Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eforensics/eforensics2010.bht:"
@proceedings{DBLP:conf/eforensics/2010, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23602-0}, doi = {10.1007/978-3-642-23602-0}, isbn = {978-3-642-23601-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Al-KuwariW10, author = {Saif M. Al{-}Kuwari and Stephen D. Wolthusen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {207--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_20}, doi = {10.1007/978-3-642-23602-0\_20}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Al-KuwariW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BattenP10, author = {Lynn Margaret Batten and Lei Pan}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Using Relationship-Building in Event Profiling for Digital Forensic Investigations}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {40--52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_4}, doi = {10.1007/978-3-642-23602-0\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BattenP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/BlaskiewiczKK10, author = {Przemyslaw Blaskiewicz and Przemyslaw Kubiak and Miroslaw Kutylowski}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Digital Signatures for e-Government - {A} Long-Term Security Architecture}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {256--270}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_24}, doi = {10.1007/978-3-642-23602-0\_24}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/BlaskiewiczKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ChenHGS10, author = {Yasha Chen and Jun Hu and Xinmao Gai and Yu Sun}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Privilege Separation Method for Security Commercial Transactions}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {185--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_17}, doi = {10.1007/978-3-642-23602-0\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ChenHGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DingGL10, author = {Ning Ding and Dawu Gu and Zhiqiang Liu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {241--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_23}, doi = {10.1007/978-3-642-23602-0\_23}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/DingGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/DingGWW10, author = {Liping Ding and Jian Gu and Yongji Wang and JingZheng Wu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {301--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_30}, doi = {10.1007/978-3-642-23602-0\_30}, timestamp = {Sat, 25 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/DingGWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GongZL10, author = {Lei Gong and Yong Zhao and Jianhua Liao}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Research on the Application Security Isolation Model}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {294--300}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_29}, doi = {10.1007/978-3-642-23602-0\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/GongZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/GuoJH10, author = {Hong Guo and Bo Jin and Daoli Huang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Research and Review on Computer Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {224--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_21}, doi = {10.1007/978-3-642-23602-0\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/GuoJH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HeLLL10, author = {Wenlei He and Gongshen Liu and Jun Luo and Jiuchuan Lin}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Text Content Filtering Based on Chinese Character Reconstruction from Radicals}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {234--240}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_22}, doi = {10.1007/978-3-642-23602-0\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HeLLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KsionskJC10, author = {Marti Ksionsk and Ping Ji and Weifeng Chen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Attacks on BitTorrent - An Experimental Study}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {79--89}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_7}, doi = {10.1007/978-3-642-23602-0\_7}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KsionskJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LeiDL10, author = {Zhenxing Lei and Theodora Dule and Xiaodong Lin}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {53--65}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_5}, doi = {10.1007/978-3-642-23602-0\_5}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LeiDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiGDL10, author = {Juanru Li and Dawu Gu and Chaoguo Deng and Yuhao Luo}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Digital Forensic Analysis on Runtime Instruction Flow}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {168--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_15}, doi = {10.1007/978-3-642-23602-0\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LiGDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LinLFS10, author = {Xiaodong Lin and Rongxing Lu and Kevin Foxton and Xuemin (Sherman) Shen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {An Efficient Searchable Encryption Scheme and Its Application in Network Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {66--78}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_6}, doi = {10.1007/978-3-642-23602-0\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LinLFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LinZD10, author = {Xiaodong Lin and Chenxi Zhang and Theodora Dule}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {On Achieving Encrypted File Recovery}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {1--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_1}, doi = {10.1007/978-3-642-23602-0\_1}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LinZD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MoLZ10, author = {Can Mo and Hui Li and Hui Zhu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Stream Pattern Matching Method for Traffic Analysis}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {131--140}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_12}, doi = {10.1007/978-3-642-23602-0\_12}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/MoLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PengLLZZ10, author = {Hao Peng and Songnian Lu and Jianhua Li and Aixin Zhang and Dandan Zhao}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {An Anonymity Scheme Based on Pseudonym in {P2P} Networks}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {287--293}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_28}, doi = {10.1007/978-3-642-23602-0\_28}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/PengLLZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SongJZS10, author = {Zheng Song and Bo Jin and Yinghong Zhu and Yongqing Sun}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Investigating the Implications of Virtualization for Digital Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {110--121}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_10}, doi = {10.1007/978-3-642-23602-0\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SongJZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Wang10, author = {Yi Wang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Study on Supervision of Integrity of Chain of Custody in Computer Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {200--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_19}, doi = {10.1007/978-3-642-23602-0\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Wang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangGXWD10, author = {Yong Wang and Dawu Gu and Jianping Xu and Mi Wen and Liwen Deng}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {{RICB:} Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {99--109}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_9}, doi = {10.1007/978-3-642-23602-0\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangGXWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangXZ10, author = {Lianhai Wang and Lijuan Xu and Shuhui Zhang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Network Connections Information Extraction of 64-Bit Windows 7 Memory Images}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {90--98}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_8}, doi = {10.1007/978-3-642-23602-0\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Wu10, author = {Beihua Wu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {{SQL} Injection Defense Mechanisms for {IIS+ASP+MSSQL} Web Applications}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {271--276}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_25}, doi = {10.1007/978-3-642-23602-0\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Wu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XuGWA10, author = {Aidong Xu and Yan Gong and Yongquan Wang and Nayan Ai}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {On Different Categories of Cybercrime in China}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {277--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_26}, doi = {10.1007/978-3-642-23602-0\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XuGWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/XuWZK10, author = {Lijuan Xu and Lianhai Wang and Lei Zhang and Zhigang Kong}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {122--130}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_11}, doi = {10.1007/978-3-642-23602-0\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/XuWZK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/YiTL10, author = {Junkai Yi and Shuo Tang and Hui Li}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Data Recovery Based on Intelligent Pattern Matching}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {193--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_18}, doi = {10.1007/978-3-642-23602-0\_18}, timestamp = {Wed, 26 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/YiTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/YingT10, author = {Hwei{-}Ming Ying and Vrizlynn L. L. Thing}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {A Novel Inequality-Based Fragmented File Carving Technique}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {28--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_3}, doi = {10.1007/978-3-642-23602-0\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/YingT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhaS10, author = {Xinyan Zha and Sartaj Sahni}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Fast in-Place File Carving for Digital Forensics}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {141--158}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_13}, doi = {10.1007/978-3-642-23602-0\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Zhang10, author = {Ying Zhang}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Face and Lip Tracking for Person Identification}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {282--286}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_27}, doi = {10.1007/978-3-642-23602-0\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Zhang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhangWZZZ10, author = {Lei Zhang and Lianhai Wang and Ruichao Zhang and Shuhui Zhang and Yang Zhou}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Live Memory Acquisition through FireWire}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {159--167}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_14}, doi = {10.1007/978-3-642-23602-0\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhangWZZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhouHQGS10, author = {Kan Zhou and Shiqiu Huang and Zhengwei Qi and Jian Gu and Beijun Shen}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Enhance Information Flow Tracking with Function Recognition}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {179--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_16}, doi = {10.1007/978-3-642-23602-0\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhouHQGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ZhuLL10, author = {Xudong Zhu and Hui Li and Zhijing Liu}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {Behavior Clustering for Anomaly Detection}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {14--27}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_2}, doi = {10.1007/978-3-642-23602-0\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ZhuLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.