Filter your results
- 537
- 19
- 3
- 535
- 2
- 536
- 1
- 1
- 34
- 503
- 537
- 27
- 9
- 8
- 7
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Passive Online RTT Estimation for Flow-Aware Routers Using One-Way TrafficNETWORKING 2010, May 2010, Chennai, India. pp.109-121, ⟨10.1007/978-3-642-12963-6_9⟩
Conference papers
inria-00496155v1
|
||
|
A Visualization System for Analyzing Information Leakage6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.269-282, ⟨10.1007/978-3-642-15506-2_19⟩
Conference papers
hal-01060624v1
|
||
|
Identifying First Seeders in Foxy Peer-to-Peer Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.151-168, ⟨10.1007/978-3-642-15506-2_11⟩
Conference papers
hal-01060615v1
|
||
|
A Compiled Memory Analysis Tool6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.195-204, ⟨10.1007/978-3-642-15506-2_14⟩
Conference papers
hal-01060619v1
|
||
|
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers
hal-01060618v1
|
||
|
Forensic Analysis of a PlayStation 3 Console6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.65-76, ⟨10.1007/978-3-642-15506-2_5⟩
Conference papers
hal-01060610v1
|
||
|
Forensic Analysis of Popular Chinese Internet Applications6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.285-295, ⟨10.1007/978-3-642-15506-2_20⟩
Conference papers
hal-01060625v1
|
||
|
A Forensic Readiness Model for Wireless Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.107-117, ⟨10.1007/978-3-642-15506-2_8⟩
Conference papers
hal-01060613v1
|
||
|
Data Fingerprinting with Similarity Digests6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.207-226, ⟨10.1007/978-3-642-15506-2_15⟩
Conference papers
hal-01060620v1
|
||
|
An Analysis of the Green Dam Youth Escort Software6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.49-62, ⟨10.1007/978-3-642-15506-2_4⟩
Conference papers
hal-01060609v1
|
||
|
Evaluation of Evidence in Internet Auction Fraud Investigations6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.121-132, ⟨10.1007/978-3-642-15506-2_9⟩
Conference papers
hal-01060616v1
|
||
|
A History of Digital Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.3-15, ⟨10.1007/978-3-642-15506-2_1⟩
Conference papers
hal-01060606v1
|
||
|
Digital Watermarking of Virtual Machine Images6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.257-268, ⟨10.1007/978-3-642-15506-2_18⟩
Conference papers
hal-01060623v1
|
||
|
Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.37-48, ⟨10.1007/978-3-642-15506-2_3⟩
Conference papers
hal-01060608v1
|
||
|
Refining Evidence Containers for Provenance and Accurate Data Representation6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.227-242, ⟨10.1007/978-3-642-15506-2_16⟩
Conference papers
hal-01060621v1
|
||
|
Toward a Science of Digital Forensic Evidence Examination6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.17-35, ⟨10.1007/978-3-642-15506-2_2⟩
Conference papers
hal-01060607v1
|
||
|
A Consistency Study of the Windows Registry6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.77-90, ⟨10.1007/978-3-642-15506-2_6⟩
Conference papers
hal-01060611v1
|
||
|
Forensic Tracking and Mobility Prediction in Vehicular Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.91-105, ⟨10.1007/978-3-642-15506-2_7⟩
Conference papers
hal-01060612v1
|
||
|
Virtual Expansion of Rainbow Tables6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.243-256, ⟨10.1007/978-3-642-15506-2_17⟩
Conference papers
hal-01060622v1
|
||
|
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.133-150, ⟨10.1007/978-3-642-15506-2_10⟩
Conference papers
hal-01060614v1
|
||
|
Uncertainty in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.171-184, ⟨10.1007/978-3-642-15506-2_12⟩
Conference papers
hal-01060617v1
|
||
|
Data Recovery Function Testing for Digital Forensic Tools6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.297-311, ⟨10.1007/978-3-642-15506-2_21⟩
Conference papers
hal-01060626v1
|
||
|
On Lookahead Strategy for Movement-Based Location Update: A General FormulationPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.153-166, ⟨10.1007/978-3-642-25575-5_13⟩
Conference papers
hal-01586908v1
|
||
|
Markov Chains and Spectral ClusteringPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.87-98, ⟨10.1007/978-3-642-25575-5_8⟩
Conference papers
hal-01586907v1
|
||
|
Analysis of Web Logs: Challenges and FindingsPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.227-239, ⟨10.1007/978-3-642-25575-5_19⟩
Conference papers
hal-01586906v1
|
||
|
Predicting Disk Scheduling Performance with Virtual MachinesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.61-72, ⟨10.1007/978-3-642-25575-5_6⟩
Conference papers
hal-01586905v1
|
||
|
From the Origins of Performance Evaluation to New Green ICT Performance EngineeringPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.49-60, ⟨10.1007/978-3-642-25575-5_5⟩
Conference papers
hal-01586904v1
|
||
|
Performance Evaluation with Hidden Markov ModelsPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.112-128, ⟨10.1007/978-3-642-25575-5_10⟩
Conference papers
hal-01586903v1
|
||
|
Tools for Performance Evaluation of Computer Systems: Historical Evolution and PerspectivesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.24-37, ⟨10.1007/978-3-642-25575-5_3⟩
Conference papers
hal-01586901v1
|
||
|
Energy: A New Criteria for Performances in Large Scale Distributed SystemsPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.38-48, ⟨10.1007/978-3-642-25575-5_4⟩
Conference papers
hal-01586899v1
|