


default search action
3. e-Forensics 2010: Shanghai, China
- Xuejia Lai, Dawu Gu, Bo Jin, Yongquan Wang, Hui Li:

Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 56, Springer 2011, ISBN 978-3-642-23601-3 - Xiaodong Lin, Chenxi Zhang, Theodora Dule:

On Achieving Encrypted File Recovery. 1-13 - Xudong Zhu, Hui Li, Zhijing Liu:

Behavior Clustering for Anomaly Detection. 14-27 - Hwei-Ming Ying, Vrizlynn L. L. Thing:

A Novel Inequality-Based Fragmented File Carving Technique. 28-39 - Lynn Margaret Batten, Lei Pan

:
Using Relationship-Building in Event Profiling for Digital Forensic Investigations. 40-52 - Zhenxing Lei, Theodora Dule, Xiaodong Lin:

A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space. 53-65 - Xiaodong Lin, Rongxing Lu, Kevin Foxton, Xuemin (Sherman) Shen

:
An Efficient Searchable Encryption Scheme and Its Application in Network Forensics. 66-78 - Marti Ksionsk, Ping Ji, Weifeng Chen:

Attacks on BitTorrent - An Experimental Study. 79-89 - Lianhai Wang, Lijuan Xu, Shuhui Zhang:

Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. 90-98 - Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng:

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. 99-109 - Zheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun:

Investigating the Implications of Virtualization for Digital Forensics. 110-121 - Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong:

Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System. 122-130 - Can Mo, Hui Li, Hui Zhu:

A Stream Pattern Matching Method for Traffic Analysis. 131-140 - Xinyan Zha, Sartaj Sahni:

Fast in-Place File Carving for Digital Forensics. 141-158 - Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou:

Live Memory Acquisition through FireWire. 159-167 - Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo:

Digital Forensic Analysis on Runtime Instruction Flow. 168-178 - Kan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen:

Enhance Information Flow Tracking with Function Recognition. 179-184 - Yasha Chen, Jun Hu, Xinmao Gai, Yu Sun:

A Privilege Separation Method for Security Commercial Transactions. 185-192 - Junkai Yi, Shuo Tang, Hui Li:

Data Recovery Based on Intelligent Pattern Matching. 193-199 - Yi Wang:

Study on Supervision of Integrity of Chain of Custody in Computer Forensics. 200-206 - Saif M. Al-Kuwari

, Stephen D. Wolthusen:
On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles. 207-223 - Hong Guo, Bo Jin, Daoli Huang:

Research and Review on Computer Forensics. 224-233 - Wenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin:

Text Content Filtering Based on Chinese Character Reconstruction from Radicals. 234-240 - Ning Ding, Dawu Gu, Zhiqiang Liu:

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose. 241-255 - Przemyslaw Blaskiewicz, Przemyslaw Kubiak

, Miroslaw Kutylowski:
Digital Signatures for e-Government - A Long-Term Security Architecture. 256-270 - Beihua Wu:

SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web Applications. 271-276 - Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai:

On Different Categories of Cybercrime in China. 277-281 - Ying Zhang:

Face and Lip Tracking for Person Identification. 282-286 - Hao Peng, Songnian Lu, Jianhua Li, Aixin Zhang, Dandan Zhao:

An Anonymity Scheme Based on Pseudonym in P2P Networks. 287-293 - Lei Gong, Yong Zhao, Jianhua Liao:

Research on the Application Security Isolation Model. 294-300 - Liping Ding, Jian Gu, Yongji Wang, JingZheng Wu:

Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. 301-311

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














