International ICST Conference on Digital Forensics & Cyber Crime最新文献

筛选
英文 中文
Towards a Process Model for Hash Functions in Digital Forensics 数字取证中哈希函数的过程模型研究
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_12
Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, A. Rybalchenko, M. Steinebach
{"title":"Towards a Process Model for Hash Functions in Digital Forensics","authors":"Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, A. Rybalchenko, M. Steinebach","doi":"10.1007/978-3-319-14289-0_12","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis 根据国际法确定网络空间中的行为何时构成网络战和《适用于网络战的国际法塔林手册》:概述
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_10
M. Watney
{"title":"Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis","authors":"M. Watney","doi":"10.1007/978-3-319-14289-0_10","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_10","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121037544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic Artifacts of the flareGet Download Manager flareGet下载管理器的取证工件
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_3
Prachi Goel, B. Mehtre
{"title":"Forensic Artifacts of the flareGet Download Manager","authors":"Prachi Goel, B. Mehtre","doi":"10.1007/978-3-319-14289-0_3","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_3","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FaceHash: Face Detection and Robust Hashing FaceHash:人脸检测和鲁棒哈希
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_8
M. Steinebach, Huajian Liu, York Yannikos
{"title":"FaceHash: Face Detection and Robust Hashing","authors":"M. Steinebach, Huajian Liu, York Yannikos","doi":"10.1007/978-3-319-14289-0_8","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_8","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Taxonomy of Data Fragment Classification Techniques 数据片段分类技术的分类学
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_6
R. Poisel, Marlies Rybnicek, S. Tjoa
{"title":"Taxonomy of Data Fragment Classification Techniques","authors":"R. Poisel, Marlies Rybnicek, S. Tjoa","doi":"10.1007/978-3-319-14289-0_6","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes Mozilla Firefox在3种不同的反取证模式下浏览工件
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_17
D. Gupta, B. Mehtre
{"title":"Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes","authors":"D. Gupta, B. Mehtre","doi":"10.1007/978-3-319-14289-0_17","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_17","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Amazon Kindle Fire HD Forensics 亚马逊Kindle Fire高清取证
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_4
Asif Iqbal, Hanan Al Obaidli, A. Marrington, I. Baggili
{"title":"Amazon Kindle Fire HD Forensics","authors":"Asif Iqbal, Hanan Al Obaidli, A. Marrington, I. Baggili","doi":"10.1007/978-3-319-14289-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Forensic Decryption of FAT BitLocker Volumes FAT BitLocker卷的取证解密
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2013-09-26 DOI: 10.1007/978-3-319-14289-0_2
P. S. Subair, C. Balan, S. Dija, K. L. Thomas
{"title":"Forensic Decryption of FAT BitLocker Volumes","authors":"P. S. Subair, C. Balan, S. Dija, K. L. Thomas","doi":"10.1007/978-3-319-14289-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Improving Authorship Attribution of Source Code 论改进源代码的作者归属
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2012-10-25 DOI: 10.1007/978-3-642-39891-9_4
Matthew F. Tennyson
{"title":"On Improving Authorship Attribution of Source Code","authors":"Matthew F. Tennyson","doi":"10.1007/978-3-642-39891-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern 基于小波变换和自适应局部二值模式的人脸识别
International ICST Conference on Digital Forensics & Cyber Crime Pub Date : 2012-10-25 DOI: 10.1007/978-3-642-39891-9_10
Abdallah A. Mohamed, Roman V Yampolskiy
{"title":"Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern","authors":"Abdallah A. Mohamed, Roman V Yampolskiy","doi":"10.1007/978-3-642-39891-9_10","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_10","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信