Filter your results
- 7
- 7
- 7
- 1
- 1
- 1
- 4
- 7
- 7
- 7
- 4
- 4
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
An Analysis of the Green Dam Youth Escort Software6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.49-62, ⟨10.1007/978-3-642-15506-2_4⟩
Conference papers
hal-01060609v1
|
||
|
Evaluation of Evidence in Internet Auction Fraud Investigations6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.121-132, ⟨10.1007/978-3-642-15506-2_9⟩
Conference papers
hal-01060616v1
|
||
|
Identifying First Seeders in Foxy Peer-to-Peer Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.151-168, ⟨10.1007/978-3-642-15506-2_11⟩
Conference papers
hal-01060615v1
|
||
|
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers
hal-01060618v1
|
||
|
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.231-245, ⟨10.1007/978-3-642-33962-2_16⟩
Conference papers
hal-01523719v1
|
||
|
An Empirical Study Profiling Internet Pirates9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.257-272, ⟨10.1007/978-3-642-41148-9_18⟩
Conference papers
hal-01460610v1
|
||
|
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.231-243, ⟨10.1007/978-3-642-24212-0_18⟩
Conference papers
hal-01569550v1
|