Filter your results
- 8
- 8
- 8
- 1
- 1
- 1
- 1
- 1
- 3
- 8
- 8
- 7
- 4
- 4
- 4
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Evaluation of Evidence in Internet Auction Fraud Investigations6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.121-132, ⟨10.1007/978-3-642-15506-2_9⟩
Conference papers
hal-01060616v1
|
||
|
Identifying First Seeders in Foxy Peer-to-Peer Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.151-168, ⟨10.1007/978-3-642-15506-2_11⟩
Conference papers
hal-01060615v1
|
||
|
A Generic Bayesian Belief Model for Similar Cyber Crimes9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.243-255, ⟨10.1007/978-3-642-41148-9_17⟩
Conference papers
hal-01460609v1
|
||
|
Reasoning about Evidence using Bayesian Networks8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.99-113, ⟨10.1007/978-3-642-33962-2_7⟩
Conference papers
hal-01523702v1
|
||
|
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.231-243, ⟨10.1007/978-3-642-24212-0_18⟩
Conference papers
hal-01569550v1
|
||
|
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers
hal-01060618v1
|
||
|
The Cloud Storage Ecosystem – A New Business Model for Internet Piracy?12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.237-255, ⟨10.1007/978-3-319-46279-0_12⟩
Conference papers
hal-01758684v1
|
||
|
An Exploratory Profiling Study of Online Auction Fraudsters10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.43-56, ⟨10.1007/978-3-662-44952-3_4⟩
Conference papers
hal-01393758v1
|