Filter your results
- 773
- 23
- 773
- 773
- 119
- 2
- 2
- 1
- 20
- 753
- 773
- 6
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.63-80, ⟨10.1007/978-3-319-25013-7_6⟩
Conference papers
hal-01448070v1
|
||
|
A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.81-94, ⟨10.1007/978-3-319-25013-7_7⟩
Conference papers
hal-01448071v1
|
||
|
Understanding the Adoption of Mobile Internet in the Saudi Arabian Context: Results from a Descriptive Analysis14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.95-106, ⟨10.1007/978-3-319-25013-7_8⟩
Conference papers
hal-01448072v1
|
||
|
Conceptualising and Exploring User Activities in Social Media14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.107-118, ⟨10.1007/978-3-319-25013-7_9⟩
Conference papers
hal-01448073v1
|
||
|
DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASES11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.163-177, ⟨10.1007/978-3-319-24123-4_10⟩
Conference papers
hal-01449057v1
|
||
|
USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.179-194, ⟨10.1007/978-3-319-24123-4_11⟩
Conference papers
hal-01449058v1
|
||
|
IDENTIFYING PASSWORDS STORED ON DISK11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.195-213, ⟨10.1007/978-3-319-24123-4_12⟩
Conference papers
hal-01449059v1
|
||
|
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers
hal-01449060v1
|
||
|
FORENSIC-READY SECURE iOS APPS FOR JAILBROKEN iPHONES11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.235-249, ⟨10.1007/978-3-319-24123-4_14⟩
Conference papers
hal-01449061v1
|
||
|
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.251-267, ⟨10.1007/978-3-319-24123-4_15⟩
Conference papers
hal-01449062v1
|
||
|
A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.271-285, ⟨10.1007/978-3-319-24123-4_16⟩
Conference papers
hal-01449063v1
|
||
|
LOCATING AND TRACKING DIGITAL OBJECTS IN THE CLOUD11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.287-301, ⟨10.1007/978-3-319-24123-4_17⟩
Conference papers
hal-01449064v1
|
||
|
A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.305-320, ⟨10.1007/978-3-319-24123-4_18⟩
Conference papers
hal-01449065v1
|
||
|
CRITERIA FOR VALIDATING SECURE WIPING TOOLS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.321-339, ⟨10.1007/978-3-319-24123-4_19⟩
Conference papers
hal-01449066v1
|
||
|
A TALE OF TWO TRACES – DIPLOMATICS AND FORENSICS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.3-27, ⟨10.1007/978-3-319-24123-4_1⟩
Conference papers
hal-01449067v1
|
||
|
DO DATA LOSS PREVENTION SYSTEMS REALLY WORK?11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.341-357, ⟨10.1007/978-3-319-24123-4_20⟩
Conference papers
hal-01449068v1
|
||
|
NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.29-43, ⟨10.1007/978-3-319-24123-4_2⟩
Conference papers
hal-01449069v1
|
||
|
USING YIN’S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.45-59, ⟨10.1007/978-3-319-24123-4_3⟩
Conference papers
hal-01449070v1
|
||
|
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.61-76, ⟨10.1007/978-3-319-24123-4_4⟩
Conference papers
hal-01449071v1
|
||
|
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.97-113, ⟨10.1007/978-3-319-24123-4_6⟩
Conference papers
hal-01449072v1
|
||
|
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.115-128, ⟨10.1007/978-3-319-24123-4_7⟩
Conference papers
hal-01449073v1
|
||
|
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.129-145, ⟨10.1007/978-3-319-24123-4_8⟩
Conference papers
hal-01449074v1
|
||
|
CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.149-161, ⟨10.1007/978-3-319-24123-4_9⟩
Conference papers
hal-01449075v1
|
||
|
A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.79-95, ⟨10.1007/978-3-319-24123-4_5⟩
Conference papers
hal-01449078v1
|
||
|
Strength of Relationship Between Multi-labeled Data and Labels3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.99-108, ⟨10.1007/978-3-319-24315-3_10⟩
Conference papers
hal-01466209v1
|
||
|
Online Ad-fraud in Search Engine Advertising Campaigns3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.109-118, ⟨10.1007/978-3-319-24315-3_11⟩
Conference papers
hal-01466210v1
|
||
|
Markov Chain Solution to the 3-Tower Problem3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.121-128, ⟨10.1007/978-3-319-24315-3_12⟩
Conference papers
hal-01466211v1
|
||
|
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.129-138, ⟨10.1007/978-3-319-24315-3_13⟩
Conference papers
hal-01466212v1
|
||
|
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.139-148, ⟨10.1007/978-3-319-24315-3_14⟩
Conference papers
hal-01466213v1
|
||
|
Can We Securely Use CBC Mode in TLS1.0?3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.151-160, ⟨10.1007/978-3-319-24315-3_15⟩
Conference papers
hal-01466214v1
|