default search action
Search dblp for Publications
export results for "toc:db/journals/ijdcf/ijdcf4.bht:"
@article{DBLP:journals/ijdcf/BattenPK12, author = {Lynn Margaret Batten and Lei Pan and Nisar Khan}, title = {Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {1--14}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100101}, doi = {10.4018/JDCF.2012100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/BattenPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenLN12, author = {Likai Chen and Wei Lu and Jiangqun Ni}, title = {An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {49--62}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010104}, doi = {10.4018/JDCF.2012010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GidwaniAYI12, author = {T. Gidwani and M. J. Argano and Wei{-}Qi Yan and F. Issa}, title = {A Comprehensive Survey of Event Analytics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {33--46}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070103}, doi = {10.4018/JDCF.2012070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GidwaniAYI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GrisposSG12, author = {George Grispos and Tim Storer and William Bradley Glisson}, title = {Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {28--48}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040103}, doi = {10.4018/JDCF.2012040103}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/GrisposSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Grobler12, author = {Marthie Grobler}, title = {The Need for Digital Evidence Standardisation}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {1--12}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040101}, doi = {10.4018/JDCF.2012040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Grobler12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HaggertyCHT12, author = {John Haggerty and Mark C. Casson and Sheryllynne Haggerty and Mark John Taylor}, title = {A Framework for the Forensic Analysis of User Interaction with Social Media}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {15--30}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100102}, doi = {10.4018/JDCF.2012100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HaggertyCHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HayatiP12, author = {Pedram Hayati and Vidyasagar M. Potdar}, title = {Spam 2.0 State of the Art}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {17--36}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010102}, doi = {10.4018/JDCF.2012010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HayatiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuLWL12, author = {Yongjian Hu and Chang{-}Tsun Li and Yufei Wang and Bei{-}Bei Liu}, title = {An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {20--32}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070102}, doi = {10.4018/JDCF.2012070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuLWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Ishihara12, author = {Shunichi Ishihara}, title = {Probabilistic Evaluation of {SMS} Messages as Forensic Evidence: Likelihood Ratio Based Approach with Lexical Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {47--57}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070104}, doi = {10.4018/JDCF.2012070104}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Ishihara12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LempereurMS12, author = {Brett Lempereur and Madjid Merabti and Qi Shi}, title = {Pypette: {A} Platform for the Evaluation of Live Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {31--46}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100103}, doi = {10.4018/JDCF.2012100103}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LempereurMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MarcialisCR12, author = {Gian Luca Marcialis and Pietro Coli and Fabio Roli}, title = {Fingerprint Liveness Detection Based on Fake Finger Characteristics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {1--19}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070101}, doi = {10.4018/JDCF.2012070101}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MarcialisCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengLL12, author = {Fei Peng and Juan Liu and Min Long}, title = {Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {1--16}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010101}, doi = {10.4018/JDCF.2012010101}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/PengLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SunLYS12, author = {Wei Sun and Zhe{-}Ming Lu and Fa{-}Xin Yu and Rong{-}Jun Shen}, title = {Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based Audio Retrieval}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {49--69}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040104}, doi = {10.4018/JDCF.2012040104}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SunLYS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/VlachopoulosMC12, author = {Konstantinos Vlachopoulos and Emmanouil Magkos and Vassilios Chrissikopoulos}, title = {A Model for Hybrid Evidence Investigation}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {47--62}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100104}, doi = {10.4018/JDCF.2012100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/VlachopoulosMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangNWZ12, author = {Chang Wang and Jiangqun Ni and Chuntao Wang and Ruiyu Zhang}, title = {An Adaptive {JPEG} Steganographic Scheme Based on the Block Entropy of {DCT} Coefficients}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {13--27}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040102}, doi = {10.4018/JDCF.2012040102}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangNWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YuSZNC12, author = {Lifang Yu and Yun Q. Shi and Yao Zhao and Rongrong Ni and Gang Cao}, title = {A Study on Embedding Efficiency of Matrix Encoding}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {37--48}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010103}, doi = {10.4018/JDCF.2012010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YuSZNC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.