Search dblp for Publications

export results for "toc:db/journals/ijdcf/ijdcf9.bht:"

 download as .bib file

@article{DBLP:journals/ijdcf/Ahmed17,
  author       = {Abdulghani Ali Ahmed},
  title        = {Investigation Approach for Network Attack Intention Recognition},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {17--38},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010102},
  doi          = {10.4018/IJDCF.2017010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Ahmed17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/AizeziJAM17,
  author       = {Yasen Aizezi and
                  Anwar Jamal and
                  Ruxianguli Abudurexiti and
                  Mutalipu Muming},
  title        = {Research on Digital Forensics Based on Uyghur Web Text Classification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {30--39},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100103},
  doi          = {10.4018/IJDCF.2017100103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AizeziJAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLYL17,
  author       = {Zhe Chen and
                  Jicang Lu and
                  Pengfei Yang and
                  Xiangyang Luo},
  title        = {Recognizing Substitution Steganography of Spatial Domain Based on
                  the Characteristics of Pixels Correlation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {48--61},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100105},
  doi          = {10.4018/IJDCF.2017100105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenPLL17,
  author       = {Juan Chen and
                  Fei Peng and
                  Jie Li and
                  Min Long},
  title        = {A Lossless Watermarking for 3D {STL} Model Based on Entity Rearrangement
                  and Bit Mapping},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {25--37},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040103},
  doi          = {10.4018/IJDCF.2017040103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenPLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DiZ17,
  author       = {Hong Di and
                  Xin Zhang},
  title        = {Deception Detection by Hybrid-Pair Wireless fNIRS System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {15--24},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040102},
  doi          = {10.4018/IJDCF.2017040102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuLQ17,
  author       = {Lingchen Gu and
                  Ju Liu and
                  Aixi Qu},
  title        = {Performance Evaluation and Scheme Selection of Shot Boundary Detection
                  and Keyframe Extraction in Content-Based Video Retrieval},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {15--29},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100102},
  doi          = {10.4018/IJDCF.2017100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GuoJLW17,
  author       = {Teng Guo and
                  Jian Jiao and
                  Feng Liu and
                  Wen Wang},
  title        = {On the Pixel Expansion of Visual Cryptography Scheme},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {38--44},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040104},
  doi          = {10.4018/IJDCF.2017040104},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GuoJLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Liu17,
  author       = {Zhi Jun Liu},
  title        = {A Cyber Crime Investigation Model Based on Case Characteristics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {40--47},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100104},
  doi          = {10.4018/IJDCF.2017100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Liu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuLYW17,
  author       = {Lintao Liu and
                  Yuliang Lu and
                  Xuehu Yan and
                  Song Wan},
  title        = {A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic
                  Mean},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {28--37},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070103},
  doi          = {10.4018/IJDCF.2017070103},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuLYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuWSZ17,
  author       = {Xin Liu and
                  Shen Wang and
                  Jianzhi Sang and
                  Weizhe Zhang},
  title        = {A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic
                  Matrix {VSS}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {1--10},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070101},
  doi          = {10.4018/IJDCF.2017070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuWSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LuSYB17,
  author       = {Jia Lu and
                  Jun Shen and
                  Wei Qi Yan and
                  Boris Bacic},
  title        = {An Empirical Study for Human Behavior Analysis},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {11--27},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070102},
  doi          = {10.4018/IJDCF.2017070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LuSYB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Pradhan17,
  author       = {Padma Lochan Pradhan},
  title        = {Dynamic Semi-Group {CIA} Pattern Optimizing the Risk on {RTS}},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {51--70},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010104},
  doi          = {10.4018/IJDCF.2017010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Pradhan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Pradhan17a,
  author       = {Padma Lochan Pradhan},
  title        = {Proposed Round Robin {CIA} Pattern on {RTS} for Risk Assessment},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {71--85},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010105},
  doi          = {10.4018/IJDCF.2017010105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Pradhan17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunLQ17,
  author       = {Fang Sun and
                  Zhenghui Liu and
                  Chuanda Qi},
  title        = {Speech Content Authentication Scheme based on High-Capacity Watermark
                  Embedding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {1--14},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040101},
  doi          = {10.4018/IJDCF.2017040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SunLQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TsimperidisRK17,
  author       = {Ioannis Tsimperidis and
                  Shahin Rostami and
                  Vasilios Katos},
  title        = {Age Detection Through Keystroke Dynamics from User Authentication
                  Failures},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {1--16},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010101},
  doi          = {10.4018/IJDCF.2017010101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TsimperidisRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WanLYL17,
  author       = {Song Wan and
                  Yuliang Lu and
                  Xuehu Yan and
                  Lintao Liu},
  title        = {A Novel Visual Secret Sharing Scheme Based on {QR} Codes},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {38--48},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070104},
  doi          = {10.4018/IJDCF.2017070104},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WanLYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Wang17,
  author       = {Ning Wang},
  title        = {A Knowledge Model of Digital Evidence Review Elements Based on Ontology},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {49--57},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070105},
  doi          = {10.4018/IJDCF.2017070105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Wang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNY17,
  author       = {Jia Wang and
                  Minh Ngueyn and
                  WeiQi Yan},
  title        = {A Framework of Event-Driven Traffic Ticketing System},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {1},
  pages        = {39--50},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017010103},
  doi          = {10.4018/IJDCF.2017010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangWY17,
  author       = {Guangyu Wang and
                  Xiaotian Wu and
                  WeiQi Yan},
  title        = {The State-of-the-Art Technology of Currency Identification: {A} Comparative
                  Study},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {3},
  pages        = {58--72},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017070106},
  doi          = {10.4018/IJDCF.2017070106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLLWDL17,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu and
                  Song Wan and
                  Wanmeng Ding and
                  Hanlin Liu},
  title        = {Exploiting the Homomorphic Property of Visual Cryptography},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {2},
  pages        = {45--56},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017040105},
  doi          = {10.4018/IJDCF.2017040105},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanLLWDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuGZCC17,
  author       = {Jie Zhu and
                  Qingxiao Guan and
                  Xianfeng Zhao and
                  Yun Cao and
                  Gong Chen},
  title        = {A Steganalytic Scheme Based on Classifier Selection Using Joint Image
                  Characteristics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {1--14},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100101},
  doi          = {10.4018/IJDCF.2017100101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuGZCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuY17,
  author       = {Alex Zhu and
                  Wei Qi Yan},
  title        = {Exploring Defense of {SQL} Injection Attack in Penetration Testing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {9},
  number       = {4},
  pages        = {62--71},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJDCF.2017100106},
  doi          = {10.4018/IJDCF.2017100106},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}