Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 4
- 2
- 4
- 2
- 1
- 1
|
|
sorted by
|
|
Data Hiding Techniques for Database Environments8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.289-301, ⟨10.1007/978-3-642-33962-2_20⟩
Conference papers
hal-01523715v1
|
||
|
Classifying the Authenticity of Evaluated Smartphone Data15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.39-57, ⟨10.1007/978-3-030-28752-8_3⟩
Conference papers
hal-02534614v1
|
||
|
Evaluating the Authenticity of Smartphone Evidence13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.41-61, ⟨10.1007/978-3-319-67208-3_3⟩
Conference papers
hal-01716408v1
|
||
|
Smartphones as Distributed Witnesses for Digital Forensics10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.237-251, ⟨10.1007/978-3-662-44952-3_16⟩
Conference papers
hal-01393774v1
|