Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/eforensics:"
@proceedings{DBLP:conf/eforensics/2010, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23602-0}, doi = {10.1007/978-3-642-23602-0}, isbn = {978-3-642-23601-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Al-KuwariW10, author = {Saif M. Al{-}Kuwari and Stephen D. Wolthusen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {207--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_20}, doi = {10.1007/978-3-642-23602-0\_20}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Al-KuwariW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BattenP10, author = {Lynn Margaret Batten and Lei Pan}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Using Relationship-Building in Event Profiling for Digital Forensic Investigations}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {40--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_4}, doi = {10.1007/978-3-642-23602-0\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BattenP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BlaskiewiczKK10, author = {Przemyslaw Blaskiewicz and Przemyslaw Kubiak and Miroslaw Kutylowski}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Digital Signatures for e-Government - {A} Long-Term Security Architecture}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {256--270}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_24}, doi = {10.1007/978-3-642-23602-0\_24}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BlaskiewiczKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ChenHGS10, author = {Yasha Chen and Jun Hu and Xinmao Gai and Yu Sun}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Privilege Separation Method for Security Commercial Transactions}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {185--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_17}, doi = {10.1007/978-3-642-23602-0\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ChenHGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DingGL10, author = {Ning Ding and Dawu Gu and Zhiqiang Liu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {241--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_23}, doi = {10.1007/978-3-642-23602-0\_23}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/DingGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DingGWW10, author = {Liping Ding and Jian Gu and Yongji Wang and JingZheng Wu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {301--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_30}, doi = {10.1007/978-3-642-23602-0\_30}, timestamp = {Sat, 25 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/DingGWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GongZL10, author = {Lei Gong and Yong Zhao and Jianhua Liao}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Research on the Application Security Isolation Model}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {294--300}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_29}, doi = {10.1007/978-3-642-23602-0\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/GongZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GuoJH10, author = {Hong Guo and Bo Jin and Daoli Huang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Research and Review on Computer Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {224--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_21}, doi = {10.1007/978-3-642-23602-0\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/GuoJH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HeLLL10, author = {Wenlei He and Gongshen Liu and Jun Luo and Jiuchuan Lin}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Text Content Filtering Based on Chinese Character Reconstruction from Radicals}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {234--240}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_22}, doi = {10.1007/978-3-642-23602-0\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HeLLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KsionskJC10, author = {Marti Ksionsk and Ping Ji and Weifeng Chen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Attacks on BitTorrent - An Experimental Study}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {79--89}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_7}, doi = {10.1007/978-3-642-23602-0\_7}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KsionskJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LeiDL10, author = {Zhenxing Lei and Theodora Dule and Xiaodong Lin}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {53--65}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_5}, doi = {10.1007/978-3-642-23602-0\_5}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LeiDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiGDL10, author = {Juanru Li and Dawu Gu and Chaoguo Deng and Yuhao Luo}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Digital Forensic Analysis on Runtime Instruction Flow}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {168--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_15}, doi = {10.1007/978-3-642-23602-0\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LiGDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LinLFS10, author = {Xiaodong Lin and Rongxing Lu and Kevin Foxton and Xuemin (Sherman) Shen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {An Efficient Searchable Encryption Scheme and Its Application in Network Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {66--78}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_6}, doi = {10.1007/978-3-642-23602-0\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LinLFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LinZD10, author = {Xiaodong Lin and Chenxi Zhang and Theodora Dule}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {On Achieving Encrypted File Recovery}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {1--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_1}, doi = {10.1007/978-3-642-23602-0\_1}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LinZD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MoLZ10, author = {Can Mo and Hui Li and Hui Zhu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Stream Pattern Matching Method for Traffic Analysis}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {131--140}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_12}, doi = {10.1007/978-3-642-23602-0\_12}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/MoLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PengLLZZ10, author = {Hao Peng and Songnian Lu and Jianhua Li and Aixin Zhang and Dandan Zhao}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {An Anonymity Scheme Based on Pseudonym in {P2P} Networks}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {287--293}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_28}, doi = {10.1007/978-3-642-23602-0\_28}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/PengLLZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SongJZS10, author = {Zheng Song and Bo Jin and Yinghong Zhu and Yongqing Sun}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Investigating the Implications of Virtualization for Digital Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {110--121}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_10}, doi = {10.1007/978-3-642-23602-0\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SongJZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Wang10, author = {Yi Wang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Study on Supervision of Integrity of Chain of Custody in Computer Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {200--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_19}, doi = {10.1007/978-3-642-23602-0\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Wang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangGXWD10, author = {Yong Wang and Dawu Gu and Jianping Xu and Mi Wen and Liwen Deng}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {{RICB:} Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {99--109}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_9}, doi = {10.1007/978-3-642-23602-0\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangGXWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangXZ10, author = {Lianhai Wang and Lijuan Xu and Shuhui Zhang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Network Connections Information Extraction of 64-Bit Windows 7 Memory Images}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {90--98}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_8}, doi = {10.1007/978-3-642-23602-0\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Wu10, author = {Beihua Wu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {{SQL} Injection Defense Mechanisms for {IIS+ASP+MSSQL} Web Applications}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {271--276}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_25}, doi = {10.1007/978-3-642-23602-0\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Wu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XuGWA10, author = {Aidong Xu and Yan Gong and Yongquan Wang and Nayan Ai}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {On Different Categories of Cybercrime in China}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {277--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_26}, doi = {10.1007/978-3-642-23602-0\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XuGWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XuWZK10, author = {Lijuan Xu and Lianhai Wang and Lei Zhang and Zhigang Kong}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {122--130}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_11}, doi = {10.1007/978-3-642-23602-0\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XuWZK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/YiTL10, author = {Junkai Yi and Shuo Tang and Hui Li}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Data Recovery Based on Intelligent Pattern Matching}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {193--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_18}, doi = {10.1007/978-3-642-23602-0\_18}, timestamp = {Wed, 26 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/YiTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/YingT10, author = {Hwei{-}Ming Ying and Vrizlynn L. L. Thing}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Novel Inequality-Based Fragmented File Carving Technique}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {28--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_3}, doi = {10.1007/978-3-642-23602-0\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/YingT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhaS10, author = {Xinyan Zha and Sartaj Sahni}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Fast in-Place File Carving for Digital Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {141--158}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_13}, doi = {10.1007/978-3-642-23602-0\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Zhang10, author = {Ying Zhang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Face and Lip Tracking for Person Identification}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {282--286}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_27}, doi = {10.1007/978-3-642-23602-0\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Zhang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhangWZZZ10, author = {Lei Zhang and Lianhai Wang and Ruichao Zhang and Shuhui Zhang and Yang Zhou}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Live Memory Acquisition through FireWire}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {159--167}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_14}, doi = {10.1007/978-3-642-23602-0\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhangWZZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhouHQGS10, author = {Kan Zhou and Shiqiu Huang and Zhengwei Qi and Jian Gu and Beijun Shen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Enhance Information Flow Tracking with Function Recognition}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {179--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_16}, doi = {10.1007/978-3-642-23602-0\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhouHQGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhuLL10, author = {Xudong Zhu and Hui Li and Zhijing Liu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Behavior Clustering for Anomaly Detection}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {14--27}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_2}, doi = {10.1007/978-3-642-23602-0\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhuLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/CaldelliAP09, author = {Roberto Caldelli and Irene Amerini and Francesco Picchioni}, editor = {Matthew Sorell}, title = {Distinguishing between Camera and Scanned Images by Means of Frequency Analysis}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {95--101}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_11}, doi = {10.1007/978-3-642-02312-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/CaldelliAP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/CikicLS09, author = {Sabine Cikic and Fritz Lehmann{-}Grube and Jan Sablatnig}, editor = {Matthew Sorell}, title = {Surveillance and Datenschutz in Virtual Environments}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {212--219}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_24}, doi = {10.1007/978-3-642-02312-5\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/CikicLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/FrantiSKKHS09, author = {Pasi Fr{\"{a}}nti and Juhani Saastamoinen and Ismo K{\"{a}}rkk{\"{a}}inen and Tomi Kinnunen and Ville Hautam{\"{a}}ki and Ilja Sidoroff}, editor = {Matthew Sorell}, title = {Developing Speaker Recognition System: From Prototype to Practical Application}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {102--115}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_12}, doi = {10.1007/978-3-642-02312-5\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/FrantiSKKHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HaltisASB09, author = {Kosta Haltis and Lee Andersson and Matthew Sorell and Russell S. A. Brinkworth}, editor = {Matthew Sorell}, title = {Surveillance Applications of Biologically-Inspired Smart Cameras}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {65--76}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_8}, doi = {10.1007/978-3-642-02312-5\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HaltisASB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KnightMS09, author = {Simon Knight and Simon Moschou and Matthew Sorell}, editor = {Matthew Sorell}, title = {Analysis of Sensor Photo Response Non-Uniformity in {RAW} Images}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {130--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_15}, doi = {10.1007/978-3-642-02312-5\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KnightMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KokkinenN09, author = {Heikki Kokkinen and Janne N{\"{o}}yr{\"{a}}nen}, editor = {Matthew Sorell}, title = {Forensics for Detecting {P2P} Network Originated {MP3} Files on the User Device}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {10--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_2}, doi = {10.1007/978-3-642-02312-5\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KokkinenN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Li09, author = {Chang{-}Tsun Li}, editor = {Matthew Sorell}, title = {Detection of Block Artifacts for Digital Forensic Analysis}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {173--178}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_20}, doi = {10.1007/978-3-642-02312-5\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/Li09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiL09, author = {Chang{-}Tsun Li and Yue Li}, editor = {Matthew Sorell}, title = {Authenticating Medical Images through Repetitive Index Modulation Based Watermarking}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {153--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_17}, doi = {10.1007/978-3-642-02312-5\_17}, timestamp = {Fri, 29 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiL09a, author = {Yue Li and Chang{-}Tsun Li}, editor = {Matthew Sorell}, title = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {166--172}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_19}, doi = {10.1007/978-3-642-02312-5\_19}, timestamp = {Fri, 29 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LiL09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LuomaL09, author = {Milton H. Luoma and Vicki Miller Luoma}, editor = {Matthew Sorell}, title = {Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {186--194}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_22}, doi = {10.1007/978-3-642-02312-5\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LuomaL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MahmoudiEM09, author = {Fariborz Mahmoudi and Rasul Enayatifar and Mohsen Mirzashaeri}, editor = {Matthew Sorell}, title = {Image Encryption Using Chaotic Signal and Max-Heap Tree}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {19--28}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_3}, doi = {10.1007/978-3-642-02312-5\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MahmoudiEM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MahmoudiMSF09, author = {Fariborz Mahmoudi and Mohsen Mirzashaeri and Ehsan Shahamatnia and Saed Faridnia}, editor = {Matthew Sorell}, title = {A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {1--9}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_1}, doi = {10.1007/978-3-642-02312-5\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MahmoudiMSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/McGrathGKC09, author = {Niall McGrath and Pavel Gladyshev and M. Tahar Kechadi and Joe Carthy}, editor = {Matthew Sorell}, title = {Investigating Encrypted Material}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {29--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_4}, doi = {10.1007/978-3-642-02312-5\_4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/McGrathGKC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/NevilleS09, author = {Timothy Neville and Matthew Sorell}, editor = {Matthew Sorell}, title = {Audit Log for Forensic Photography}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {142--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_16}, doi = {10.1007/978-3-642-02312-5\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/NevilleS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PanB09, author = {Lei Pan and Lynn Margaret Batten}, editor = {Matthew Sorell}, title = {Robust Correctness Testing for Digital Forensic Tools}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {54--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_7}, doi = {10.1007/978-3-642-02312-5\_7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/PanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ParkCK09, author = {Heum Park and SunHo Cho and Hyuk{-}Chul Kwon}, editor = {Matthew Sorell}, title = {Cyber Forensics Ontology for Cyber Criminal Investigation}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {160--165}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_18}, doi = {10.1007/978-3-642-02312-5\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ParkCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PerrotMRC09, author = {Patrick Perrot and Mathieu Morel and Joseph Razik and G{\'{e}}rard Chollet}, editor = {Matthew Sorell}, title = {Vocal Forgery in Forensic Sciences}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {179--185}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_21}, doi = {10.1007/978-3-642-02312-5\_21}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/PerrotMRC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/RaghavanCM09, author = {Sriram Raghavan and Andrew J. Clark and George M. Mohay}, editor = {Matthew Sorell}, title = {{FIA:} An Open Forensic Integration Architecture for Composing Digital Evidence}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {83--94}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_10}, doi = {10.1007/978-3-642-02312-5\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/RaghavanCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ShiralkarLT09, author = {Trupti Shiralkar and Michael K. Lavine and Benjamin P. Turnbull}, editor = {Matthew Sorell}, title = {A Preliminary Approach to the Forensic Analysis of an Ultraportable {ASUS} Eee {PC}}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {116--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_13}, doi = {10.1007/978-3-642-02312-5\_13}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ShiralkarLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SlayS09, author = {Jill Slay and Elena Sitnikova}, editor = {Matthew Sorell}, title = {The Development of a Generic Framework for the Forensic Analysis of {SCADA} and Process Control Systems}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {77--82}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_9}, doi = {10.1007/978-3-642-02312-5\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SlayS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Sullivan09, author = {Clare Sullivan}, editor = {Matthew Sorell}, title = {Digital Identity - The Legal Person?}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {195--211}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_23}, doi = {10.1007/978-3-642-02312-5\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Sullivan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/TurnbullOS09, author = {Benjamin P. Turnbull and Grant Osborne and Matthew Simon}, editor = {Matthew Sorell}, title = {Legal and Technical Implications of Collecting Wireless Data as an Evidence Source}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {36--41}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_5}, doi = {10.1007/978-3-642-02312-5\_5}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/TurnbullOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangC09, author = {Xue{-}Guang Wang and Zhen{-}Chuan Chai}, editor = {Matthew Sorell}, title = {A Provable Security Scheme of ID-Based Threshold Decryption}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {122--129}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_14}, doi = {10.1007/978-3-642-02312-5\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WongGC09, author = {M. L. Dennis Wong and Antionette W.{-}T. Goh and Hong Siang Chua}, editor = {Matthew Sorell}, title = {Medical Image Authentication Using {DPT} Watermarking: {A} Preliminary Attempt}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {42--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_6}, doi = {10.1007/978-3-642-02312-5\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/WongGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eforensics/2009, editor = {Matthew Sorell}, title = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5}, doi = {10.1007/978-3-642-02312-5}, isbn = {978-3-642-02311-8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/0007WL08, author = {Zhiming Liu and Cheng Wang and Jian Li}, editor = {Matthew Sorell and Lang White}, title = {Solving constrained optimization via a modified genetic particle swarm optimization}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {49}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2663}, doi = {10.4108/WKDD.2008.2663}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/0007WL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BaekKSL08, author = {Eunju Baek and Yeog Kim and Jinwon Sung and Sangjin Lee}, editor = {Matthew Sorell and Lang White}, title = {The design of framework for detecting an insider's leak of confidential information}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {14}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2658}, doi = {10.4108/E-FORENSICS.2008.2658}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BaekKSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BaoGLGZ08, author = {Zhenqiang Bao and Kaizhou Gao and Xiangqing Li and Lei Guo and Hui Zhong}, editor = {Matthew Sorell and Lang White}, title = {Evaluating organization external knowledge acquisition}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {46}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2648}, doi = {10.4108/WKDD.2008.2648}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BaoGLGZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BeekhofVKVT08, author = {Fokko Beekhof and Sviatoslav Voloshynovskiy and Oleksiy J. Koval and Renato Vill{\'{a}}n and Emre Topak}, editor = {Matthew Sorell and Lang White}, title = {Document forensics based on steganographic anti-counterfeiting markings and mobile architectures}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {28}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2647}, doi = {10.4108/E-FORENSICS.2008.2647}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/BeekhofVKVT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BulbulBO08, author = {Halil{-}Ibrahim Bulbul and Ihsan Batmaz and Mesut Ozel}, editor = {Matthew Sorell and Lang White}, title = {Wireless network security: comparison of {WEP} (Wired Equivalent Privacy) mechanism, {WPA} (Wi-Fi Protected Access) and {RSN} (Robust Security Network) security protocols}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {9}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2654}, doi = {10.4108/E-FORENSICS.2008.2654}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BulbulBO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/CaiSY08, author = {Lili Cai and Fugeng Song and Deling Yuan}, editor = {Matthew Sorell and Lang White}, title = {Study on the application of {SVM} in supplier primary election}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {39}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2636}, doi = {10.4108/WKDD.2008.2636}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/CaiSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ChenW08, author = {Ke Chen and Jia Wang}, editor = {Matthew Sorell and Lang White}, title = {The data mining technology based on {CIMS} and its application on automotive remanufacturing}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {40}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2659}, doi = {10.4108/WKDD.2008.2659}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ChenW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/CikicGLS08, author = {Sabine Cikic and Sven Grottke and Fritz Lehmann{-}Grube and Jan Sablatnig}, editor = {Matthew Sorell and Lang White}, title = {Cheat-prevention and -analysis in online virtual worlds}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {13}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2650}, doi = {10.4108/E-FORENSICS.2008.2650}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/CikicGLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/CikicJLS08, author = {Sabine Cikic and Sabina Jeschke and Fritz Lehmann{-}Grube and Jan Sablatnig}, editor = {Matthew Sorell and Lang White}, title = {Using a room metaphor for e-forensic working environments}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {3}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2649}, doi = {10.4108/E-FORENSICS.2008.2649}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/CikicJLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Cohen08, author = {Michael I. Cohen}, editor = {Matthew Sorell and Lang White}, title = {Advanced {JPEG} carving}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {16}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2643}, doi = {10.4108/E-FORENSICS.2008.2643}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Cohen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Ding08, author = {Yuechao Ding}, editor = {Matthew Sorell and Lang White}, title = {A new method: multi-factor trend regression and its application to economy forecast in Jiangxi}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {36}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2652}, doi = {10.4108/WKDD.2008.2652}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Ding08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DongZWWQ08, author = {Chun Dong and Hongmei Zhang and Tao Wang and Yong Wang and Agen Qiu}, editor = {Matthew Sorell and Lang White}, title = {Temporal and spatial analysis on labor productivity of radio and {TV} industry in China}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {64}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2684}, doi = {10.4108/WKDD.2008.2684}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/DongZWWQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DuanHZX08, author = {Fu Duan and Yongjie Han and Qiuyong Zhao and Keming Xie}, editor = {Matthew Sorell and Lang White}, title = {Towards self-tuning of dynamic resources for workloads}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {43}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2653}, doi = {10.4108/WKDD.2008.2653}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/DuanHZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DuanJ08, author = {Xinyu Duan and Ping Jiang}, editor = {Matthew Sorell and Lang White}, title = {Research of a virtual 3D study pattern based on constructive theory in e-learning}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {65}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2689}, doi = {10.4108/WKDD.2008.2689}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/DuanJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DuranRC08, author = {Orlando Dur{\'{a}}n and Nibaldo Rodr{\'{\i}}guez and Luiz Airton Consalter}, editor = {Matthew Sorell and Lang White}, title = {A PSO-based clustering algorithm for manufacturing cell design}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {53}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2655}, doi = {10.4108/WKDD.2008.2655}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/DuranRC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DuthoitSLJA08, author = {Carmen Duthoit and Tamara Sztynda and S. K. L. Lal and Budi Thomas Jap and Johnson I. Agbinya}, editor = {Matthew Sorell and Lang White}, title = {Optical flow image analysis of facial expressions of human emotion: forensic applications}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {5}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2743}, doi = {10.4108/E-FORENSICS.2008.2743}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/DuthoitSLJA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Eggendorfer08, author = {Tobias Eggendorfer}, editor = {Matthew Sorell and Lang White}, title = {Methods to identify spammers}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {7}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.31}, doi = {10.4108/E-FORENSICS.2008.31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Eggendorfer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GohWP08, author = {Antionette W.{-}T. Goh and M. L. Dennis Wong and Raphael C.{-}W. Phan}, editor = {Matthew Sorell and Lang White}, title = {Analysis of a zero location based authentication scheme for biomedical images}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {22}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2674}, doi = {10.4108/E-FORENSICS.2008.2674}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/GohWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GongWLL08, author = {Junfang Gong and Xincai Wu and Xiuguo Liu and Shengwen Li}, editor = {Matthew Sorell and Lang White}, title = {Application of tetrahedral mesh model based on neural network in solid mineral reserve estimation}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {66}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2692}, doi = {10.4108/WKDD.2008.2692}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/GongWLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GuoCW08, author = {Wei Guo and Ke Chen and Jia Wang}, editor = {Matthew Sorell and Lang White}, title = {An empirical study on improving the manufacturing informatization index system of China}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {56}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2656}, doi = {10.4108/WKDD.2008.2656}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/GuoCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GuptaP08, author = {Gaurav Gupta and Josef Pieprzyk}, editor = {Matthew Sorell and Lang White}, title = {Reversible and blind database watermarking using difference expansion}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {24}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2691}, doi = {10.4108/E-FORENSICS.2008.2691}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/GuptaP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HaggertyLT08, author = {John Haggerty and David Llewellyn{-}Jones and Mark John Taylor}, editor = {Matthew Sorell and Lang White}, title = {{FORWEB:} file fingerprinting for automated network forensics investigations}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {29}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2774}, doi = {10.4108/E-FORENSICS.2008.2774}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HaggertyLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HengelHDD08, author = {Anton van den Hengel and Rhys Hill and Henry Detmold and Anthony R. Dick}, editor = {Matthew Sorell and Lang White}, title = {Searching in space and time: a system for forensic analysis of large video repositories}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {4}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2713}, doi = {10.4108/E-FORENSICS.2008.2713}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HengelHDD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HuLW08, author = {Zhengbing Hu and Zhitang Li and Junqi Wu}, editor = {Matthew Sorell and Lang White}, title = {A novel Network Intrusion Detection System {(NIDS)} based on signatures search of data mining}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {45}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2686}, doi = {10.4108/WKDD.2008.2686}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HuLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HwangPBKC08, author = {Myunggwon Hwang and Jong{-}An Park and Sunkyoung Baek and Pankoo Kim and Junho Choi}, editor = {Matthew Sorell and Lang White}, title = {Grasping related words of unknown word for automatic extension of lexical dictionary}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {62}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2634}, doi = {10.4108/WKDD.2008.2634}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HwangPBKC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/JeeLH08, author = {Hyungkeun Jee and Jooyoung Lee and Dowon Hong}, editor = {Matthew Sorell and Lang White}, title = {High speed search for large-scale digital forensic investigation}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {31}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2785}, doi = {10.4108/E-FORENSICS.2008.2785}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/JeeLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/JiaZT08, author = {Xiaoliang Jia and Zhenming Zhang and Xitian Tian}, editor = {Matthew Sorell and Lang White}, title = {Research and application on typical process knowledge discovery in mechanical manufacturing enterprise}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {38}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2688}, doi = {10.4108/WKDD.2008.2688}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/JiaZT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KimHC08, author = {Keonwoo Kim and Dowon Hong and Kyoil Chung}, editor = {Matthew Sorell and Lang White}, title = {Forensics for Korean cell phone}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {30}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2755}, doi = {10.4108/E-FORENSICS.2008.2755}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KimHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KimLH08, author = {Young{-}Soo Kim and Sang{-}Su Lee and Dowon Hong}, editor = {Matthew Sorell and Lang White}, title = {Suspects' data hiding at remaining registry values of uninstalled programs}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {32}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.33}, doi = {10.4108/E-FORENSICS.2008.33}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KimLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KuznetsovST08, author = {Valerian A. Kuznetsov and Jadranka Sunde and Michael Thomas}, editor = {Matthew Sorell and Lang White}, title = {Explosive blast effects on latent fingerprints}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {25}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2676}, doi = {10.4108/E-FORENSICS.2008.2676}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KuznetsovST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Leon08, author = {Jos{\'{e}} Miguel Rubio Le{\'{o}}n}, editor = {Matthew Sorell and Lang White}, title = {Knowledge management in the ubiquitous software development}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {51}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2667}, doi = {10.4108/WKDD.2008.2667}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Leon08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiDLX08, author = {Deren Li and Xinyi Dong and Liangming Liu and Daxiang Xiang}, editor = {Matthew Sorell and Lang White}, title = {A new cloud detection algorithm for {FY-2C} images over China}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {52}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2664}, doi = {10.4108/WKDD.2008.2664}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LiDLX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiuXDZ08, author = {Liangming Liu and Daxiang Xiang and Xinyi Dong and Zheng Zhou}, editor = {Matthew Sorell and Lang White}, title = {Improvement of the drought monitoring model based on the cloud parameters method and remote sensing data}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {63}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2651}, doi = {10.4108/WKDD.2008.2651}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LiuXDZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LuoBOS08, author = {Xinshi Luo and Sivakumar Balakrishnan and Peter Osvath and Gerry Swiegers}, editor = {Matthew Sorell and Lang White}, title = {DatatraceDNA{\textregistered}: a novel authentic technology for forensic detections and identifications}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {26}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2844}, doi = {10.4108/E-FORENSICS.2008.2844}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LuoBOS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LuoC08, author = {Jianhong Luo and Dezhao Chen}, editor = {Matthew Sorell and Lang White}, title = {An enhanced {ART2} neural network for clustering analysis}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {57}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2693}, doi = {10.4108/WKDD.2008.2693}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LuoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MaZDX08, author = {Hongchao Ma and Wei Zhou and Xinyi Dong and Honggen Xu}, editor = {Matthew Sorell and Lang White}, title = {An empirical research of multi-classifier fusion methods and diversity measure in remote sensing classification}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {55}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2731}, doi = {10.4108/WKDD.2008.2731}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MaZDX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MacKenzieS08, author = {Roland MacKenzie and Matthew Sorell}, editor = {Matthew Sorell and Lang White}, title = {Recovery of circumstantial digital evidence leading to an Anton Piller order: a case study}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {20}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2765}, doi = {10.4108/E-FORENSICS.2008.2765}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MacKenzieS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MaggentiBM08, author = {Giada Maggenti and Andrea Bracciali and Paolo Mancarella}, editor = {Matthew Sorell and Lang White}, title = {Abduction and legal reasoning}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {33}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2640}, doi = {10.4108/E-FORENSICS.2008.2640}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MaggentiBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MigliardiPTM08, author = {Mauro Migliardi and Roberto Podest{\'{a}} and Matteo Tebaldi and Massimo Maresca}, editor = {Matthew Sorell and Lang White}, title = {Hiding Skype VoIP calls from parametric identification}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {11}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2673}, doi = {10.4108/E-FORENSICS.2008.2673}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MigliardiPTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/NilssonL08, author = {Dennis K. Nilsson and Ulf Larson}, editor = {Matthew Sorell and Lang White}, title = {Conducting forensic investigations of cyber attacks on automobile in-vehicle networks}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {8}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.32}, doi = {10.4108/E-FORENSICS.2008.32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/NilssonL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/OhzekiS08, author = {Kazuo Ohzeki and Masaru Sakurai}, editor = {Matthew Sorell and Lang White}, title = {SVD-based watermark with quasi-one-way operation by reducing a singular value matrix rank}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {21}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2672}, doi = {10.4108/E-FORENSICS.2008.2672}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/OhzekiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PhillipsSK08, author = {Braden J. Phillips and Cain D. Schmidt and Daniel R. Kelly}, editor = {Matthew Sorell and Lang White}, title = {Recovering data from {USB} flash memory sticks that have been damaged or electronically erased}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {19}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2771}, doi = {10.4108/E-FORENSICS.2008.2771}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/PhillipsSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PoilprePT08, author = {Marie{-}Charlotte Poilpr{\'{e}} and Patrick Perrot and Hugues Talbot}, editor = {Matthew Sorell and Lang White}, title = {Image tampering detection using Bayer interpolation and {JPEG} compression}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {17}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2694}, doi = {10.4108/E-FORENSICS.2008.2694}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/PoilprePT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/QuZYW08, author = {Shouning Qu and Bing Zhang and Xinsheng Yu and Qin Wang}, editor = {Matthew Sorell and Lang White}, title = {The development and application of Chinese intelligent question answering system based on {J2EE} technology}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {41}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2683}, doi = {10.4108/WKDD.2008.2683}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/QuZYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SlayS08, author = {Jill Slay and Matthew Simon}, editor = {Matthew Sorell and Lang White}, title = {Voice over {IP} forensics}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {10}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2852}, doi = {10.4108/E-FORENSICS.2008.2852}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SlayS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Sorell08, author = {Matthew Sorell}, editor = {Matthew Sorell and Lang White}, title = {Conditions for effective detection and identification of primary quantization of re-quantized {JPEG} images}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {18}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2764}, doi = {10.4108/E-FORENSICS.2008.2764}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Sorell08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SpoonerS08, author = {Nigel A. Spooner and Barnaby W. Smith}, editor = {Matthew Sorell and Lang White}, title = {Luminescence analysis for radiological and nuclear forensic application}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {27}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2853}, doi = {10.4108/E-FORENSICS.2008.2853}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SpoonerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/TingZ08, author = {Wang Ting and Hua Zhiwu}, editor = {Matthew Sorell and Lang White}, title = {A customer satisfaction degree evaluation model based on support vector machine}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {37}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2791}, doi = {10.4108/WKDD.2008.2791}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/TingZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/TuononenHF08, author = {Marko Tuononen and Rosa Gonz{\'{a}}lez Hautam{\"{a}}ki and Pasi Fr{\"{a}}nti}, editor = {Matthew Sorell and Lang White}, title = {Automatic voice activity detection in different speech applications}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {12}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2781}, doi = {10.4108/E-FORENSICS.2008.2781}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/TuononenHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Turnbull08, author = {Benjamin P. Turnbull}, editor = {Matthew Sorell and Lang White}, title = {The adaptability of electronic evidence acquisition guides for new technologies}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {1}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2770}, doi = {10.4108/E-FORENSICS.2008.2770}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Turnbull08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangYZ08, author = {Zhongni Wang and Xianchuan Yu and Li{-}bao Zhang}, editor = {Matthew Sorell and Lang White}, title = {A remote sensing image fusion algorithm based on ordinal fast independent component analysis}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {54}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2690}, doi = {10.4108/WKDD.2008.2690}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangZGLZ08, author = {Daliang Wang and Dezheng Zhang and Lixin Gao and Jianming Liu and Huansheng Zhang}, editor = {Matthew Sorell and Lang White}, title = {Process knowledge verification method based on petri net}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {50}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2671}, doi = {10.4108/WKDD.2008.2671}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangZGLZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WenHY08, author = {Xingping Wen and Guangdao Hu and Xiaofeng Yang}, editor = {Matthew Sorell and Lang White}, title = {{CBERS-02} remote sensing data mining using decision tree algorithm}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {58}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2661}, doi = {10.4108/WKDD.2008.2661}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WenHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Willassen08, author = {Svein Yngvar Willassen}, editor = {Matthew Sorell and Lang White}, title = {Timestamp evidence correlation by model based clock hypothesis testing}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {15}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2637}, doi = {10.4108/E-FORENSICS.2008.2637}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Willassen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Wilson08, author = {Nigel H. M. Wilson}, editor = {Matthew Sorell and Lang White}, title = {Forensics in cyber-space: the legal challenges}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {2}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2926}, doi = {10.4108/E-FORENSICS.2008.2926}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Wilson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XiaoPS08, author = {Zhuo Xiao and Amirsaman Poursoltanmohammadi and Matthew Sorell}, editor = {Matthew Sorell and Lang White}, title = {Video motion detection beyond reasonable doubt}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {6}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2763}, doi = {10.4108/E-FORENSICS.2008.2763}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XiaoPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XiongPL08, author = {Caiquan Xiong and Ying Pan and Dehua Li}, editor = {Matthew Sorell and Lang White}, title = {A discussion information-structuring model based on the Toulmin formalism}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {44}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2670}, doi = {10.4108/WKDD.2008.2670}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XiongPL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XuNLC08, author = {Ruzhi Xu and Peiyao Nie and Peiguang Lin and Dongsheng Chu}, editor = {Matthew Sorell and Lang White}, title = {Cloud model-based data attributes reduction for clustering}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {60}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2633}, doi = {10.4108/WKDD.2008.2633}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XuNLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XueZ08, author = {Xiao Xue and Xueyan Zhang}, editor = {Matthew Sorell and Lang White}, title = {The method engineering process for multi-agent system development}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {42}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2679}, doi = {10.4108/WKDD.2008.2679}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XueZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/YuLS08, author = {Guangzhu Yu and Keqing Li and Shihuang Shao}, editor = {Matthew Sorell and Lang White}, title = {Mining high utility itemsets in large high dimensional data}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {47}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2645}, doi = {10.4108/WKDD.2008.2645}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/YuLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/YushengMLD08, author = {Xu Yusheng and Zhixin Ma and Li Lian and Tharam S. Dillon}, editor = {Matthew Sorell and Lang White}, title = {Effective pruning strategies for sequential pattern mining}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {35}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2682}, doi = {10.4108/WKDD.2008.2682}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/YushengMLD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Zhang08, author = {Youdong Zhang}, editor = {Matthew Sorell and Lang White}, title = {Cooperation forensic computing research}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {34}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2687}, doi = {10.4108/WKDD.2008.2687}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Zhang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Zhang08a, author = {Yixin Zhang}, editor = {Matthew Sorell and Lang White}, title = {Coupling analysis of regional economic structure system}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {61}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2668}, doi = {10.4108/WKDD.2008.2668}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Zhang08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhangGZL08, author = {Dezheng Zhang and Lixin Gao and Huansheng Zhang and Jianming Liu}, editor = {Matthew Sorell and Lang White}, title = {Centrality research on the traditional Chinese medicine network}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {59}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2662}, doi = {10.4108/WKDD.2008.2662}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhangGZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhengZW08, author = {Shipu Zheng and Yuesheng Zhu and Xing Wang}, editor = {Matthew Sorell and Lang White}, title = {A new RST-invariant watermarking scheme based on texture features}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {23}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/e-forensics.2008.2644}, doi = {10.4108/E-FORENSICS.2008.2644}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhengZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhuWC08, author = {Yong{-}li Zhu and Xin{-}ying Wang and Dong{-}ling Cheng}, editor = {Matthew Sorell and Lang White}, title = {Ontology-based research on wind power plant information interaction}, booktitle = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, pages = {48}, publisher = {{ICST/ACM}}, year = {2008}, url = {https://doi.org/10.4108/wkdd.2008.2638}, doi = {10.4108/WKDD.2008.2638}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhuWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eforensics/2008, editor = {Matthew Sorell and Lang White}, title = {1st International {ICST} Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, {E-FORENSICS} 2008, Adelaide, Australia, January 21-23, 2008}, publisher = {{ICST/ACM}}, year = {2008}, url = {http://eudl.eu/proceedings/E-FORENSICS/2008}, isbn = {978-963-9799-19-6}, timestamp = {Tue, 24 Mar 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.