International ICST Conference on Digital Forensics & Cyber Crime最新文献

筛选
英文 中文
Forensically Sound Retrieval and Recovery of Images from GPU Memory 法医声音检索和恢复图像从GPU内存
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_5
Yulong Zhang, B. Yang, M. Rogers, R. Hansen
{"title":"Forensically Sound Retrieval and Recovery of Images from GPU Memory","authors":"Yulong Zhang, B. Yang, M. Rogers, R. Hansen","doi":"10.1007/978-3-319-25512-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_5","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127811737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence 包含数字证据的虚拟犯罪现场模拟器的开发和初步用户评估
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2015-10-06 DOI: 10.1007/978-3-319-25512-5_2
Alleyn Conway, Joshua James, P. Gladyshev
{"title":"Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence","authors":"Alleyn Conway, Joshua James, P. Gladyshev","doi":"10.1007/978-3-319-25512-5_2","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Awareness of Scam E-Mails: An Exploratory Research Study - Part 2 诈骗电子邮件的意识:一项探索性研究研究-第2部分
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-25512-5_9
K. Cole, Tejashree Datar, M. Rogers
{"title":"Awareness of Scam E-Mails: An Exploratory Research Study - Part 2","authors":"K. Cole, Tejashree Datar, M. Rogers","doi":"10.1007/978-3-319-25512-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-25512-5_9","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133745012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Resurrection: A Carver for Fragmented Files 复活:碎片文件的切割器
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_5
Martin Lambertz, Rafael Uetz, E. Gerhards-Padilla
{"title":"Resurrection: A Carver for Fragmented Files","authors":"Martin Lambertz, Rafael Uetz, E. Gerhards-Padilla","doi":"10.1007/978-3-319-14289-0_5","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_5","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121558663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computer Profiling for Preliminary Forensic Examination 初步法医鉴定的电脑分析
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_14
A. Marrington, Farkhund Iqbal, I. Baggili
{"title":"Computer Profiling for Preliminary Forensic Examination","authors":"A. Marrington, Farkhund Iqbal, I. Baggili","doi":"10.1007/978-3-319-14289-0_14","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_14","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127997172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud Forensic Readiness: Foundations 云取证准备:基础
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_16
L. D. Marco, Mohand Tahar Kechadi, F. Ferrucci
{"title":"Cloud Forensic Readiness: Foundations","authors":"L. D. Marco, Mohand Tahar Kechadi, F. Ferrucci","doi":"10.1007/978-3-319-14289-0_16","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_16","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Identifying Forensically Uninteresting Files Using a Large Corpus 使用大型语料库识别法医无趣文件
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_7
N. Rowe
{"title":"Identifying Forensically Uninteresting Files Using a Large Corpus","authors":"N. Rowe","doi":"10.1007/978-3-319-14289-0_7","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_7","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129277013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Regulating Social Network Services for Lawful Interception 规范社交网络服务的合法截取
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_9
Esti Peshin
{"title":"Regulating Social Network Services for Lawful Interception","authors":"Esti Peshin","doi":"10.1007/978-3-319-14289-0_9","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_9","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Copy-Move Forgery Detection Based on Dual-Transform 基于双变换的鲁棒复制-移动伪造检测
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_1
Munkhbaatar Doyoddorj, K. Rhee
{"title":"Robust Copy-Move Forgery Detection Based on Dual-Transform","authors":"Munkhbaatar Doyoddorj, K. Rhee","doi":"10.1007/978-3-319-14289-0_1","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_1","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133083308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Automated Link Analysis Solution Applied to Digital Forensic Investigations 应用于数字法医调查的自动链接分析解决方案
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_13
Fergal Brennan, Martins Udris, P. Gladyshev
{"title":"An Automated Link Analysis Solution Applied to Digital Forensic Investigations","authors":"Fergal Brennan, Martins Udris, P. Gladyshev","doi":"10.1007/978-3-319-14289-0_13","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_13","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信