Modeling the initial stage of a file sharing process on a BitTorrent network. | 2 | 0.37 | 2014 |
An Empirical Study Profiling Internet Pirates. | 1 | 0.37 | 2013 |
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations. | 1 | 0.63 | 2012 |
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations. | 2 | 0.50 | 2011 |
Protecting Digital Data Privacy in Computer Forensic Examination | 8 | 0.61 | 2011 |
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics | 0 | 0.34 | 2010 |
An Analysis of the Green Dam Youth Escort Software | 1 | 0.35 | 2010 |
Evaluation of Evidence in Internet Auction Fraud Investigations | 9 | 0.68 | 2010 |
Identifying First Seeders in Foxy Peer-to-Peer Networks | 3 | 0.55 | 2010 |
A Host-Based Approach to BotNet Investigation? | 2 | 0.38 | 2009 |
Analysis of the Digital Evidence Presented in the Yahoo! Case | 1 | 0.39 | 2009 |
A Cost-Effective Model for Digital Forensic Investigations | 5 | 0.79 | 2009 |
A Model for Foxy Peer-to-Peer Network Investigations | 3 | 0.70 | 2009 |
Reasoning About Evidence Using Bayesian Networks | 10 | 1.55 | 2008 |
Consistency Issue on Live Systems Forensics | 0 | 0.34 | 2007 |
The Rules of Time on NTFS File System | 17 | 1.43 | 2007 |
An Efficient Bloom Filter Based Solution for Multiparty Private Matching | 10 | 0.57 | 2006 |