![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2009
- Yuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsutaro Uehara
, Ryôichi Sasaki:
Implementing Boot Control for Windows Vista. IFIP Int. Conf. Digital Forensics 2009: 133-141 - Nicole Beebe
:
Digital Forensic Research: The Good, the Bad and the Unaddressed. IFIP Int. Conf. Digital Forensics 2009: 17-36 - David Billard
:
An Extended Model for E-Discovery Operations. IFIP Int. Conf. Digital Forensics 2009: 277-287 - Fred Cohen:
Bulk Email Forensics. IFIP Int. Conf. Digital Forensics 2009: 51-67 - Scott Conrad, Carlos Rodriguez, Christopher Marberry, Philip Craiger:
Forensic Analysis of the Sony Playstation Portable. IFIP Int. Conf. Digital Forensics 2009: 119-129 - Greg Dorn, Christopher Marberry, Scott Conrad, Philip Craiger:
Analyzing the Impact of a Virtual Machine on a Host Machine. IFIP Int. Conf. Digital Forensics 2009: 69-81 - Ashish Gehani, Florent Kirchner, Natarajan Shankar:
System Support for Forensic Inference. IFIP Int. Conf. Digital Forensics 2009: 301-316 - Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Kenneth Tse:
A Model for Foxy Peer-to-Peer Network Investigations. IFIP Int. Conf. Digital Forensics 2009: 175-186 - Hugo Kleinhans, Jonathan Butts, Sujeet Shenoi:
Password Cracking Using Sony Playstations. IFIP Int. Conf. Digital Forensics 2009: 215-227 - Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law, Hayson Tse:
Analysis of the Digital Evidence Presented in the Yahoo! Case. IFIP Int. Conf. Digital Forensics 2009: 241-252 - Sydney Liles, Marcus K. Rogers, Marianne Hoebich:
A Survey of the Legal Issues Facing Digital Forensic Experts. IFIP Int. Conf. Digital Forensics 2009: 267-276 - Michael Losavio, Olfa Nasraoui
, Vincent Thacker, Jeffrey S. Marean, Nick Miles, Roman V. Yampolskiy, Ibrahim N. Imam:
Assessing the Legal Risks in Network Forensic Probing. IFIP Int. Conf. Digital Forensics 2009: 255-266 - Richard E. Overill, Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law:
A Cost-Effective Model for Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2009: 231-240 - Yanlin Peng, Linfeng Zhang, Yong Guan:
Detecting Fraud in Internet Auction Systems. IFIP Int. Conf. Digital Forensics 2009: 187-198 - Mark Pollitt:
Digital Forensics as a Surreal Narrative. IFIP Int. Conf. Digital Forensics 2009: 3-15 - Kamil Reddy, Hein S. Venter:
A Forensic Framework for Handling Information Privacy Incidents. IFIP Int. Conf. Digital Forensics 2009: 143-155 - Vassil Roussev, Liqiang Wang, Golden G. Richard III
, Lodovico Marziale:
A Cloud Computing Platform for Large-Scale Forensic Computing. IFIP Int. Conf. Digital Forensics 2009: 201-214 - Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
Tracking Contraband Files Transmitted Using Bittorrent. IFIP Int. Conf. Digital Forensics 2009: 159-173 - Christian Schulze, Marco Schreyer, Armin Stahl, Thomas M. Breuel:
Using DCT Features for Printing Technique and Copy Detection. IFIP Int. Conf. Digital Forensics 2009: 95-106 - Jill Slay
, Yi-Chi Lin, Benjamin P. Turnbull, Jason Beckett, Paul Lin:
Towards a Formalization of Digital Forensics. IFIP Int. Conf. Digital Forensics 2009: 37-47 - April Tanner, David A. Dampier:
Concept Mapping for Digital Forensic Investigations. IFIP Int. Conf. Digital Forensics 2009: 291-300 - Bo Wang, Xiangwei Kong, Xingang You:
Source Camera Identification Using Support Vector Machines. IFIP Int. Conf. Digital Forensics 2009: 107-118 - Yuandong Zhu, Pavel Gladyshev, Joshua James
:
Temporal Analysis of Windows MRU Registry Keys. IFIP Int. Conf. Digital Forensics 2009: 83-93 - Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 306, Springer 2009, ISBN 978-3-642-04154-9 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-20 22:18 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint