Filter your results
- 14
- 14
- 14
- 1
- 1
- 1
- 1
- 5
- 1
- 2
- 2
- 14
- 1
- 5
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
14 results
|
|
sorted by
|
|
A Matrix-Analytic Solution for Randomized Load Balancing Models with PH Service TimesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.240-253, ⟨10.1007/978-3-642-25575-5_20⟩
Conference papers
hal-01586888v1
|
||
|
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.97-113, ⟨10.1007/978-3-319-24123-4_6⟩
Conference papers
hal-01449072v1
|
||
|
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.203-214, ⟨10.1007/978-3-030-56223-6_11⟩
Conference papers
hal-03657233v1
|
||
|
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.61-76, ⟨10.1007/978-3-319-24123-4_4⟩
Conference papers
hal-01449071v1
|
||
|
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.63-83, ⟨10.1007/978-3-030-81242-3_4⟩
Conference papers
hal-03677024v1
|
||
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.129-142, ⟨10.1007/978-3-642-33962-2_9⟩
Conference papers
hal-01523716v1
|
||
|
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.215-231, ⟨10.1007/978-3-319-24123-4_13⟩
Conference papers
hal-01449060v1
|
||
|
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.251-267, ⟨10.1007/978-3-319-24123-4_15⟩
Conference papers
hal-01449062v1
|
||
|
Profiling Flash Mob Organizers in Web Discussion Forums12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.281-293, ⟨10.1007/978-3-319-46279-0_14⟩
Conference papers
hal-01758678v1
|
||
|
Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.172-183, ⟨10.1007/978-3-642-30054-7_14⟩
Conference papers
hal-01531970v1
|
||
|
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.115-128, ⟨10.1007/978-3-319-24123-4_7⟩
Conference papers
hal-01449073v1
|
||
|
Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud12th International Middleware Conference (MIDDLEWARE), Dec 2011, Lisbon, Portugal. pp.81-100, ⟨10.1007/978-3-642-25821-3_5⟩
Conference papers
hal-01597754v1
|
||
|
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.185-204, ⟨10.1007/978-3-319-61176-1_10⟩
Conference papers
hal-01684371v1
|
||
|
Perfect Pipelining for Streaming Large File in Peer-to-Peer Networks8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.27-38, ⟨10.1007/978-3-662-44602-7_3⟩
Conference papers
hal-01402025v1
|