


default search action
Search dblp for Publications
export results for "toc:db/journals/ijdcf/ijdcf12.bht:"
@article{DBLP:journals/ijdcf/AlmutairiSRSYZM20, author = {Ahmed Almutairi and Behzad Shoarian Satari and Carlos Rivas and Cristian Florin Stanciu and Mozhdeh Yamani and Zahra Zohoorsaadat and Serguei A. Mokhov}, title = {Evaluation of Autopsy and Volatility for Cybercrime Investigation: {A} Forensic Lucid Case Study}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {58--89}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010104}, doi = {10.4018/IJDCF.2020010104}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/AlmutairiSRSYZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BoppuruK20, author = {Prathap Rudra Boppuru and Ramesha Kenchappa}, title = {Spatio-Temporal Crime Analysis Using {KDE} and {ARIMA} Models in the Indian Context}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100101}, doi = {10.4018/IJDCF.2020100101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/BoppuruK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BouafifKI20, author = {Hana Bouafif and Faouzi Kamoun and Farkhund Iqbal}, title = {Towards a Better Understanding of Drone Forensics: {A} Case Study of Parrot {AR} Drone 2.0}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {35--57}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010103}, doi = {10.4018/IJDCF.2020010103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/BouafifKI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenRZZ20, author = {Xi Chen and Fangming Ruan and Lvyang Zhang and Yang Zhao}, title = {Design of Cyberspace Security Talents Training System Based on Knowledge Graph}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {44--53}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100104}, doi = {10.4018/IJDCF.2020100104}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenRZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DeshmukhR20, author = {Amar B. Deshmukh and N. Usha Rani}, title = {Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {77--95}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070106}, doi = {10.4018/IJDCF.2020070106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DeshmukhR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DuDC20, author = {Jin Du and Liping Ding and Guangxuan Chen}, title = {Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {111--121}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070108}, doi = {10.4018/IJDCF.2020070108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DuDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DuFZWS20, author = {Lili Du and Yaqin Fan and Lvyang Zhang and Lianying Wang and Tianhang Sun}, title = {A Summary of the Development of Cyber Security Threat Intelligence Sharing}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {54--67}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100105}, doi = {10.4018/IJDCF.2020100105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DuFZWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangH20, author = {Dan Huang and Fangjun Huang}, title = {Reversible Data Hiding Based on Adaptive Block Selection Strategy}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {157--168}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010108}, doi = {10.4018/IJDCF.2020010108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangLT20, author = {Chee Cheun Huang and Chien Eao Lee and Vrizlynn L. L. Thing}, title = {A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {14--34}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010102}, doi = {10.4018/IJDCF.2020010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangLXH20, author = {Wenjun Huang and Chao Liang and Chunxia Xiao and Zhen Han}, title = {Video-Based Person Re-Identification With Unregulated Sequences}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {59--76}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040104}, doi = {10.4018/IJDCF.2020040104}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangLXH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KalashRMBWI20, author = {Mahmoud Kalash and Mrigank Rochan and Noman Mohammed and Neil D. B. Bruce and Yang Wang and Farkhund Iqbal}, title = {A Deep Learning Framework for Malware Classification}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {90--108}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010105}, doi = {10.4018/IJDCF.2020010105}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/KalashRMBWI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuQS20, author = {Xin Liu and RuiHua Qi and Lin Shao}, title = {Joint Model-Based Attention for Spoken Language Understanding Task}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {32--43}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100103}, doi = {10.4018/IJDCF.2020100103}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuQS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MacDermottBBIS20, author = {{\'{A}}ine MacDermott and Thar Baker and Paul Buck and Farkhund Iqbal and Qi Shi}, title = {The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {1--13}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010101}, doi = {10.4018/IJDCF.2020010101}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/MacDermottBBIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MokniDK20, author = {Raouia Mokni and Hassen Drira and Monji Kherallah}, title = {Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {40--58}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040103}, doi = {10.4018/IJDCF.2020040103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MokniDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RaoTY20, author = {Jingyuan Rao and Min Tu and Xuanjin Yang}, title = {Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {1--14}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070101}, doi = {10.4018/IJDCF.2020070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/RaoTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SharmaAS20, author = {Puneet Sharma and Deepak Arora and T. Sakthivel}, title = {Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {58--76}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070105}, doi = {10.4018/IJDCF.2020070105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SharmaAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SureshS20, author = {Gulivindala Suresh and Chanamallu Srinivasarao}, title = {Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {27--44}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070103}, doi = {10.4018/IJDCF.2020070103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/SureshS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TaoWYJ20, author = {Biaoli Tao and Rangding Wang and Diqun Yan and Chao Jin}, title = {Anti-Forensics of Double Compressed {MP3} Audio}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {45--57}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070104}, doi = {10.4018/IJDCF.2020070104}, timestamp = {Mon, 21 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TaoWYJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangHLL20, author = {Yufei Wang and Yongjian Hu and Alan Wee{-}Chung Liew and Chang{-}Tsun Li}, title = {{ENF} Based Video Forgery Detection Algorithm}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {131--156}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010107}, doi = {10.4018/IJDCF.2020010107}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuLWLLFT20, author = {Chao Wu and Yuan'an Liu and Fan Wu and Feng Liu and Hui Lu and Wenhao Fan and Bihua Tang}, title = {A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {109--130}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010106}, doi = {10.4018/IJDCF.2020010106}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WuLWLLFT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XiaoXYLK20, author = {Jinsheng Xiao and Wenxin Xiong and Yuan Yao and Liang Li and Reinhard Klette}, title = {Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {1--20}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040101}, doi = {10.4018/IJDCF.2020040101}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/XiaoXYLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanLL20, author = {Xuehu Yan and Yuliang Lu and Lintao Liu}, title = {A Common General Access Structure Construction Approach in Secret Image Sharing}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {96--110}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070107}, doi = {10.4018/IJDCF.2020070107}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YuSLHY20, author = {Xinguo Yu and Wu Song and Xiaopan Lyu and Bin He and Nan Ye}, title = {Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {21--39}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040102}, doi = {10.4018/IJDCF.2020040102}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YuSLHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Zhang20, author = {Yi Zhang}, title = {User Identity Hiding Method of Android}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {15--26}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070102}, doi = {10.4018/IJDCF.2020070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Zhang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoFYF20, author = {Yang Zhao and Yaqin Fan and Mingrui Yin and Cheng Fang}, title = {Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {20--31}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100102}, doi = {10.4018/IJDCF.2020100102}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoFYF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhengLW20, author = {Xin Zheng and Jun Li and Qingrong Wu}, title = {A Light Recommendation Algorithm of We-Media Articles Based on Content}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {68--81}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100106}, doi = {10.4018/IJDCF.2020100106}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhengLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.