


default search action
Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010
- Chang-Tsun Li:

Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions. IGI Global 2010, ISBN 9781605668369 - Patrizio Campisi, Emanuele Maiorana, Alessandro Neri:

Privacy Enhancing Technologies in Biometrics. 1-22 - Gian Luca Marcialis, Fabio Roli, Pietro Coli, Giovanni Delogu:

A Fingerprint Forensic Tool for Criminal Investigations. 23-52 - Tim Rawlinson, Abhir Bhalerao, Li Wang:

Principles and Methods for Face Recognition and Face Modelling. 53-78 - Pawel T. Puslecki:

Biometrical Processing of Faces in Security and Forensics. 79-103 - Matthew Sorell:

Digital Camera Photographic Provenance. 104-129 - Roberto Caldelli, Irene Amerini, Francesco Picchioni, Alessia De Rosa, Francesca Uccheddu:

Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication. 130-154 - Stefan Katzenbeisser, Huajian Liu, Martin Steinebach:

Challenges and Solutions in Multimedia Document Authentication. 155-175 - Xi Zhao, Anthony T. S. Ho:

Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications. 176-203 - Hong Cai, Sos S. Agaian:

A Novel Multilevel DCT Based Reversible Data Hiding. 204-233 - Lodovico Marziale, Santhi Movva, Golden G. Richard III, Vassil Roussev, Loren Schwiebert:

Massively Threaded Digital Forensics Tools. 234-256 - Lynn Margaret Batten, Lei Pan:

Testing Digital Forensic Software Tools Used in Expert Testimony. 257-278 - Michael I. Cohen:

Network Forensics. 279-306 - Bo Zhou, Qi Shi

, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. 307-333 - Xiaoling Chen, Rohan D. W. Perera, Ziqian Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:

Deception Detection on the Internet. 334-354 - Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law:

Forensic Investigation of Peer-to-Peer Networks. 355-378 - Thomas M. Chen:

Identity Theft through the Web. 379-395 - Antonio Savoldi, Paolo Gubian:

Embedded Forensics. 396-423 - Cosimo Anglano

:
Forensic Implications of Virtualization Technologies. 424-446 - Gian Piero Zarri:

Conceptual Tools for Dealing with 'Narrative' Terrorism Information. 447-469 - Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos:

Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process. 470-495 - Adel Elmaghraby, Deborah W. Keeling, Michael Losavio:

Legal Issues for Research and Practice in Computational Forensics. 496-515 - Christopher A. Canning, Baoying Wang:

Trends in Information Security Regulation. 516-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














