|
Conferences in DBLP
Calibration Testing Of Network Tap Devices. [Citation Graph (, )][DBLP]
On the Legality of Analyzing Telephone Call Records. [Citation Graph (, )][DBLP]
Survey of Law Enforcement Perceptions Regarding Digital Evidence. [Citation Graph (, )][DBLP]
Insider Threat Analysis Using Information-Centric Modeling. [Citation Graph (, )][DBLP]
An Integrated System for Insider Threat Detection. [Citation Graph (, )][DBLP]
Analysis of Tools for Detecting Rootkits and Hidden Processes. [Citation Graph (, )][DBLP]
A Method for Detecting Linux Kernel Module Rootkits. [Citation Graph (, )][DBLP]
Future Trends in Authorship Attribution. [Citation Graph (, )][DBLP]
The Keyboard Dilemma and Authorship Identification. [Citation Graph (, )][DBLP]
Factors Affecting One-Way Hashing of CD-R Media. [Citation Graph (, )][DBLP]
Disk Drive I/O Commands and Write Blocking. [Citation Graph (, )][DBLP]
A New Process Model for Text String Searching. [Citation Graph (, )][DBLP]
Detecting Steganography Using Multi-Class Classification. [Citation Graph (, )][DBLP]
Redacting Digital Information from Electronic Devices. [Citation Graph (, )][DBLP]
In-Place File Carving. [Citation Graph (, )][DBLP]
File System Journal Forensics. [Citation Graph (, )][DBLP]
Using Search Engines to Acquire Network Forensic Evidence. [Citation Graph (, )][DBLP]
A Framework for Investigating Railroad Accidents. [Citation Graph (, )][DBLP]
Forensic Analysis of Xbox Consoles. [Citation Graph (, )][DBLP]
Super-Resolution Video Analysis for Forensic Investigations. [Citation Graph (, )][DBLP]
Specializing CRISP-DM for Evidence Mining. [Citation Graph (, )][DBLP]
Applying The Biba Integrity Model to Evidence Management. [Citation Graph (, )][DBLP]
Investigating Computer Attacks Using Attack Trees. [Citation Graph (, )][DBLP]
Attack Patterns: A New Forensic and Design Tool. [Citation Graph (, )][DBLP]
|