Filter your results
- 9
- 2
- 9
- 2
- 11
- 1
- 1
- 2
- 3
- 3
- 1
- 1
- 11
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Phishing for the Truth: A Scenario-Based Experiment of Users’ Behavioural Response to Emails28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.366-378, ⟨10.1007/978-3-642-39218-4_27⟩
Conference papers
hal-01463838v1
|
||
|
Extracting Evidence Related to VoIP Calls7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.221-228, ⟨10.1007/978-3-642-24212-0_17⟩
Conference papers
hal-01569552v1
|
||
|
A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.224-239
Conference papers
hal-01506775v1
|
||
|
Multidisciplinary Research and Practice for Information SystemsSpringer, LNCS-7465, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-32498-7⟩
Books
hal-01542459v1
|
||
|
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.242-249, ⟨10.1007/978-3-642-55415-5_20⟩
Conference papers
hal-01370370v1
|
||
|
Visualizing Information in Digital Forensics8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.35-47, ⟨10.1007/978-3-642-33962-2_3⟩
Conference papers
hal-01523711v1
|
||
|
Intelligent Information Processing IXSpringer International Publishing, AICT-538, 2018, IFIP Advances in Information and Communication Technology, 978-3-030-00827-7. ⟨10.1007/978-3-030-00828-4⟩
Books
hal-02197767v1
|
||
|
Data Recovery from Proprietary Formatted Cctv Hard Disks9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.213-223, ⟨10.1007/978-3-642-41148-9_15⟩
Conference papers
hal-01460629v1
|
||
|
Windows Event Forensic Process10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.87-100, ⟨10.1007/978-3-662-44952-3_7⟩
Conference papers
hal-01393763v1
|
||
|
Data Recovery Function Testing for Digital Forensic Tools6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.297-311, ⟨10.1007/978-3-642-15506-2_21⟩
Conference papers
hal-01060626v1
|
||
|
Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.400-411, ⟨10.1007/978-3-642-30436-1_33⟩
Conference papers
hal-01518253v1
|