Filter your results
- 41
- 41
- 41
- 1
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 4
- 3
- 3
- 3
- 6
- 41
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 18
- 14
- 8
- 7
- 7
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.351-367, ⟨10.1007/978-3-319-99277-8_19⟩
Conference papers
hal-01988832v1
|
||
|
A Forensic Logging System for Siemens Programmable Logic Controllers14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.331-349, ⟨10.1007/978-3-319-99277-8_18⟩
Conference papers
hal-01988850v1
|
||
|
Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.185-204, ⟨10.1007/978-3-319-61176-1_10⟩
Conference papers
hal-01684371v1
|
||
|
An Incident Response Model for Industrial Control System Forensics Based on Historical Events13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.311-328, ⟨10.1007/978-3-030-34647-8_16⟩
Conference papers
hal-03364562v1
|
||
|
A Generic Bayesian Belief Model for Similar Cyber Crimes9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.243-255, ⟨10.1007/978-3-642-41148-9_17⟩
Conference papers
hal-01460609v1
|
||
|
$\mathcal{SMS}$: Collaborative $\mathcal{S}$treaming in $\mathcal{M}$obile $\mathcal{S}$ocial Networks10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.275-287, ⟨10.1007/978-3-642-20798-3_21⟩
Conference papers
hal-01597972v1
|
||
|
An Analysis of the Green Dam Youth Escort Software6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.49-62, ⟨10.1007/978-3-642-15506-2_4⟩
Conference papers
hal-01060609v1
|
||
|
Reasoning about Evidence using Bayesian Networks8th International Conference on Digital Forensics (DF), Jan 2012, Pretoria, South Africa. pp.99-113, ⟨10.1007/978-3-642-33962-2_7⟩
Conference papers
hal-01523702v1
|
||
|
Element Variation Innovation Thinking: A Method of Simplifying and Reorganizing TRIZTRIZ Future conference, Sep 2021, Bolzano, Italy. pp.301-314, ⟨10.1007/978-3-030-86614-3_24⟩
Conference papers
hal-04067830v1
|
||
|
Forensic Investigation of A Hacked Industrial Robot14th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2020, Arlington, VA, United States. pp.221-241, ⟨10.1007/978-3-030-62840-6_11⟩
Conference papers
hal-03794641v1
|
||
|
Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.37-48, ⟨10.1007/978-3-642-15506-2_3⟩
Conference papers
hal-01060608v1
|
||
|
Evaluation of Evidence in Internet Auction Fraud Investigations6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.121-132, ⟨10.1007/978-3-642-15506-2_9⟩
Conference papers
hal-01060616v1
|
||
|
Identifying First Seeders in Foxy Peer-to-Peer Networks6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.151-168, ⟨10.1007/978-3-642-15506-2_11⟩
Conference papers
hal-01060615v1
|
||
|
Threat analysis of an elevator control system11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.175-192, ⟨10.1007/978-3-319-70395-4_10⟩
Conference papers
hal-01819129v1
|
||
|
SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking Applications34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.180-193, ⟨10.1007/978-3-030-22312-0_13⟩
Conference papers
hal-03744302v1
|
||
|
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.273-290, ⟨10.1007/978-3-030-56223-6_15⟩
Conference papers
hal-03657238v1
|
||
|
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines16th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2020, New Delhi, India. pp.95-108, ⟨10.1007/978-3-030-56223-6_6⟩
Conference papers
hal-03657239v1
|
||
|
Web User Profiling Based on Browsing Behavior Analysis10th IFIP International Conference on Digital Forensics (DF), Jan 2014, Vienna, Austria. pp.57-71, ⟨10.1007/978-3-662-44952-3_5⟩
Conference papers
hal-01393760v1
|
||
|
Profiling Flash Mob Organizers in Web Discussion Forums12th IFIP International Conference on Digital Forensics (DF), Jan 2016, New Delhi, India. pp.281-293, ⟨10.1007/978-3-319-46279-0_14⟩
Conference papers
hal-01758678v1
|
||
|
Measuring Evidential Weight in Digital Forensic Investigations14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.3-10, ⟨10.1007/978-3-319-99277-8_1⟩
Conference papers
hal-01988848v1
|
||
|
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers
hal-01480187v1
|
||
|
An Empirical Study Profiling Internet Pirates9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.257-272, ⟨10.1007/978-3-642-41148-9_18⟩
Conference papers
hal-01460610v1
|
||
|
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.231-243, ⟨10.1007/978-3-642-24212-0_18⟩
Conference papers
hal-01569550v1
|
||
|
Authorship Attribution for Forensic Investigation with Thousands of Authors29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.339-350, ⟨10.1007/978-3-642-55415-5_28⟩
Conference papers
hal-01370381v1
|
||
|
Cloud-Based Production Logistics Synchronization Mechanism and MethodIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2015, Tokyo, Japan. pp.452-464, ⟨10.1007/978-3-319-22759-7_53⟩
Conference papers
hal-01431133v1
|
||
|
Dynamic Software Birthmark for Java Based on Heap Memory Analysis12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.94-107, ⟨10.1007/978-3-642-24712-5_8⟩
Conference papers
hal-01596200v1
|
||
|
Predicting the locations of unrest using social media17th IFIP International Conference on Digital Forensics (DigitalForensics), Feb 2021, Virtual, China. pp.177-191, ⟨10.1007/978-3-030-88381-2_9⟩
Conference papers
hal-03764379v1
|
||
|
Operation Twins: Synchronized Production-Intralogistics for Industry 4.0 ManufacturingIFIP International Conference on Advances in Production Management Systems (APMS), Sep 2021, Nantes, France. pp.596-604, ⟨10.1007/978-3-030-85914-5_63⟩
Conference papers
hal-03897886v1
|
||
|
Forensic Analysis of Popular Chinese Internet Applications6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.285-295, ⟨10.1007/978-3-642-15506-2_20⟩
Conference papers
hal-01060625v1
|
||
|
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.185-194, ⟨10.1007/978-3-642-15506-2_13⟩
Conference papers
hal-01060618v1
|
- 1
- 2