Filter your results
- 12
- 12
- 12
- 2
- 2
- 2
- 1
- 1
- 2
- 2
- 12
- 1
- 8
- 1
- 4
- 6
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.185-204, ⟨10.1007/978-3-319-61176-1_10⟩
Conference papers
hal-01684371v1
|
||
|
Identifying First Seeders in Foxy Peer-to-Peer Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.151-168, ⟨10.1007/978-3-642-15506-2_11⟩
Conference papers
hal-01060615v1
|
||
|
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.273-290, ⟨10.1007/978-3-030-56223-6_15⟩
Conference papers
hal-03657238v1
|
||
|
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.95-108, ⟨10.1007/978-3-030-56223-6_6⟩
Conference papers
hal-03657239v1
|
||
|
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers
hal-01060618v1
|
||
|
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩
Conference papers
hal-01523719v1
|
||
|
Semantic Video Carving Using Perceptual Hashing and Optical Flow13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.223-244, ⟨10.1007/978-3-319-67208-3_13⟩
Conference papers
hal-01716410v1
|
||
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers
hal-01523716v1
|
||
|
Validation Rules for Enhanced Foxy P2P Network Investigations10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73-83, ⟨10.1007/978-3-662-44952-3_6⟩
Conference papers
hal-01393761v1
|
||
|
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers
hal-01449060v1
|
||
|
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.351-367, ⟨10.1007/978-3-319-99277-8_19⟩
Conference papers
hal-01988832v1
|
||
|
A Forensic Logging System for Siemens Programmable Logic Controllers14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.331-349, ⟨10.1007/978-3-319-99277-8_18⟩
Conference papers
hal-01988850v1
|