Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations | 0 | 0.34 | 2022 |
CATCH: Cloud Data Acquisition through Comprehensive and Hybrid Approaches | 0 | 0.34 | 2022 |
A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices | 0 | 0.34 | 2022 |
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics | 0 | 0.34 | 2022 |
Optical Filter-Embedded Fiber-Optic Radiation Sensor For Ultra-High Dose Rate Electron Beam Dosimetry | 0 | 0.34 | 2021 |
NTFS Data Tracker: Tracking file data history based on $LogFile | 0 | 0.34 | 2021 |
Test-Time Adaptation for Out-Of-Distributed Image Inpainting. | 0 | 0.34 | 2021 |
Forensic exploration on windows File History | 0 | 0.34 | 2021 |
File fingerprinting of the ZIP format for identifying and tracking provenance | 0 | 0.34 | 2021 |
Extended Object Tracking via Positive and Negative Information Fusion. | 1 | 0.35 | 2019 |
Study on the tracking revision history of MS Word files for forensic investigation. | 0 | 0.34 | 2017 |
Digital Forensic Approaches for Amazon Alexa Ecosystem. | 13 | 1.38 | 2017 |
Data-Driven Modeling and Analysis Framework for Cockpit Human-Machine Interaction Issues. | 0 | 0.34 | 2016 |
An enhanced security framework for reliable Android operating system. | 0 | 0.34 | 2016 |
A Methodology For Quantitative Assessment Of The Features And Capabilities Of Software Frameworks For Model Composition | 1 | 0.40 | 2016 |
Recovery method of deleted records and tables from ESE database | 0 | 0.34 | 2016 |
Investigation Methodology of a Virtual Desktop Infrastructure for IoT. | 1 | 0.37 | 2015 |
Intent Inference-Based Flight-Deck Human-Automation Mode-Confusion Detection | 0 | 0.34 | 2015 |
An on-site digital investigation methodology for data leak case. | 0 | 0.34 | 2014 |
Damaged backup data recovery method for Windows mobile | 1 | 0.35 | 2013 |
The effective method of database server forensics on the enterprise environment | 1 | 0.37 | 2012 |
Bursty event detection from text streams for disaster management | 11 | 0.79 | 2012 |
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent | 0 | 0.34 | 2012 |
Digital forensic investigation of cloud storage services. | 37 | 2.29 | 2012 |
Analysis Framework to Detect Artifacts of Portable Web Browser | 1 | 0.72 | 2012 |
On-the-spot digital investigation by means of LDFS: Live Data Forensic System | 2 | 0.36 | 2012 |
A recovery method of deleted record for SQLite database | 18 | 1.68 | 2012 |
Detection of Zombie PCs Based on Email Spam Analysis. | 2 | 0.73 | 2012 |
Methodology for Digital Forensic Investigation of iCloud | 1 | 0.36 | 2012 |
Advanced evidence collection and analysis of web browser activity | 31 | 3.37 | 2011 |
DES with any reduced masked rounds is not secure against side-channel attacks | 3 | 0.46 | 2010 |
A proposal for automating investigations in live forensics | 1 | 0.39 | 2010 |
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device | 2 | 0.42 | 2010 |
Secure USB bypassing tool | 2 | 0.41 | 2010 |
Acceleration Of Differential Power Analysis Through The Parallel Use Of Gpu And Cpu | 3 | 0.45 | 2010 |
Research about extracting and analyzing accounting data of company to detect financial fraud | 1 | 0.38 | 2009 |
A Stepwise Methodology for Tracing Computer Usage | 1 | 0.36 | 2009 |
Data concealment and detection in Microsoft Office 2007 files | 14 | 0.88 | 2009 |
Successive MAP Detection with Soft Interference Cancellation for Iterative Receivers in Hierarchical M-ary QAM Systems | 2 | 0.41 | 2009 |
An efficient signed digit montgomery multiplication for RSA | 5 | 0.52 | 2009 |
Soft-Output Ml Detector For Spatial Modulation Ofdm Systems | 23 | 2.26 | 2009 |
Design and Implementation of a Tool for System Restore Point Analysis | 0 | 0.34 | 2008 |
Methodologies for Detecting Covert Database | 2 | 0.44 | 2008 |
Performance Enhancement Of Differential Power Analysis Attacks With Signal Companding Methods | 0 | 0.34 | 2008 |
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension. | 0 | 0.34 | 2008 |
Security analysis of the full-round DDO-64 block cipher | 6 | 0.68 | 2008 |
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis | 4 | 0.42 | 2008 |
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. | 2 | 0.40 | 2008 |
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions. | 2 | 0.38 | 2008 |
Recovery of Damaged Compressed Files for Digital Forensic Purposes | 2 | 0.37 | 2008 |