell
Analysis of Sensor Photo Response Non-Uniformity in RAW Images.
e-Forensics
(2009)
Chang-Tsun Li
Detection of Block Artifacts for Digital Forensic Analysis.
e-Forensics
(2009)
Benjamin P. Turnbull
,
Grant Osborne
,
Matthew Simon
Legal and Technical Implications of Collecting Wireless Data as an Evidence Source.
e-Forensics
(2009)
Trupti Shiralkar
,
Michael K. Lavine
,
Benjamin P. Turnbull
A Preliminary Approach to the Forensic Analysis of an Ultraportable ASUS Eee PC.
e-Forensics
(2009)
Kosta Haltis
,
Lee Andersson
,
Matthew Sorell
,
Russell S. A. Brinkworth
Surveillance Applications of Biologically-Inspired Smart Cameras.
e-Forensics
(2009)
Timothy Neville
,
Matthew Sorell
Audit Log for Forensic Photography.
e-Forensics
(2009)
Xue-Guang Wang
,
Zhen-Chuan Chai
A Provable Security Scheme of ID-Based Threshold Decryption.
e-Forensics
(2009)
Clare Sullivan
Digital Identity - The Legal Person?.
e-Forensics
(2009)
M. L. Dennis Wong
,
Antionette W.-T. Goh
,
Hong Siang Chua
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt.
e-Forensics
(2009)
Heum Park
,
SunHo Cho
,
Hyuk-Chul Kwon
Cyber Forensics Ontology for Cyber Criminal Investigation.
e-Forensics
(2009)
Sabine Cikic
,
Fritz Lehmann-Grube
,
Jan Sablatnig
Surveillance and Datenschutz in Virtual Environments.
e-Forensics
(2009)
Fariborz Mahmoudi
,
Mohsen Mirzashaeri
,
Ehsan Shahamatnia
,
Saed Faridnia
A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network.
e-Forensics
(2009)
Niall McGrath
,
Pavel Gladyshev
,
M. Tahar Kechadi
,
Joe Carthy
Investigating Encrypted Material.
e-Forensics
(2009)
Yue Li
,
Chang-Tsun Li
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis.
e-Forensics
(2009)
Milton H. Luoma
,
Vicki Miller Luoma
Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights.
e-Forensics
(2009)
Jill Slay
,
Elena Sitnikova
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.
e-Forensics
(2009)
Sriram Raghavan
,
Andrew J. Clark
,
George M. Mohay
FIA: An Open Forensic Integration Architecture for Composing Digital Evidence.
e-Forensics
(2009)
Lei Pan
,
Lynn Margaret Batten
Robust Correctness Testing for Digital Forensic Tools.
e-Forensics
(2009)
volume 8, 2009
Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers
e-Forensics
8 (2009)