default search action
Search dblp for Publications
export results for "toc:db/journals/ijdcf/ijdcf9.bht:"
@article{DBLP:journals/ijdcf/Ahmed17, author = {Abdulghani Ali Ahmed}, title = {Investigation Approach for Network Attack Intention Recognition}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {17--38}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010102}, doi = {10.4018/IJDCF.2017010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Ahmed17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AizeziJAM17, author = {Yasen Aizezi and Anwar Jamal and Ruxianguli Abudurexiti and Mutalipu Muming}, title = {Research on Digital Forensics Based on Uyghur Web Text Classification}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {30--39}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100103}, doi = {10.4018/IJDCF.2017100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AizeziJAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenLYL17, author = {Zhe Chen and Jicang Lu and Pengfei Yang and Xiangyang Luo}, title = {Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {48--61}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100105}, doi = {10.4018/IJDCF.2017100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenPLL17, author = {Juan Chen and Fei Peng and Jie Li and Min Long}, title = {A Lossless Watermarking for 3D {STL} Model Based on Entity Rearrangement and Bit Mapping}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {25--37}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040103}, doi = {10.4018/IJDCF.2017040103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenPLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DiZ17, author = {Hong Di and Xin Zhang}, title = {Deception Detection by Hybrid-Pair Wireless fNIRS System}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {15--24}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040102}, doi = {10.4018/IJDCF.2017040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DiZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuLQ17, author = {Lingchen Gu and Ju Liu and Aixi Qu}, title = {Performance Evaluation and Scheme Selection of Shot Boundary Detection and Keyframe Extraction in Content-Based Video Retrieval}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {15--29}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100102}, doi = {10.4018/IJDCF.2017100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuoJLW17, author = {Teng Guo and Jian Jiao and Feng Liu and Wen Wang}, title = {On the Pixel Expansion of Visual Cryptography Scheme}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {38--44}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040104}, doi = {10.4018/IJDCF.2017040104}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/GuoJLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Liu17, author = {Zhi Jun Liu}, title = {A Cyber Crime Investigation Model Based on Case Characteristics}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {40--47}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100104}, doi = {10.4018/IJDCF.2017100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Liu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLYW17, author = {Lintao Liu and Yuliang Lu and Xuehu Yan and Song Wan}, title = {A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {28--37}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070103}, doi = {10.4018/IJDCF.2017070103}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuWSZ17, author = {Xin Liu and Shen Wang and Jianzhi Sang and Weizhe Zhang}, title = {A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix {VSS}}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {1--10}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070101}, doi = {10.4018/IJDCF.2017070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuWSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LuSYB17, author = {Jia Lu and Jun Shen and Wei Qi Yan and Boris Bacic}, title = {An Empirical Study for Human Behavior Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {11--27}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070102}, doi = {10.4018/IJDCF.2017070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LuSYB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Pradhan17, author = {Padma Lochan Pradhan}, title = {Dynamic Semi-Group {CIA} Pattern Optimizing the Risk on {RTS}}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {51--70}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010104}, doi = {10.4018/IJDCF.2017010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Pradhan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Pradhan17a, author = {Padma Lochan Pradhan}, title = {Proposed Round Robin {CIA} Pattern on {RTS} for Risk Assessment}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {71--85}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010105}, doi = {10.4018/IJDCF.2017010105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Pradhan17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SunLQ17, author = {Fang Sun and Zhenghui Liu and Chuanda Qi}, title = {Speech Content Authentication Scheme based on High-Capacity Watermark Embedding}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {1--14}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040101}, doi = {10.4018/IJDCF.2017040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SunLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TsimperidisRK17, author = {Ioannis Tsimperidis and Shahin Rostami and Vasilios Katos}, title = {Age Detection Through Keystroke Dynamics from User Authentication Failures}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {1--16}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010101}, doi = {10.4018/IJDCF.2017010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TsimperidisRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WanLYL17, author = {Song Wan and Yuliang Lu and Xuehu Yan and Lintao Liu}, title = {A Novel Visual Secret Sharing Scheme Based on {QR} Codes}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {38--48}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070104}, doi = {10.4018/IJDCF.2017070104}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WanLYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Wang17, author = {Ning Wang}, title = {A Knowledge Model of Digital Evidence Review Elements Based on Ontology}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {49--57}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070105}, doi = {10.4018/IJDCF.2017070105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Wang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangNY17, author = {Jia Wang and Minh Ngueyn and WeiQi Yan}, title = {A Framework of Event-Driven Traffic Ticketing System}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {39--50}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010103}, doi = {10.4018/IJDCF.2017010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangWY17, author = {Guangyu Wang and Xiaotian Wu and WeiQi Yan}, title = {The State-of-the-Art Technology of Currency Identification: {A} Comparative Study}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {58--72}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070106}, doi = {10.4018/IJDCF.2017070106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanLLWDL17, author = {Xuehu Yan and Yuliang Lu and Lintao Liu and Song Wan and Wanmeng Ding and Hanlin Liu}, title = {Exploiting the Homomorphic Property of Visual Cryptography}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {45--56}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040105}, doi = {10.4018/IJDCF.2017040105}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanLLWDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuGZCC17, author = {Jie Zhu and Qingxiao Guan and Xianfeng Zhao and Yun Cao and Gong Chen}, title = {A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {1--14}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100101}, doi = {10.4018/IJDCF.2017100101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuGZCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuY17, author = {Alex Zhu and Wei Qi Yan}, title = {Exploring Defense of {SQL} Injection Attack in Penetration Testing}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {62--71}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100106}, doi = {10.4018/IJDCF.2017100106}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.