Search dblp for Publications

export results for "toc:db/journals/ijdcf/ijdcf4.bht:"

 download as .bib file

@article{DBLP:journals/ijdcf/BattenPK12,
  author       = {Lynn Margaret Batten and
                  Lei Pan and
                  Nisar Khan},
  title        = {Hypothesis Generation and Testing in Event Profiling for Digital Forensic
                  Investigations},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {1--14},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100101},
  doi          = {10.4018/JDCF.2012100101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BattenPK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenLN12,
  author       = {Likai Chen and
                  Wei Lu and
                  Jiangqun Ni},
  title        = {An Image Region Description Method Based on Step Sector Statistics
                  and its Application in Image Copy-Rotate/Flip-Move Forgery Detection},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {49--62},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010104},
  doi          = {10.4018/JDCF.2012010104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GidwaniAYI12,
  author       = {T. Gidwani and
                  M. J. Argano and
                  Wei{-}Qi Yan and
                  F. Issa},
  title        = {A Comprehensive Survey of Event Analytics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {33--46},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070103},
  doi          = {10.4018/JDCF.2012070103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GidwaniAYI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/GrisposSG12,
  author       = {George Grispos and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {Calm Before the Storm: The Challenges of Cloud Computing in Digital
                  Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {28--48},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040103},
  doi          = {10.4018/JDCF.2012040103},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/GrisposSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Grobler12,
  author       = {Marthie Grobler},
  title        = {The Need for Digital Evidence Standardisation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {1--12},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040101},
  doi          = {10.4018/JDCF.2012040101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Grobler12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HaggertyCHT12,
  author       = {John Haggerty and
                  Mark C. Casson and
                  Sheryllynne Haggerty and
                  Mark John Taylor},
  title        = {A Framework for the Forensic Analysis of User Interaction with Social
                  Media},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {15--30},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100102},
  doi          = {10.4018/JDCF.2012100102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HaggertyCHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HayatiP12,
  author       = {Pedram Hayati and
                  Vidyasagar M. Potdar},
  title        = {Spam 2.0 State of the Art},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {17--36},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010102},
  doi          = {10.4018/JDCF.2012010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HayatiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuLWL12,
  author       = {Yongjian Hu and
                  Chang{-}Tsun Li and
                  Yufei Wang and
                  Bei{-}Bei Liu},
  title        = {An Improved Fingerprinting Algorithm for Detection of Video Frame
                  Duplication Forgery},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {20--32},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070102},
  doi          = {10.4018/JDCF.2012070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuLWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Ishihara12,
  author       = {Shunichi Ishihara},
  title        = {Probabilistic Evaluation of {SMS} Messages as Forensic Evidence: Likelihood
                  Ratio Based Approach with Lexical Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {47--57},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070104},
  doi          = {10.4018/JDCF.2012070104},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Ishihara12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LempereurMS12,
  author       = {Brett Lempereur and
                  Madjid Merabti and
                  Qi Shi},
  title        = {Pypette: {A} Platform for the Evaluation of Live Digital Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {31--46},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100103},
  doi          = {10.4018/JDCF.2012100103},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LempereurMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MarcialisCR12,
  author       = {Gian Luca Marcialis and
                  Pietro Coli and
                  Fabio Roli},
  title        = {Fingerprint Liveness Detection Based on Fake Finger Characteristics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {3},
  pages        = {1--19},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012070101},
  doi          = {10.4018/JDCF.2012070101},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MarcialisCR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PengLL12,
  author       = {Fei Peng and
                  Juan Liu and
                  Min Long},
  title        = {Identification of Natural Images and Computer Generated Graphics Based
                  on Hybrid Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {1--16},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010101},
  doi          = {10.4018/JDCF.2012010101},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PengLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SunLYS12,
  author       = {Wei Sun and
                  Zhe{-}Ming Lu and
                  Fa{-}Xin Yu and
                  Rong{-}Jun Shen},
  title        = {Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based
                  Audio Retrieval},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {49--69},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040104},
  doi          = {10.4018/JDCF.2012040104},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SunLYS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/VlachopoulosMC12,
  author       = {Konstantinos Vlachopoulos and
                  Emmanouil Magkos and
                  Vassilios Chrissikopoulos},
  title        = {A Model for Hybrid Evidence Investigation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {4},
  pages        = {47--62},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012100104},
  doi          = {10.4018/JDCF.2012100104},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/VlachopoulosMC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangNWZ12,
  author       = {Chang Wang and
                  Jiangqun Ni and
                  Chuntao Wang and
                  Ruiyu Zhang},
  title        = {An Adaptive {JPEG} Steganographic Scheme Based on the Block Entropy
                  of {DCT} Coefficients},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {2},
  pages        = {13--27},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012040102},
  doi          = {10.4018/JDCF.2012040102},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangNWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuSZNC12,
  author       = {Lifang Yu and
                  Yun Q. Shi and
                  Yao Zhao and
                  Rongrong Ni and
                  Gang Cao},
  title        = {A Study on Embedding Efficiency of Matrix Encoding},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {4},
  number       = {1},
  pages        = {37--48},
  year         = {2012},
  url          = {https://doi.org/10.4018/jdcf.2012010103},
  doi          = {10.4018/JDCF.2012010103},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YuSZNC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}