Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

773 results
Deposit type : Fulltext
Image document

Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co

Aaron W. Baur , Julian Bühler , Markus Bick , Charlotte S. Bonorden
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.63-80, ⟨10.1007/978-3-319-25013-7_6⟩
Conference papers hal-01448070v1
Image document

A Systematic Review of Impediments Blocking Internet of Things Adoption by Governments

Paul Brous , Marijn Janssen
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.81-94, ⟨10.1007/978-3-319-25013-7_7⟩
Conference papers hal-01448071v1
Image document

Understanding the Adoption of Mobile Internet in the Saudi Arabian Context: Results from a Descriptive Analysis

Abdullah Baabdullah , Yogesh Dwivedi , Michael Williams , Prabhat Kumar
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.95-106, ⟨10.1007/978-3-319-25013-7_8⟩
Conference papers hal-01448072v1
Image document

Conceptualising and Exploring User Activities in Social Media

Marcel Rosenberger , Tobias Lehmkuhl , Reinhard Jung
14th Conference on e-Business, e-Services and e-Society (I3E), Oct 2015, Delft, Netherlands. pp.107-118, ⟨10.1007/978-3-319-25013-7_9⟩
Conference papers hal-01448073v1
Image document

DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASES

Werner Hauger , Martin Olivier
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.163-177, ⟨10.1007/978-3-319-24123-4_10⟩
Conference papers hal-01449057v1
Image document

USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING

Peter Fruhwirt , Peter Kieseberg , Edgar Weippl
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.179-194, ⟨10.1007/978-3-319-24123-4_11⟩
Conference papers hal-01449058v1
Image document

IDENTIFYING PASSWORDS STORED ON DISK

Shiva Houshmand , Sudhir Aggarwal , Umit Karabiyik
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.195-213, ⟨10.1007/978-3-319-24123-4_12⟩
Conference papers hal-01449059v1
Image document

FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS

Yanbin Tang , Zheng Tan , Kam-Pui Chow , Siu-Ming Yiu , Junbin Fang , et al.
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers hal-01449060v1
Image document

FORENSIC-READY SECURE iOS APPS FOR JAILBROKEN iPHONES

Jayaprakash Govindaraj , Rashmi Mata , Robin Verma , Gaurav Gupta
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.235-249, ⟨10.1007/978-3-319-24123-4_14⟩
Conference papers hal-01449061v1
Image document

A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM

Panagiotis Andriotis , Theo Tryfonas , George Oikonomou , Irwin King
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.251-267, ⟨10.1007/978-3-319-24123-4_15⟩
Conference papers hal-01449062v1
Image document

A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT

Shams Zawoad , Ragib Hasan
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.271-285, ⟨10.1007/978-3-319-24123-4_16⟩
Conference papers hal-01449063v1
Image document

LOCATING AND TRACKING DIGITAL OBJECTS IN THE CLOUD

Philip Trenwith , Hein Venter
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.287-301, ⟨10.1007/978-3-319-24123-4_17⟩
Conference papers hal-01449064v1
Image document

A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS

Shariq Murtuza , Robin Verma , Jayaprakash Govindaraj , Gaurav Gupta
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.305-320, ⟨10.1007/978-3-319-24123-4_18⟩
Conference papers hal-01449065v1
Image document

CRITERIA FOR VALIDATING SECURE WIPING TOOLS

Muhammad Sharjeel Zareen , Baber Aslam , Monis Akhlaq
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.321-339, ⟨10.1007/978-3-319-24123-4_19⟩
Conference papers hal-01449066v1
Image document

A TALE OF TWO TRACES – DIPLOMATICS AND FORENSICS

Fred Cohen
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.3-27, ⟨10.1007/978-3-319-24123-4_1⟩
Conference papers hal-01449067v1
Image document

DO DATA LOSS PREVENTION SYSTEMS REALLY WORK?

Sara Ghorbanian , Glenn Fryklund , Stefan Axelsson
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.341-357, ⟨10.1007/978-3-319-24123-4_20⟩
Conference papers hal-01449068v1
Image document

NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS

Segen Tewelde , Stefan Gruner , Martin Olivier
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.29-43, ⟨10.1007/978-3-319-24123-4_2⟩
Conference papers hal-01449069v1
Image document

USING YIN’S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS

Oluwasayo Oyelami , Martin Olivier
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.45-59, ⟨10.1007/978-3-319-24123-4_3⟩
Conference papers hal-01449070v1
Image document

AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS

Min Yang , Kam-Pui Chow
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.61-76, ⟨10.1007/978-3-319-24123-4_4⟩
Conference papers hal-01449071v1
Image document

PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM

Xiao-Xi Fan , Kam-Pui Chow , Fei Xu
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.97-113, ⟨10.1007/978-3-319-24123-4_6⟩
Conference papers hal-01449072v1
Image document

A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM

Fei Xu , Ken Yau , Ping Zhang , Kam-Pui Chow
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.115-128, ⟨10.1007/978-3-319-24123-4_7⟩
Conference papers hal-01449073v1
Image document

A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS

Changwei Liu , Anoop Singhal , Duminda Wijesekera
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.129-145, ⟨10.1007/978-3-319-24123-4_8⟩
Conference papers hal-01449074v1
Image document

CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY

Dae Glendowne , Cody Miller , Wesley Mcgrew , David Dampier
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.149-161, ⟨10.1007/978-3-319-24123-4_9⟩
Conference papers hal-01449075v1
Image document

A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS

Chen Zhao , Yong Guan
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.79-95, ⟨10.1007/978-3-319-24123-4_5⟩
Conference papers hal-01449078v1
Image document

Strength of Relationship Between Multi-labeled Data and Labels

Masahiro Kuzunishi , Tetsuya Furukawa
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.99-108, ⟨10.1007/978-3-319-24315-3_10⟩
Conference papers hal-01466209v1
Image document

Online Ad-fraud in Search Engine Advertising Campaigns

Andreas Mladenow , Niina Maarit Novak , Christine Strauss
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.109-118, ⟨10.1007/978-3-319-24315-3_11⟩
Conference papers hal-01466210v1
Image document

Markov Chain Solution to the 3-Tower Problem

Guido David
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.121-128, ⟨10.1007/978-3-319-24315-3_12⟩
Conference papers hal-01466211v1
Image document

Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem

Yusuke Watanabe , Mayumi Takaya , Akihiro Yamamura
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.129-138, ⟨10.1007/978-3-319-24315-3_13⟩
Conference papers hal-01466212v1
Image document

Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons

Hikari Kato , Szilárd Zsolt Fazekas , Mayumi Takaya , Akihiro Yamamura
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.139-148, ⟨10.1007/978-3-319-24315-3_14⟩
Conference papers hal-01466213v1
Image document

Can We Securely Use CBC Mode in TLS1.0?

Takashi Kurokawa , Ryo Nojima , Shiho Moriai
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.151-160, ⟨10.1007/978-3-319-24315-3_15⟩
Conference papers hal-01466214v1