Scalability and Performance of LiDAR Point Cloud Data Management Systems: A State-of-the-Art Review. | 0 | 0.34 | 2022 |
Linking CVE's to MITRE ATT&CK Techniques | 0 | 0.34 | 2021 |
Structural Textile Pattern Recognition And Processing Based On Hypergraphs | 0 | 0.34 | 2021 |
Code-Free Cloud Computing Service To Facilitate Rapid Biomedical Digital Signal Processing And Algorithm Development | 0 | 0.34 | 2021 |
Towards Improving Privacy of Synthetic DataSets. | 0 | 0.34 | 2021 |
Forensic analysis of Matrix protocol and Riot.im application | 0 | 0.34 | 2021 |
Vec2UAge: Enhancing underage age estimation performance through facial embeddings | 0 | 0.34 | 2021 |
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics] | 0 | 0.34 | 2021 |
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis | 1 | 0.43 | 2021 |
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs | 0 | 0.34 | 2021 |
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection | 1 | 0.37 | 2020 |
Lightweight Privacy-Preserving Data Classification | 0 | 0.34 | 2020 |
Towards A New Approach to Identify WhatsApp Messages. | 0 | 0.34 | 2020 |
Forensic analysis of privacy-oriented cryptocurrencies | 1 | 0.34 | 2020 |
Smart vehicle forensics: Challenges and case study | 5 | 0.46 | 2020 |
Detecting Abnormal Traffic in Large-Scale Networks | 0 | 0.34 | 2020 |
Network Anomaly Detection Using LSTM Based Autoencoder | 0 | 0.34 | 2020 |
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment. | 0 | 0.34 | 2020 |
Retrieving E-Dating Application Artifacts from iPhone Backups. | 0 | 0.34 | 2020 |
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis | 1 | 0.37 | 2020 |
Effect of Security Controls on Patching Window - A Causal Inference based Approach. | 0 | 0.34 | 2020 |
Towards a new deep learning based approach for the password prediction. | 0 | 0.34 | 2020 |
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS. | 0 | 0.34 | 2019 |
Distributed Deep Deterministic Policy Gradient For Power Allocation Control In D2d-Based V2v Communications | 2 | 0.37 | 2019 |
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices. | 3 | 0.50 | 2019 |
Improving the accuracy of automated facial age estimation to aid CSEM investigations. | 0 | 0.34 | 2019 |
Predicting Soil Ph By Using Nearest Fields | 0 | 0.34 | 2019 |
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection | 0 | 0.34 | 2019 |
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach. | 2 | 0.38 | 2019 |
Designing and Implementing Data Warehouse for Agricultural Big Data. | 0 | 0.34 | 2019 |
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics. | 8 | 0.58 | 2019 |
Black Box Attacks on Deep Anomaly Detectors | 2 | 0.38 | 2019 |
Forensic framework to identify local vs synced artefacts. | 0 | 0.34 | 2018 |
RiskWriter - Predicting Cyber Risk of an Enterprise. | 1 | 0.36 | 2018 |
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics | 1 | 0.36 | 2018 |
Solid State Drive Forensics: Where Do We Stand? | 1 | 0.37 | 2018 |
Digital forensic investigation of two-way radio communication equipment and services. | 1 | 0.37 | 2018 |
Electromagnetic side-channel attacks - potential for progressing hindered digital forensic analysis. | 1 | 0.41 | 2018 |
Hierarchical Aggregation Approach for Distributed Clustering of Spatial Datasets. | 1 | 0.35 | 2018 |
Ontology Based Approach for Precision Agriculture. | 0 | 0.34 | 2018 |
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study. | 1 | 0.36 | 2018 |
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks. | 0 | 0.34 | 2018 |
An Efficient Data Warehouse for Crop Yield Prediction. | 0 | 0.34 | 2018 |
Forensic Analysis of the exFAT artefacts. | 1 | 0.37 | 2018 |
Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets. | 0 | 0.34 | 2017 |
Grid-Based Approaches For Distributed Data Mining Applications | 12 | 0.62 | 2017 |
A Bespoke Forensics Gis Tool | 3 | 0.43 | 2017 |
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. | 2 | 0.39 | 2017 |
Volkswagen Car Entertainment System Forensics | 1 | 0.35 | 2017 |
Forensic Analysis of Epic Privacy Browser on Windows Operating Systems. | 0 | 0.34 | 2017 |