![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2020
- Ahmed Almutairi, Behzad Shoarian Satari, Carlos Rivas, Cristian Florin Stanciu, Mozhdeh Yamani, Zahra Zohoorsaadat, Serguei A. Mokhov
:
Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study. Int. J. Digit. Crime Forensics 12(1): 58-89 (2020) - Prathap Rudra Boppuru
, Ramesha Kenchappa
:
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context. Int. J. Digit. Crime Forensics 12(4): 1-19 (2020) - Hana Bouafif, Faouzi Kamoun
, Farkhund Iqbal
:
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0. Int. J. Digit. Crime Forensics 12(1): 35-57 (2020) - Xi Chen, Fangming Ruan, Lvyang Zhang, Yang Zhao:
Design of Cyberspace Security Talents Training System Based on Knowledge Graph. Int. J. Digit. Crime Forensics 12(4): 44-53 (2020) - Amar B. Deshmukh, N. Usha Rani:
Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution. Int. J. Digit. Crime Forensics 12(3): 77-95 (2020) - Jin Du, Liping Ding, Guangxuan Chen:
Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings. Int. J. Digit. Crime Forensics 12(3): 111-121 (2020) - Lili Du, Yaqin Fan, Lvyang Zhang, Lianying Wang, Tianhang Sun:
A Summary of the Development of Cyber Security Threat Intelligence Sharing. Int. J. Digit. Crime Forensics 12(4): 54-67 (2020) - Dan Huang, Fangjun Huang:
Reversible Data Hiding Based on Adaptive Block Selection Strategy. Int. J. Digit. Crime Forensics 12(1): 157-168 (2020) - Chee Cheun Huang, Chien Eao Lee, Vrizlynn L. L. Thing:
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification. Int. J. Digit. Crime Forensics 12(1): 14-34 (2020) - Wenjun Huang, Chao Liang
, Chunxia Xiao, Zhen Han:
Video-Based Person Re-Identification With Unregulated Sequences. Int. J. Digit. Crime Forensics 12(2): 59-76 (2020) - Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal
:
A Deep Learning Framework for Malware Classification. Int. J. Digit. Crime Forensics 12(1): 90-108 (2020) - Xin Liu, RuiHua Qi, Lin Shao:
Joint Model-Based Attention for Spoken Language Understanding Task. Int. J. Digit. Crime Forensics 12(4): 32-43 (2020) - Áine MacDermott
, Thar Baker
, Paul Buck, Farkhund Iqbal
, Qi Shi
:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. Int. J. Digit. Crime Forensics 12(1): 1-13 (2020) - Raouia Mokni
, Hassen Drira
, Monji Kherallah
:
Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification. Int. J. Digit. Crime Forensics 12(2): 40-58 (2020) - Jingyuan Rao, Min Tu, Xuanjin Yang:
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks. Int. J. Digit. Crime Forensics 12(3): 1-14 (2020) - Puneet Sharma, Deepak Arora, T. Sakthivel:
Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications. Int. J. Digit. Crime Forensics 12(3): 58-76 (2020) - Gulivindala Suresh
, Chanamallu Srinivasarao:
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features. Int. J. Digit. Crime Forensics 12(3): 27-44 (2020) - Biaoli Tao, Rangding Wang, Diqun Yan
, Chao Jin:
Anti-Forensics of Double Compressed MP3 Audio. Int. J. Digit. Crime Forensics 12(3): 45-57 (2020) - Yufei Wang, Yongjian Hu, Alan Wee-Chung Liew
, Chang-Tsun Li:
ENF Based Video Forgery Detection Algorithm. Int. J. Digit. Crime Forensics 12(1): 131-156 (2020) - Chao Wu, Yuan'an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, Bihua Tang:
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources. Int. J. Digit. Crime Forensics 12(1): 109-130 (2020) - Jinsheng Xiao, Wenxin Xiong, Yuan Yao, Liang Li, Reinhard Klette
:
Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter. Int. J. Digit. Crime Forensics 12(2): 1-20 (2020) - Xuehu Yan
, Yuliang Lu, Lintao Liu:
A Common General Access Structure Construction Approach in Secret Image Sharing. Int. J. Digit. Crime Forensics 12(3): 96-110 (2020) - Xinguo Yu, Wu Song, Xiaopan Lyu
, Bin He
, Nan Ye:
Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning. Int. J. Digit. Crime Forensics 12(2): 21-39 (2020) - Yi Zhang:
User Identity Hiding Method of Android. Int. J. Digit. Crime Forensics 12(3): 15-26 (2020) - Yang Zhao, Yaqin Fan, Mingrui Yin, Cheng Fang:
Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory. Int. J. Digit. Crime Forensics 12(4): 20-31 (2020) - Xin Zheng, Jun Li, Qingrong Wu:
A Light Recommendation Algorithm of We-Media Articles Based on Content. Int. J. Digit. Crime Forensics 12(4): 68-81 (2020)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-18 10:26 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint