Filter your results
- 3
- 3
- 3
- 3
- 3
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Reasoning about Evidence using Bayesian Networks8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.99-113, ⟨10.1007/978-3-642-33962-2_7⟩
Conference papers
hal-01523702v1
|
||
|
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩
Conference papers
hal-01523719v1
|
||
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers
hal-01523716v1
|