default search action
Search dblp for Publications
export results for "toc:db/journals/ijdcf/ijdcf14.bht:"
@article{DBLP:journals/ijdcf/CaiQLCLWYW22, author = {Guiyan Cai and Liang Qu and Yongdong Li and Guoan Cheng and Xin Lu and Yiqi Wang and Fengqin Yao and Shengke Wang}, title = {Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315745}, doi = {10.4018/IJDCF.315745}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/CaiQLCLWYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CaiTZXF22, author = {Zengyu Cai and Chunchen Tan and Jianwei Zhang and Tengteng Xiao and Yuan Feng}, title = {An Unhealthy Webpage Discovery System Based on Convolutional Neural Network}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315614}, doi = {10.4018/IJDCF.315614}, timestamp = {Wed, 04 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CaiTZXF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenHZXLX22, author = {Wan Chen and Daojun Han and Lei Zhang and Qi Xiao and Qiuyue Li and Hongzhen Xiang}, title = {A Model Study on Hierarchical Assisted Exploration of {RBAC}}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302871}, doi = {10.4018/IJDCF.302871}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenHZXLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuaLJ22, author = {Ye Hua and Qu Xi Long and Li Zhen Jin}, title = {Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--14}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302879}, doi = {10.4018/IJDCF.302879}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuaLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/JiangZLLSWQL22, author = {Wenqian Jiang and Ce Zhang and Di Liu and Kaiwei Liu and Zhichao Sun and Jianyuan Wang and Zhongyin Qiu and Weigong Lv}, title = {{SRGM} Decision Model Considering Cost-Reliability}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302873}, doi = {10.4018/IJDCF.302873}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/JiangZLLSWQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KaradshehAAAA22, author = {Louay Karadsheh and Haroun Alryalat and Ja'far Alqatawna and Samer Fawaz Alhawari and Mufleh Amin Al{-}Jarrah}, title = {The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {1}, pages = {1--26}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.286762}, doi = {10.4018/IJDCF.286762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/KaradshehAAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiangZWY22, author = {Xiubo Liang and Yu Zhao and Junhan Wu and Keting Yin}, title = {A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--20}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302876}, doi = {10.4018/IJDCF.302876}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiangZWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuZLXZW22, author = {Shannan Liu and Ronghua Zhang and Changzheng Liu and Chenxi Xu and Jie Zhou and Jiaojiao Wang}, title = {Improvement of the {PBFT} Algorithm Based on Grouping and Reputation Value Voting}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315615}, doi = {10.4018/IJDCF.315615}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuZLXZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangGWZL22, author = {Jing Wang and Jianhou Gan and Jun Wang and Juxiang Zhou and Zeguang Lu}, title = {Face Anonymity Based on Facial Pose Consistency}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--12}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302872}, doi = {10.4018/IJDCF.302872}, timestamp = {Mon, 25 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangGWZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangWPZL22, author = {Junchao Wang and Jin Wei and Jianmin Pang and Fan Zhang and Shunbin Li}, title = {Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302878}, doi = {10.4018/IJDCF.302878}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangWPZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XuCTWGY22, author = {Dawei Xu and Tianxin Chen and Zhonghua Tan and Fudong Wu and Jiaqi Gao and Yunfan Yang}, title = {Web Vulnerability Detection Analyzer Based on Python}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--17}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302875}, doi = {10.4018/IJDCF.302875}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XuCTWGY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YuZZSLM22, author = {Runde Yu and Xianwei Zhang and Yimeng Zhang and Jianfeng Song and Kang Liu and Qiguang Miao}, title = {Design and Implementation of Identity Verification Software Based on Deep Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315796}, doi = {10.4018/IJDCF.315796}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YuZZSLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZangSWYXL22, author = {Dongmei Zang and Xinlei Sheng and Liya Wang and Aimin Yang and Tao Xue and Jie Li}, title = {Research and Application of Warship Multiattribute Threat Assessment Based on Improved {TOPSIS} Gray Association Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--14}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315288}, doi = {10.4018/IJDCF.315288}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZangSWYXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZengYWKF22, author = {Chunyan Zeng and Yao Yang and Zhifeng Wang and Shuai Kong and Shixiong Feng}, title = {Audio Tampering Forensics Based on Representation Learning of {ENF} Phase Sequence}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {1}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302894}, doi = {10.4018/IJDCF.302894}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZengYWKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangCZ22, author = {Fan Zhang and Wei Chen and Yongqiong Zhu}, title = {Golden Eye: An OS-Independent Algorithm for Recovering Files From Hard-Disk Raw Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315793}, doi = {10.4018/IJDCF.315793}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangLY22, author = {Shaobo Zhang and Yuhang Liu and Dequan Yang}, title = {A Novel {IDS} Securing Industrial Control System of Critical Infrastructure Using Deception Technology}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--20}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302874}, doi = {10.4018/IJDCF.302874}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangPYC22, author = {Ran Zhang and Zhihan Pan and Yifeng Yin and Zengyu Cai}, title = {A Model of Network Security Situation Assessment Based on {BPNN} Optimized by {SAA-SSA}}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302877}, doi = {10.4018/IJDCF.302877}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangPYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.