Search dblp for Publications

export results for "toc:db/journals/ijdcf/ijdcf12.bht:"

 download as .bib file

@article{DBLP:journals/ijdcf/AlmutairiSRSYZM20,
  author       = {Ahmed Almutairi and
                  Behzad Shoarian Satari and
                  Carlos Rivas and
                  Cristian Florin Stanciu and
                  Mozhdeh Yamani and
                  Zahra Zohoorsaadat and
                  Serguei A. Mokhov},
  title        = {Evaluation of Autopsy and Volatility for Cybercrime Investigation:
                  {A} Forensic Lucid Case Study},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {58--89},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010104},
  doi          = {10.4018/IJDCF.2020010104},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/AlmutairiSRSYZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BoppuruK20,
  author       = {Prathap Rudra Boppuru and
                  Ramesha Kenchappa},
  title        = {Spatio-Temporal Crime Analysis Using {KDE} and {ARIMA} Models in the
                  Indian Context},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100101},
  doi          = {10.4018/IJDCF.2020100101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BoppuruK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/BouafifKI20,
  author       = {Hana Bouafif and
                  Faouzi Kamoun and
                  Farkhund Iqbal},
  title        = {Towards a Better Understanding of Drone Forensics: {A} Case Study
                  of Parrot {AR} Drone 2.0},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {35--57},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010103},
  doi          = {10.4018/IJDCF.2020010103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/BouafifKI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ChenRZZ20,
  author       = {Xi Chen and
                  Fangming Ruan and
                  Lvyang Zhang and
                  Yang Zhao},
  title        = {Design of Cyberspace Security Talents Training System Based on Knowledge
                  Graph},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {44--53},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100104},
  doi          = {10.4018/IJDCF.2020100104},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChenRZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DeshmukhR20,
  author       = {Amar B. Deshmukh and
                  N. Usha Rani},
  title        = {Optimization-Driven Kernel and Deep Convolutional Neural Network for
                  Multi-View Face Video Super Resolution},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {77--95},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070106},
  doi          = {10.4018/IJDCF.2020070106},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DeshmukhR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuDC20,
  author       = {Jin Du and
                  Liping Ding and
                  Guangxuan Chen},
  title        = {Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {111--121},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070108},
  doi          = {10.4018/IJDCF.2020070108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DuDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/DuFZWS20,
  author       = {Lili Du and
                  Yaqin Fan and
                  Lvyang Zhang and
                  Lianying Wang and
                  Tianhang Sun},
  title        = {A Summary of the Development of Cyber Security Threat Intelligence
                  Sharing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {54--67},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100105},
  doi          = {10.4018/IJDCF.2020100105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/DuFZWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangH20,
  author       = {Dan Huang and
                  Fangjun Huang},
  title        = {Reversible Data Hiding Based on Adaptive Block Selection Strategy},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {157--168},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010108},
  doi          = {10.4018/IJDCF.2020010108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLT20,
  author       = {Chee Cheun Huang and
                  Chien Eao Lee and
                  Vrizlynn L. L. Thing},
  title        = {A Novel Video Forgery Detection Model Based on Triangular Polarity
                  Feature Classification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {14--34},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010102},
  doi          = {10.4018/IJDCF.2020010102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/HuangLXH20,
  author       = {Wenjun Huang and
                  Chao Liang and
                  Chunxia Xiao and
                  Zhen Han},
  title        = {Video-Based Person Re-Identification With Unregulated Sequences},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {59--76},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040104},
  doi          = {10.4018/IJDCF.2020040104},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/HuangLXH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KalashRMBWI20,
  author       = {Mahmoud Kalash and
                  Mrigank Rochan and
                  Noman Mohammed and
                  Neil D. B. Bruce and
                  Yang Wang and
                  Farkhund Iqbal},
  title        = {A Deep Learning Framework for Malware Classification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {90--108},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010105},
  doi          = {10.4018/IJDCF.2020010105},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KalashRMBWI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/LiuQS20,
  author       = {Xin Liu and
                  RuiHua Qi and
                  Lin Shao},
  title        = {Joint Model-Based Attention for Spoken Language Understanding Task},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {32--43},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100103},
  doi          = {10.4018/IJDCF.2020100103},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/LiuQS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MacDermottBBIS20,
  author       = {{\'{A}}ine MacDermott and
                  Thar Baker and
                  Paul Buck and
                  Farkhund Iqbal and
                  Qi Shi},
  title        = {The Internet of Things: Challenges and Considerations for Cybercrime
                  Investigations and Digital Forensics},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {1--13},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010101},
  doi          = {10.4018/IJDCF.2020010101},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MacDermottBBIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/MokniDK20,
  author       = {Raouia Mokni and
                  Hassen Drira and
                  Monji Kherallah},
  title        = {Deep-Analysis of Palmprint Representation Based on Correlation Concept
                  for Human Biometrics Identification},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {40--58},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040103},
  doi          = {10.4018/IJDCF.2020040103},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/MokniDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/RaoTY20,
  author       = {Jingyuan Rao and
                  Min Tu and
                  Xuanjin Yang},
  title        = {Two Variations of Peer Intermediaries for Key Establishment in Sensor
                  Networks},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {1--14},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070101},
  doi          = {10.4018/IJDCF.2020070101},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/RaoTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SharmaAS20,
  author       = {Puneet Sharma and
                  Deepak Arora and
                  T. Sakthivel},
  title        = {Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile
                  Applications},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {58--76},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070105},
  doi          = {10.4018/IJDCF.2020070105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SharmaAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/SureshS20,
  author       = {Gulivindala Suresh and
                  Chanamallu Srinivasarao},
  title        = {Copy Move Forgery Detection Through Differential Excitation Component-Based
                  Texture Features},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {27--44},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070103},
  doi          = {10.4018/IJDCF.2020070103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/SureshS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/TaoWYJ20,
  author       = {Biaoli Tao and
                  Rangding Wang and
                  Diqun Yan and
                  Chao Jin},
  title        = {Anti-Forensics of Double Compressed {MP3} Audio},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {45--57},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070104},
  doi          = {10.4018/IJDCF.2020070104},
  timestamp    = {Mon, 21 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/TaoWYJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangHLL20,
  author       = {Yufei Wang and
                  Yongjian Hu and
                  Alan Wee{-}Chung Liew and
                  Chang{-}Tsun Li},
  title        = {{ENF} Based Video Forgery Detection Algorithm},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {131--156},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010107},
  doi          = {10.4018/IJDCF.2020010107},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WuLWLLFT20,
  author       = {Chao Wu and
                  Yuan'an Liu and
                  Fan Wu and
                  Feng Liu and
                  Hui Lu and
                  Wenhao Fan and
                  Bihua Tang},
  title        = {A Hybrid Intrusion Detection System for IoT Applications with Constrained
                  Resources},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {1},
  pages        = {109--130},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020010106},
  doi          = {10.4018/IJDCF.2020010106},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WuLWLLFT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/XiaoXYLK20,
  author       = {Jinsheng Xiao and
                  Wenxin Xiong and
                  Yuan Yao and
                  Liang Li and
                  Reinhard Klette},
  title        = {Lane Detection Algorithm Based on Road Structure and Extended Kalman
                  Filter},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {1--20},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040101},
  doi          = {10.4018/IJDCF.2020040101},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/XiaoXYLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YanLL20,
  author       = {Xuehu Yan and
                  Yuliang Lu and
                  Lintao Liu},
  title        = {A Common General Access Structure Construction Approach in Secret
                  Image Sharing},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {96--110},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070107},
  doi          = {10.4018/IJDCF.2020070107},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YanLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YuSLHY20,
  author       = {Xinguo Yu and
                  Wu Song and
                  Xiaopan Lyu and
                  Bin He and
                  Nan Ye},
  title        = {Reading Both Single and Multiple Digital Video Clocks Using Context-Aware
                  Pixel Periodicity and Deep Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {2},
  pages        = {21--39},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020040102},
  doi          = {10.4018/IJDCF.2020040102},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YuSLHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zhang20,
  author       = {Yi Zhang},
  title        = {User Identity Hiding Method of Android},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {3},
  pages        = {15--26},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020070102},
  doi          = {10.4018/IJDCF.2020070102},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Zhang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhaoFYF20,
  author       = {Yang Zhao and
                  Yaqin Fan and
                  Mingrui Yin and
                  Cheng Fang},
  title        = {Research on the Construction of a Student Model of an Adaptive Learning
                  System Based on Cognitive Diagnosis Theory},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {20--31},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100102},
  doi          = {10.4018/IJDCF.2020100102},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhaoFYF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhengLW20,
  author       = {Xin Zheng and
                  Jun Li and
                  Qingrong Wu},
  title        = {A Light Recommendation Algorithm of We-Media Articles Based on Content},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {12},
  number       = {4},
  pages        = {68--81},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDCF.2020100106},
  doi          = {10.4018/IJDCF.2020100106},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhengLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}