Filter your results
- 4
- 4
- 4
- 1
- 1
- 2
- 4
- 1
- 1
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
4 results
|
|
sorted by
|
|
Dynamic Software Birthmark for Java Based on Heap Memory Analysis12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
Conference papers
hal-01596200v1
|
||
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers
hal-01523716v1
|
||
|
Forensic Analysis of Popular Chinese Internet Applications6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.285-295, ⟨10.1007/978-3-642-15506-2_20⟩
Conference papers
hal-01060625v1
|
||
|
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers
hal-01060618v1
|