Filter your results
- 31
- 1
- 31
- 1
- 32
- 2
- 4
- 1
- 3
- 1
- 2
- 4
- 3
- 2
- 3
- 1
- 6
- 32
- 2
- 1
- 1
- 1
- 1
- 19
- 12
- 8
- 7
- 7
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Evaluation of Evidence in Internet Auction Fraud Investigations6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.121-132, ⟨10.1007/978-3-642-15506-2_9⟩
Conference papers
hal-01060616v1
|
||
|
Identifying First Seeders in Foxy Peer-to-Peer Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.151-168, ⟨10.1007/978-3-642-15506-2_11⟩
Conference papers
hal-01060615v1
|
||
|
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.273-290, ⟨10.1007/978-3-030-56223-6_15⟩
Conference papers
hal-03657238v1
|
||
|
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.95-108, ⟨10.1007/978-3-030-56223-6_6⟩
Conference papers
hal-03657239v1
|
||
|
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.115-128, ⟨10.1007/978-3-319-24123-4_7⟩
Conference papers
hal-01449073v1
|
||
|
A Generic Bayesian Belief Model for Similar Cyber Crimes9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.243-255, ⟨10.1007/978-3-642-41148-9_17⟩
Conference papers
hal-01460609v1
|
||
|
An Analysis of the Green Dam Youth Escort Software6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.49-62, ⟨10.1007/978-3-642-15506-2_4⟩
Conference papers
hal-01060609v1
|
||
|
Reasoning about Evidence using Bayesian Networks8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.99-113, ⟨10.1007/978-3-642-33962-2_7⟩
Conference papers
hal-01523702v1
|
||
|
Web User Profiling Based on Browsing Behavior Analysis10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.57-71, ⟨10.1007/978-3-662-44952-3_5⟩
Conference papers
hal-01393760v1
|
||
|
Profiling Flash Mob Organizers in Web Discussion Forums12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.281-293, ⟨10.1007/978-3-319-46279-0_14⟩
Conference papers
hal-01758678v1
|
||
|
Measuring Evidential Weight in Digital Forensic Investigations14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.3-10, ⟨10.1007/978-3-319-99277-8_1⟩
Conference papers
hal-01988848v1
|
||
|
An Empirical Study Profiling Internet Pirates9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.257-272, ⟨10.1007/978-3-642-41148-9_18⟩
Conference papers
hal-01460610v1
|
||
|
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.231-243, ⟨10.1007/978-3-642-24212-0_18⟩
Conference papers
hal-01569550v1
|
||
|
Predicting the locations of unrest using social media17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.177-191, ⟨10.1007/978-3-030-88381-2_9⟩
Conference papers
hal-03764379v1
|
||
|
Advances in Digital Forensics VISpringer, IFIP Advances in Information and Communication Technology (AICT-337), 2010, 978-3-642-15505-5. ⟨10.1007/978-3-642-15506-2⟩
Books
hal-01549682v1
|
||
|
Forensic Analysis of Popular Chinese Internet Applications6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.285-295, ⟨10.1007/978-3-642-15506-2_20⟩
Conference papers
hal-01060625v1
|
||
|
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers
hal-01060618v1
|
||
|
Detecting Anomalous Programmable Logic Controller Events Using Machine Learning13th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2017, Orlando, FL, United States. pp.81-94, ⟨10.1007/978-3-319-67208-3_5⟩
Conference papers
hal-01716409v1
|
||
|
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩
Conference papers
hal-01523719v1
|
||
|
Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning15th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2019, Orlando, FL, United States. pp.119-130, ⟨10.1007/978-3-030-28752-8_7⟩
Conference papers
hal-02534603v1
|
||
|
The Cloud Storage Ecosystem – A New Business Model for Internet Piracy?12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.237-255, ⟨10.1007/978-3-319-46279-0_12⟩
Conference papers
hal-01758684v1
|
||
|
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.97-113, ⟨10.1007/978-3-319-24123-4_6⟩
Conference papers
hal-01449072v1
|
||
|
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.203-214, ⟨10.1007/978-3-030-56223-6_11⟩
Conference papers
hal-03657233v1
|
||
|
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.57-72, ⟨10.1007/978-3-030-56223-6_4⟩
Conference papers
hal-03657237v1
|
||
|
An Exploratory Profiling Study of Online Auction Fraudsters10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.43-56, ⟨10.1007/978-3-662-44952-3_4⟩
Conference papers
hal-01393758v1
|
||
|
Validation Rules for Enhanced Foxy P2P Network Investigations10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.73-83, ⟨10.1007/978-3-662-44952-3_6⟩
Conference papers
hal-01393761v1
|
||
|
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.61-76, ⟨10.1007/978-3-319-24123-4_4⟩
Conference papers
hal-01449071v1
|
||
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers
hal-01523716v1
|
||
|
Detecting malicious pdf documents using semi-supervised machine learning17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.135-155, ⟨10.1007/978-3-030-88381-2_7⟩
Conference papers
hal-03764374v1
|
||
|
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers
hal-01449060v1
|
- 1
- 2