Search dblp for Publications

export results for "stream:streams/conf/eforensics:"

 download as .bib file

@proceedings{DBLP:conf/eforensics/2010,
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23602-0},
  doi          = {10.1007/978-3-642-23602-0},
  isbn         = {978-3-642-23601-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Al-KuwariW10,
  author       = {Saif M. Al{-}Kuwari and
                  Stephen D. Wolthusen},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {On the Feasibility of Carrying Out Live Real-Time Forensics for Modern
                  Intelligent Vehicles},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_20},
  doi          = {10.1007/978-3-642-23602-0\_20},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Al-KuwariW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BattenP10,
  author       = {Lynn Margaret Batten and
                  Lei Pan},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Using Relationship-Building in Event Profiling for Digital Forensic
                  Investigations},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {40--52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_4},
  doi          = {10.1007/978-3-642-23602-0\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/BattenP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BlaskiewiczKK10,
  author       = {Przemyslaw Blaskiewicz and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Digital Signatures for e-Government - {A} Long-Term Security Architecture},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {256--270},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_24},
  doi          = {10.1007/978-3-642-23602-0\_24},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/BlaskiewiczKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ChenHGS10,
  author       = {Yasha Chen and
                  Jun Hu and
                  Xinmao Gai and
                  Yu Sun},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {A Privilege Separation Method for Security Commercial Transactions},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {185--192},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_17},
  doi          = {10.1007/978-3-642-23602-0\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ChenHGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/DingGL10,
  author       = {Ning Ding and
                  Dawu Gu and
                  Zhiqiang Liu},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {241--255},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_23},
  doi          = {10.1007/978-3-642-23602-0\_23},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/DingGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/DingGWW10,
  author       = {Liping Ding and
                  Jian Gu and
                  Yongji Wang and
                  JingZheng Wu},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Analysis of Telephone Call Detail Records Based on Fuzzy Decision
                  Tree},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {301--311},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_30},
  doi          = {10.1007/978-3-642-23602-0\_30},
  timestamp    = {Sat, 25 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/DingGWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/GongZL10,
  author       = {Lei Gong and
                  Yong Zhao and
                  Jianhua Liao},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Research on the Application Security Isolation Model},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {294--300},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_29},
  doi          = {10.1007/978-3-642-23602-0\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/GongZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/GuoJH10,
  author       = {Hong Guo and
                  Bo Jin and
                  Daoli Huang},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Research and Review on Computer Forensics},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_21},
  doi          = {10.1007/978-3-642-23602-0\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/GuoJH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HeLLL10,
  author       = {Wenlei He and
                  Gongshen Liu and
                  Jun Luo and
                  Jiuchuan Lin},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Text Content Filtering Based on Chinese Character Reconstruction from
                  Radicals},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {234--240},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_22},
  doi          = {10.1007/978-3-642-23602-0\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/HeLLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KsionskJC10,
  author       = {Marti Ksionsk and
                  Ping Ji and
                  Weifeng Chen},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Attacks on BitTorrent - An Experimental Study},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {79--89},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_7},
  doi          = {10.1007/978-3-642-23602-0\_7},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KsionskJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LeiDL10,
  author       = {Zhenxing Lei and
                  Theodora Dule and
                  Xiaodong Lin},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {A Novel Forensics Analysis Method for Evidence Extraction from Unallocated
                  Space},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {53--65},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_5},
  doi          = {10.1007/978-3-642-23602-0\_5},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/LeiDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LiGDL10,
  author       = {Juanru Li and
                  Dawu Gu and
                  Chaoguo Deng and
                  Yuhao Luo},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Digital Forensic Analysis on Runtime Instruction Flow},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {168--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_15},
  doi          = {10.1007/978-3-642-23602-0\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/LiGDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LinLFS10,
  author       = {Xiaodong Lin and
                  Rongxing Lu and
                  Kevin Foxton and
                  Xuemin (Sherman) Shen},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {An Efficient Searchable Encryption Scheme and Its Application in Network
                  Forensics},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {66--78},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_6},
  doi          = {10.1007/978-3-642-23602-0\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/LinLFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LinZD10,
  author       = {Xiaodong Lin and
                  Chenxi Zhang and
                  Theodora Dule},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {On Achieving Encrypted File Recovery},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_1},
  doi          = {10.1007/978-3-642-23602-0\_1},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/LinZD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MoLZ10,
  author       = {Can Mo and
                  Hui Li and
                  Hui Zhu},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {A Stream Pattern Matching Method for Traffic Analysis},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {131--140},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_12},
  doi          = {10.1007/978-3-642-23602-0\_12},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/MoLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/PengLLZZ10,
  author       = {Hao Peng and
                  Songnian Lu and
                  Jianhua Li and
                  Aixin Zhang and
                  Dandan Zhao},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {An Anonymity Scheme Based on Pseudonym in {P2P} Networks},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {287--293},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_28},
  doi          = {10.1007/978-3-642-23602-0\_28},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/PengLLZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/SongJZS10,
  author       = {Zheng Song and
                  Bo Jin and
                  Yinghong Zhu and
                  Yongqing Sun},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Investigating the Implications of Virtualization for Digital Forensics},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {110--121},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_10},
  doi          = {10.1007/978-3-642-23602-0\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/SongJZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Wang10,
  author       = {Yi Wang},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Study on Supervision of Integrity of Chain of Custody in Computer
                  Forensics},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {200--206},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_19},
  doi          = {10.1007/978-3-642-23602-0\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Wang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WangGXWD10,
  author       = {Yong Wang and
                  Dawu Gu and
                  Jianping Xu and
                  Mi Wen and
                  Liwen Deng},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {{RICB:} Integer Overflow Vulnerability Dynamic Analysis via Buffer
                  Overflow},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {99--109},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_9},
  doi          = {10.1007/978-3-642-23602-0\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WangGXWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WangXZ10,
  author       = {Lianhai Wang and
                  Lijuan Xu and
                  Shuhui Zhang},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Network Connections Information Extraction of 64-Bit Windows 7 Memory
                  Images},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {90--98},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_8},
  doi          = {10.1007/978-3-642-23602-0\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WangXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Wu10,
  author       = {Beihua Wu},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {{SQL} Injection Defense Mechanisms for {IIS+ASP+MSSQL} Web Applications},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {271--276},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_25},
  doi          = {10.1007/978-3-642-23602-0\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Wu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/XuGWA10,
  author       = {Aidong Xu and
                  Yan Gong and
                  Yongquan Wang and
                  Nayan Ai},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {On Different Categories of Cybercrime in China},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {277--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_26},
  doi          = {10.1007/978-3-642-23602-0\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/XuGWA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/XuWZK10,
  author       = {Lijuan Xu and
                  Lianhai Wang and
                  Lei Zhang and
                  Zhigang Kong},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Acquisition of Network Connection Status Information from Physical
                  Memory on Windows Vista Operating System},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {122--130},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_11},
  doi          = {10.1007/978-3-642-23602-0\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/XuWZK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/YiTL10,
  author       = {Junkai Yi and
                  Shuo Tang and
                  Hui Li},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Data Recovery Based on Intelligent Pattern Matching},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {193--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_18},
  doi          = {10.1007/978-3-642-23602-0\_18},
  timestamp    = {Wed, 26 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/YiTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/YingT10,
  author       = {Hwei{-}Ming Ying and
                  Vrizlynn L. L. Thing},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {A Novel Inequality-Based Fragmented File Carving Technique},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {28--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_3},
  doi          = {10.1007/978-3-642-23602-0\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/YingT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhaS10,
  author       = {Xinyan Zha and
                  Sartaj Sahni},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Fast in-Place File Carving for Digital Forensics},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_13},
  doi          = {10.1007/978-3-642-23602-0\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Zhang10,
  author       = {Ying Zhang},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Face and Lip Tracking for Person Identification},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {282--286},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_27},
  doi          = {10.1007/978-3-642-23602-0\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Zhang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhangWZZZ10,
  author       = {Lei Zhang and
                  Lianhai Wang and
                  Ruichao Zhang and
                  Shuhui Zhang and
                  Yang Zhou},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Live Memory Acquisition through FireWire},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {159--167},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_14},
  doi          = {10.1007/978-3-642-23602-0\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhangWZZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhouHQGS10,
  author       = {Kan Zhou and
                  Shiqiu Huang and
                  Zhengwei Qi and
                  Jian Gu and
                  Beijun Shen},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Enhance Information Flow Tracking with Function Recognition},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {179--184},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_16},
  doi          = {10.1007/978-3-642-23602-0\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhouHQGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhuLL10,
  author       = {Xudong Zhu and
                  Hui Li and
                  Zhijing Liu},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Behavior Clustering for Anomaly Detection},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_2},
  doi          = {10.1007/978-3-642-23602-0\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhuLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/CaldelliAP09,
  author       = {Roberto Caldelli and
                  Irene Amerini and
                  Francesco Picchioni},
  editor       = {Matthew Sorell},
  title        = {Distinguishing between Camera and Scanned Images by Means of Frequency
                  Analysis},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {95--101},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_11},
  doi          = {10.1007/978-3-642-02312-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/CaldelliAP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/CikicLS09,
  author       = {Sabine Cikic and
                  Fritz Lehmann{-}Grube and
                  Jan Sablatnig},
  editor       = {Matthew Sorell},
  title        = {Surveillance and Datenschutz in Virtual Environments},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {212--219},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_24},
  doi          = {10.1007/978-3-642-02312-5\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/CikicLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/FrantiSKKHS09,
  author       = {Pasi Fr{\"{a}}nti and
                  Juhani Saastamoinen and
                  Ismo K{\"{a}}rkk{\"{a}}inen and
                  Tomi Kinnunen and
                  Ville Hautam{\"{a}}ki and
                  Ilja Sidoroff},
  editor       = {Matthew Sorell},
  title        = {Developing Speaker Recognition System: From Prototype to Practical
                  Application},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_12},
  doi          = {10.1007/978-3-642-02312-5\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/FrantiSKKHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HaltisASB09,
  author       = {Kosta Haltis and
                  Lee Andersson and
                  Matthew Sorell and
                  Russell S. A. Brinkworth},
  editor       = {Matthew Sorell},
  title        = {Surveillance Applications of Biologically-Inspired Smart Cameras},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {65--76},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_8},
  doi          = {10.1007/978-3-642-02312-5\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/HaltisASB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KnightMS09,
  author       = {Simon Knight and
                  Simon Moschou and
                  Matthew Sorell},
  editor       = {Matthew Sorell},
  title        = {Analysis of Sensor Photo Response Non-Uniformity in {RAW} Images},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {130--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_15},
  doi          = {10.1007/978-3-642-02312-5\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KnightMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KokkinenN09,
  author       = {Heikki Kokkinen and
                  Janne N{\"{o}}yr{\"{a}}nen},
  editor       = {Matthew Sorell},
  title        = {Forensics for Detecting {P2P} Network Originated {MP3} Files on the
                  User Device},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {10--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_2},
  doi          = {10.1007/978-3-642-02312-5\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KokkinenN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Li09,
  author       = {Chang{-}Tsun Li},
  editor       = {Matthew Sorell},
  title        = {Detection of Block Artifacts for Digital Forensic Analysis},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {173--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_20},
  doi          = {10.1007/978-3-642-02312-5\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/Li09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LiL09,
  author       = {Chang{-}Tsun Li and
                  Yue Li},
  editor       = {Matthew Sorell},
  title        = {Authenticating Medical Images through Repetitive Index Modulation
                  Based Watermarking},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {153--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_17},
  doi          = {10.1007/978-3-642-02312-5\_17},
  timestamp    = {Fri, 29 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/LiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LiL09a,
  author       = {Yue Li and
                  Chang{-}Tsun Li},
  editor       = {Matthew Sorell},
  title        = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {166--172},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_19},
  doi          = {10.1007/978-3-642-02312-5\_19},
  timestamp    = {Fri, 29 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/LiL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LuomaL09,
  author       = {Milton H. Luoma and
                  Vicki Miller Luoma},
  editor       = {Matthew Sorell},
  title        = {Complying across Continents: At the Intersection of Litigation Rights
                  and Privacy Rights},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {186--194},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_22},
  doi          = {10.1007/978-3-642-02312-5\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/LuomaL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MahmoudiEM09,
  author       = {Fariborz Mahmoudi and
                  Rasul Enayatifar and
                  Mohsen Mirzashaeri},
  editor       = {Matthew Sorell},
  title        = {Image Encryption Using Chaotic Signal and Max-Heap Tree},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {19--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_3},
  doi          = {10.1007/978-3-642-02312-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MahmoudiEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MahmoudiMSF09,
  author       = {Fariborz Mahmoudi and
                  Mohsen Mirzashaeri and
                  Ehsan Shahamatnia and
                  Saed Faridnia},
  editor       = {Matthew Sorell},
  title        = {A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary
                  Neural Network},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_1},
  doi          = {10.1007/978-3-642-02312-5\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MahmoudiMSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/McGrathGKC09,
  author       = {Niall McGrath and
                  Pavel Gladyshev and
                  M. Tahar Kechadi and
                  Joe Carthy},
  editor       = {Matthew Sorell},
  title        = {Investigating Encrypted Material},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {29--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_4},
  doi          = {10.1007/978-3-642-02312-5\_4},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/McGrathGKC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/NevilleS09,
  author       = {Timothy Neville and
                  Matthew Sorell},
  editor       = {Matthew Sorell},
  title        = {Audit Log for Forensic Photography},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {142--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_16},
  doi          = {10.1007/978-3-642-02312-5\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/NevilleS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/PanB09,
  author       = {Lei Pan and
                  Lynn Margaret Batten},
  editor       = {Matthew Sorell},
  title        = {Robust Correctness Testing for Digital Forensic Tools},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {54--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_7},
  doi          = {10.1007/978-3-642-02312-5\_7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/PanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ParkCK09,
  author       = {Heum Park and
                  SunHo Cho and
                  Hyuk{-}Chul Kwon},
  editor       = {Matthew Sorell},
  title        = {Cyber Forensics Ontology for Cyber Criminal Investigation},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {160--165},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_18},
  doi          = {10.1007/978-3-642-02312-5\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ParkCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/PerrotMRC09,
  author       = {Patrick Perrot and
                  Mathieu Morel and
                  Joseph Razik and
                  G{\'{e}}rard Chollet},
  editor       = {Matthew Sorell},
  title        = {Vocal Forgery in Forensic Sciences},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {179--185},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_21},
  doi          = {10.1007/978-3-642-02312-5\_21},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/PerrotMRC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/RaghavanCM09,
  author       = {Sriram Raghavan and
                  Andrew J. Clark and
                  George M. Mohay},
  editor       = {Matthew Sorell},
  title        = {{FIA:} An Open Forensic Integration Architecture for Composing Digital
                  Evidence},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_10},
  doi          = {10.1007/978-3-642-02312-5\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/RaghavanCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ShiralkarLT09,
  author       = {Trupti Shiralkar and
                  Michael K. Lavine and
                  Benjamin P. Turnbull},
  editor       = {Matthew Sorell},
  title        = {A Preliminary Approach to the Forensic Analysis of an Ultraportable
                  {ASUS} Eee {PC}},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {116--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_13},
  doi          = {10.1007/978-3-642-02312-5\_13},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ShiralkarLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/SlayS09,
  author       = {Jill Slay and
                  Elena Sitnikova},
  editor       = {Matthew Sorell},
  title        = {The Development of a Generic Framework for the Forensic Analysis of
                  {SCADA} and Process Control Systems},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {77--82},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_9},
  doi          = {10.1007/978-3-642-02312-5\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/SlayS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Sullivan09,
  author       = {Clare Sullivan},
  editor       = {Matthew Sorell},
  title        = {Digital Identity - The Legal Person?},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_23},
  doi          = {10.1007/978-3-642-02312-5\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Sullivan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/TurnbullOS09,
  author       = {Benjamin P. Turnbull and
                  Grant Osborne and
                  Matthew Simon},
  editor       = {Matthew Sorell},
  title        = {Legal and Technical Implications of Collecting Wireless Data as an
                  Evidence Source},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {36--41},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_5},
  doi          = {10.1007/978-3-642-02312-5\_5},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/TurnbullOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WangC09,
  author       = {Xue{-}Guang Wang and
                  Zhen{-}Chuan Chai},
  editor       = {Matthew Sorell},
  title        = {A Provable Security Scheme of ID-Based Threshold Decryption},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {122--129},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_14},
  doi          = {10.1007/978-3-642-02312-5\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WongGC09,
  author       = {M. L. Dennis Wong and
                  Antionette W.{-}T. Goh and
                  Hong Siang Chua},
  editor       = {Matthew Sorell},
  title        = {Medical Image Authentication Using {DPT} Watermarking: {A} Preliminary
                  Attempt},
  booktitle    = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  pages        = {42--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5\_6},
  doi          = {10.1007/978-3-642-02312-5\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/WongGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eforensics/2009,
  editor       = {Matthew Sorell},
  title        = {Forensics in Telecommunications, Information and Multimedia, Second
                  International Conference, e-Forensics 2009, Adelaide, Australia, January
                  19-21, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {8},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02312-5},
  doi          = {10.1007/978-3-642-02312-5},
  isbn         = {978-3-642-02311-8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/0007WL08,
  author       = {Zhiming Liu and
                  Cheng Wang and
                  Jian Li},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Solving constrained optimization via a modified genetic particle swarm
                  optimization},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {49},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2663},
  doi          = {10.4108/WKDD.2008.2663},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/0007WL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BaekKSL08,
  author       = {Eunju Baek and
                  Yeog Kim and
                  Jinwon Sung and
                  Sangjin Lee},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {The design of framework for detecting an insider's leak of confidential
                  information},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {14},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2658},
  doi          = {10.4108/E-FORENSICS.2008.2658},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/BaekKSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BaoGLGZ08,
  author       = {Zhenqiang Bao and
                  Kaizhou Gao and
                  Xiangqing Li and
                  Lei Guo and
                  Hui Zhong},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Evaluating organization external knowledge acquisition},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {46},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2648},
  doi          = {10.4108/WKDD.2008.2648},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/BaoGLGZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BeekhofVKVT08,
  author       = {Fokko Beekhof and
                  Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Renato Vill{\'{a}}n and
                  Emre Topak},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Document forensics based on steganographic anti-counterfeiting markings
                  and mobile architectures},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {28},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2647},
  doi          = {10.4108/E-FORENSICS.2008.2647},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/BeekhofVKVT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BulbulBO08,
  author       = {Halil{-}Ibrahim Bulbul and
                  Ihsan Batmaz and
                  Mesut Ozel},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Wireless network security: comparison of {WEP} (Wired Equivalent Privacy)
                  mechanism, {WPA} (Wi-Fi Protected Access) and {RSN} (Robust Security
                  Network) security protocols},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {9},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2654},
  doi          = {10.4108/E-FORENSICS.2008.2654},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/BulbulBO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/CaiSY08,
  author       = {Lili Cai and
                  Fugeng Song and
                  Deling Yuan},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Study on the application of {SVM} in supplier primary election},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {39},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2636},
  doi          = {10.4108/WKDD.2008.2636},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/CaiSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ChenW08,
  author       = {Ke Chen and
                  Jia Wang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {The data mining technology based on {CIMS} and its application on
                  automotive remanufacturing},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {40},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2659},
  doi          = {10.4108/WKDD.2008.2659},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ChenW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/CikicGLS08,
  author       = {Sabine Cikic and
                  Sven Grottke and
                  Fritz Lehmann{-}Grube and
                  Jan Sablatnig},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Cheat-prevention and -analysis in online virtual worlds},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {13},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2650},
  doi          = {10.4108/E-FORENSICS.2008.2650},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/CikicGLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/CikicJLS08,
  author       = {Sabine Cikic and
                  Sabina Jeschke and
                  Fritz Lehmann{-}Grube and
                  Jan Sablatnig},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Using a room metaphor for e-forensic working environments},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {3},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2649},
  doi          = {10.4108/E-FORENSICS.2008.2649},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/CikicJLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Cohen08,
  author       = {Michael I. Cohen},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Advanced {JPEG} carving},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {16},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2643},
  doi          = {10.4108/E-FORENSICS.2008.2643},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Cohen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Ding08,
  author       = {Yuechao Ding},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A new method: multi-factor trend regression and its application to
                  economy forecast in Jiangxi},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {36},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2652},
  doi          = {10.4108/WKDD.2008.2652},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Ding08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/DongZWWQ08,
  author       = {Chun Dong and
                  Hongmei Zhang and
                  Tao Wang and
                  Yong Wang and
                  Agen Qiu},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Temporal and spatial analysis on labor productivity of radio and {TV}
                  industry in China},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {64},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2684},
  doi          = {10.4108/WKDD.2008.2684},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/DongZWWQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/DuanHZX08,
  author       = {Fu Duan and
                  Yongjie Han and
                  Qiuyong Zhao and
                  Keming Xie},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Towards self-tuning of dynamic resources for workloads},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {43},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2653},
  doi          = {10.4108/WKDD.2008.2653},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/DuanHZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/DuanJ08,
  author       = {Xinyu Duan and
                  Ping Jiang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Research of a virtual 3D study pattern based on constructive theory
                  in e-learning},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {65},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2689},
  doi          = {10.4108/WKDD.2008.2689},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/DuanJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/DuranRC08,
  author       = {Orlando Dur{\'{a}}n and
                  Nibaldo Rodr{\'{\i}}guez and
                  Luiz Airton Consalter},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A PSO-based clustering algorithm for manufacturing cell design},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {53},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2655},
  doi          = {10.4108/WKDD.2008.2655},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/DuranRC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/DuthoitSLJA08,
  author       = {Carmen Duthoit and
                  Tamara Sztynda and
                  S. K. L. Lal and
                  Budi Thomas Jap and
                  Johnson I. Agbinya},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Optical flow image analysis of facial expressions of human emotion:
                  forensic applications},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {5},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2743},
  doi          = {10.4108/E-FORENSICS.2008.2743},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/DuthoitSLJA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Eggendorfer08,
  author       = {Tobias Eggendorfer},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Methods to identify spammers},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {7},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.31},
  doi          = {10.4108/E-FORENSICS.2008.31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Eggendorfer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/GohWP08,
  author       = {Antionette W.{-}T. Goh and
                  M. L. Dennis Wong and
                  Raphael C.{-}W. Phan},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Analysis of a zero location based authentication scheme for biomedical
                  images},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {22},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2674},
  doi          = {10.4108/E-FORENSICS.2008.2674},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/GohWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/GongWLL08,
  author       = {Junfang Gong and
                  Xincai Wu and
                  Xiuguo Liu and
                  Shengwen Li},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Application of tetrahedral mesh model based on neural network in solid
                  mineral reserve estimation},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {66},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2692},
  doi          = {10.4108/WKDD.2008.2692},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/GongWLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/GuoCW08,
  author       = {Wei Guo and
                  Ke Chen and
                  Jia Wang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {An empirical study on improving the manufacturing informatization
                  index system of China},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {56},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2656},
  doi          = {10.4108/WKDD.2008.2656},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/GuoCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/GuptaP08,
  author       = {Gaurav Gupta and
                  Josef Pieprzyk},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Reversible and blind database watermarking using difference expansion},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {24},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2691},
  doi          = {10.4108/E-FORENSICS.2008.2691},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/GuptaP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HaggertyLT08,
  author       = {John Haggerty and
                  David Llewellyn{-}Jones and
                  Mark John Taylor},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {{FORWEB:} file fingerprinting for automated network forensics investigations},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {29},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2774},
  doi          = {10.4108/E-FORENSICS.2008.2774},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/HaggertyLT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HengelHDD08,
  author       = {Anton van den Hengel and
                  Rhys Hill and
                  Henry Detmold and
                  Anthony R. Dick},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Searching in space and time: a system for forensic analysis of large
                  video repositories},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {4},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2713},
  doi          = {10.4108/E-FORENSICS.2008.2713},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/HengelHDD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HuLW08,
  author       = {Zhengbing Hu and
                  Zhitang Li and
                  Junqi Wu},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A novel Network Intrusion Detection System {(NIDS)} based on signatures
                  search of data mining},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {45},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2686},
  doi          = {10.4108/WKDD.2008.2686},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/HuLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/HwangPBKC08,
  author       = {Myunggwon Hwang and
                  Jong{-}An Park and
                  Sunkyoung Baek and
                  Pankoo Kim and
                  Junho Choi},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Grasping related words of unknown word for automatic extension of
                  lexical dictionary},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {62},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2634},
  doi          = {10.4108/WKDD.2008.2634},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/HwangPBKC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/JeeLH08,
  author       = {Hyungkeun Jee and
                  Jooyoung Lee and
                  Dowon Hong},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {High speed search for large-scale digital forensic investigation},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {31},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2785},
  doi          = {10.4108/E-FORENSICS.2008.2785},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/JeeLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/JiaZT08,
  author       = {Xiaoliang Jia and
                  Zhenming Zhang and
                  Xitian Tian},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Research and application on typical process knowledge discovery in
                  mechanical manufacturing enterprise},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {38},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2688},
  doi          = {10.4108/WKDD.2008.2688},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/JiaZT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KimHC08,
  author       = {Keonwoo Kim and
                  Dowon Hong and
                  Kyoil Chung},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Forensics for Korean cell phone},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {30},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2755},
  doi          = {10.4108/E-FORENSICS.2008.2755},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KimHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KimLH08,
  author       = {Young{-}Soo Kim and
                  Sang{-}Su Lee and
                  Dowon Hong},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Suspects' data hiding at remaining registry values of uninstalled
                  programs},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {32},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.33},
  doi          = {10.4108/E-FORENSICS.2008.33},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KimLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/KuznetsovST08,
  author       = {Valerian A. Kuznetsov and
                  Jadranka Sunde and
                  Michael Thomas},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Explosive blast effects on latent fingerprints},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {25},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2676},
  doi          = {10.4108/E-FORENSICS.2008.2676},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/KuznetsovST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Leon08,
  author       = {Jos{\'{e}} Miguel Rubio Le{\'{o}}n},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Knowledge management in the ubiquitous software development},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {51},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2667},
  doi          = {10.4108/WKDD.2008.2667},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Leon08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LiDLX08,
  author       = {Deren Li and
                  Xinyi Dong and
                  Liangming Liu and
                  Daxiang Xiang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A new cloud detection algorithm for {FY-2C} images over China},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {52},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2664},
  doi          = {10.4108/WKDD.2008.2664},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/LiDLX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LiuXDZ08,
  author       = {Liangming Liu and
                  Daxiang Xiang and
                  Xinyi Dong and
                  Zheng Zhou},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Improvement of the drought monitoring model based on the cloud parameters
                  method and remote sensing data},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {63},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2651},
  doi          = {10.4108/WKDD.2008.2651},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/LiuXDZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LuoBOS08,
  author       = {Xinshi Luo and
                  Sivakumar Balakrishnan and
                  Peter Osvath and
                  Gerry Swiegers},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {DatatraceDNA{\textregistered}: a novel authentic technology for forensic
                  detections and identifications},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {26},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2844},
  doi          = {10.4108/E-FORENSICS.2008.2844},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/LuoBOS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/LuoC08,
  author       = {Jianhong Luo and
                  Dezhao Chen},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {An enhanced {ART2} neural network for clustering analysis},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {57},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2693},
  doi          = {10.4108/WKDD.2008.2693},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/LuoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MaZDX08,
  author       = {Hongchao Ma and
                  Wei Zhou and
                  Xinyi Dong and
                  Honggen Xu},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {An empirical research of multi-classifier fusion methods and diversity
                  measure in remote sensing classification},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {55},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2731},
  doi          = {10.4108/WKDD.2008.2731},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MaZDX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MacKenzieS08,
  author       = {Roland MacKenzie and
                  Matthew Sorell},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Recovery of circumstantial digital evidence leading to an Anton Piller
                  order: a case study},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {20},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2765},
  doi          = {10.4108/E-FORENSICS.2008.2765},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MacKenzieS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MaggentiBM08,
  author       = {Giada Maggenti and
                  Andrea Bracciali and
                  Paolo Mancarella},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Abduction and legal reasoning},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {33},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2640},
  doi          = {10.4108/E-FORENSICS.2008.2640},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MaggentiBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/MigliardiPTM08,
  author       = {Mauro Migliardi and
                  Roberto Podest{\'{a}} and
                  Matteo Tebaldi and
                  Massimo Maresca},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Hiding Skype VoIP calls from parametric identification},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {11},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2673},
  doi          = {10.4108/E-FORENSICS.2008.2673},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/MigliardiPTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/NilssonL08,
  author       = {Dennis K. Nilsson and
                  Ulf Larson},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Conducting forensic investigations of cyber attacks on automobile
                  in-vehicle networks},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {8},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.32},
  doi          = {10.4108/E-FORENSICS.2008.32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/NilssonL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/OhzekiS08,
  author       = {Kazuo Ohzeki and
                  Masaru Sakurai},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {SVD-based watermark with quasi-one-way operation by reducing a singular
                  value matrix rank},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {21},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2672},
  doi          = {10.4108/E-FORENSICS.2008.2672},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/OhzekiS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/PhillipsSK08,
  author       = {Braden J. Phillips and
                  Cain D. Schmidt and
                  Daniel R. Kelly},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Recovering data from {USB} flash memory sticks that have been damaged
                  or electronically erased},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {19},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2771},
  doi          = {10.4108/E-FORENSICS.2008.2771},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/PhillipsSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/PoilprePT08,
  author       = {Marie{-}Charlotte Poilpr{\'{e}} and
                  Patrick Perrot and
                  Hugues Talbot},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Image tampering detection using Bayer interpolation and {JPEG} compression},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {17},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2694},
  doi          = {10.4108/E-FORENSICS.2008.2694},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/PoilprePT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/QuZYW08,
  author       = {Shouning Qu and
                  Bing Zhang and
                  Xinsheng Yu and
                  Qin Wang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {The development and application of Chinese intelligent question answering
                  system based on {J2EE} technology},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {41},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2683},
  doi          = {10.4108/WKDD.2008.2683},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/QuZYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/SlayS08,
  author       = {Jill Slay and
                  Matthew Simon},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Voice over {IP} forensics},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {10},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2852},
  doi          = {10.4108/E-FORENSICS.2008.2852},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/SlayS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Sorell08,
  author       = {Matthew Sorell},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Conditions for effective detection and identification of primary quantization
                  of re-quantized {JPEG} images},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {18},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2764},
  doi          = {10.4108/E-FORENSICS.2008.2764},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Sorell08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/SpoonerS08,
  author       = {Nigel A. Spooner and
                  Barnaby W. Smith},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Luminescence analysis for radiological and nuclear forensic application},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {27},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2853},
  doi          = {10.4108/E-FORENSICS.2008.2853},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/SpoonerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/TingZ08,
  author       = {Wang Ting and
                  Hua Zhiwu},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A customer satisfaction degree evaluation model based on support vector
                  machine},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {37},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2791},
  doi          = {10.4108/WKDD.2008.2791},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/TingZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/TuononenHF08,
  author       = {Marko Tuononen and
                  Rosa Gonz{\'{a}}lez Hautam{\"{a}}ki and
                  Pasi Fr{\"{a}}nti},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Automatic voice activity detection in different speech applications},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {12},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2781},
  doi          = {10.4108/E-FORENSICS.2008.2781},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/TuononenHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Turnbull08,
  author       = {Benjamin P. Turnbull},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {The adaptability of electronic evidence acquisition guides for new
                  technologies},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {1},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2770},
  doi          = {10.4108/E-FORENSICS.2008.2770},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Turnbull08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WangYZ08,
  author       = {Zhongni Wang and
                  Xianchuan Yu and
                  Li{-}bao Zhang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A remote sensing image fusion algorithm based on ordinal fast independent
                  component analysis},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {54},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2690},
  doi          = {10.4108/WKDD.2008.2690},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WangYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WangZGLZ08,
  author       = {Daliang Wang and
                  Dezheng Zhang and
                  Lixin Gao and
                  Jianming Liu and
                  Huansheng Zhang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Process knowledge verification method based on petri net},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {50},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2671},
  doi          = {10.4108/WKDD.2008.2671},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WangZGLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WenHY08,
  author       = {Xingping Wen and
                  Guangdao Hu and
                  Xiaofeng Yang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {{CBERS-02} remote sensing data mining using decision tree algorithm},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {58},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2661},
  doi          = {10.4108/WKDD.2008.2661},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WenHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Willassen08,
  author       = {Svein Yngvar Willassen},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Timestamp evidence correlation by model based clock hypothesis testing},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {15},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2637},
  doi          = {10.4108/E-FORENSICS.2008.2637},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Willassen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Wilson08,
  author       = {Nigel H. M. Wilson},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Forensics in cyber-space: the legal challenges},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {2},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2926},
  doi          = {10.4108/E-FORENSICS.2008.2926},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Wilson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/XiaoPS08,
  author       = {Zhuo Xiao and
                  Amirsaman Poursoltanmohammadi and
                  Matthew Sorell},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Video motion detection beyond reasonable doubt},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {6},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2763},
  doi          = {10.4108/E-FORENSICS.2008.2763},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/XiaoPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/XiongPL08,
  author       = {Caiquan Xiong and
                  Ying Pan and
                  Dehua Li},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A discussion information-structuring model based on the Toulmin formalism},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {44},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2670},
  doi          = {10.4108/WKDD.2008.2670},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/XiongPL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/XuNLC08,
  author       = {Ruzhi Xu and
                  Peiyao Nie and
                  Peiguang Lin and
                  Dongsheng Chu},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Cloud model-based data attributes reduction for clustering},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {60},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2633},
  doi          = {10.4108/WKDD.2008.2633},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/XuNLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/XueZ08,
  author       = {Xiao Xue and
                  Xueyan Zhang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {The method engineering process for multi-agent system development},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {42},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2679},
  doi          = {10.4108/WKDD.2008.2679},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/XueZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/YuLS08,
  author       = {Guangzhu Yu and
                  Keqing Li and
                  Shihuang Shao},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Mining high utility itemsets in large high dimensional data},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {47},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2645},
  doi          = {10.4108/WKDD.2008.2645},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/YuLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/YushengMLD08,
  author       = {Xu Yusheng and
                  Zhixin Ma and
                  Li Lian and
                  Tharam S. Dillon},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Effective pruning strategies for sequential pattern mining},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {35},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2682},
  doi          = {10.4108/WKDD.2008.2682},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/YushengMLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Zhang08,
  author       = {Youdong Zhang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Cooperation forensic computing research},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {34},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2687},
  doi          = {10.4108/WKDD.2008.2687},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Zhang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/Zhang08a,
  author       = {Yixin Zhang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Coupling analysis of regional economic structure system},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {61},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2668},
  doi          = {10.4108/WKDD.2008.2668},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/Zhang08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhangGZL08,
  author       = {Dezheng Zhang and
                  Lixin Gao and
                  Huansheng Zhang and
                  Jianming Liu},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Centrality research on the traditional Chinese medicine network},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {59},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2662},
  doi          = {10.4108/WKDD.2008.2662},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhangGZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhengZW08,
  author       = {Shipu Zheng and
                  Yuesheng Zhu and
                  Xing Wang},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {A new RST-invariant watermarking scheme based on texture features},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {23},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/e-forensics.2008.2644},
  doi          = {10.4108/E-FORENSICS.2008.2644},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhengZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/ZhuWC08,
  author       = {Yong{-}li Zhu and
                  Xin{-}ying Wang and
                  Dong{-}ling Cheng},
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {Ontology-based research on wind power plant information interaction},
  booktitle    = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  pages        = {48},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {https://doi.org/10.4108/wkdd.2008.2638},
  doi          = {10.4108/WKDD.2008.2638},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/ZhuWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eforensics/2008,
  editor       = {Matthew Sorell and
                  Lang White},
  title        = {1st International {ICST} Conference on Forensic Applications and Techniques
                  in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008,
                  Adelaide, Australia, January 21-23, 2008},
  publisher    = {{ICST/ACM}},
  year         = {2008},
  url          = {http://eudl.eu/proceedings/E-FORENSICS/2008},
  isbn         = {978-963-9799-19-6},
  timestamp    = {Tue, 24 Mar 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eforensics/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics