![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
International Journal of Digital Crime and Forensics, Volume 12
Volume 12, Number 1, 2020
- Áine MacDermott
, Thar Baker
, Paul Buck, Farkhund Iqbal
, Qi Shi
:
The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics. 1-13 - Chee Cheun Huang, Chien Eao Lee, Vrizlynn L. L. Thing:
A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification. 14-34 - Hana Bouafif, Faouzi Kamoun
, Farkhund Iqbal
:
Towards a Better Understanding of Drone Forensics: A Case Study of Parrot AR Drone 2.0. 35-57 - Ahmed Almutairi, Behzad Shoarian Satari, Carlos Rivas, Cristian Florin Stanciu, Mozhdeh Yamani, Zahra Zohoorsaadat, Serguei A. Mokhov
:
Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study. 58-89 - Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D. B. Bruce, Yang Wang, Farkhund Iqbal
:
A Deep Learning Framework for Malware Classification. 90-108 - Chao Wu, Yuan'an Liu, Fan Wu, Feng Liu, Hui Lu, Wenhao Fan, Bihua Tang:
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources. 109-130 - Yufei Wang, Yongjian Hu, Alan Wee-Chung Liew
, Chang-Tsun Li:
ENF Based Video Forgery Detection Algorithm. 131-156 - Dan Huang, Fangjun Huang:
Reversible Data Hiding Based on Adaptive Block Selection Strategy. 157-168
Volume 12, Number 2, 2020
- Jinsheng Xiao, Wenxin Xiong, Yuan Yao, Liang Li, Reinhard Klette
:
Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter. 1-20 - Xinguo Yu, Wu Song, Xiaopan Lyu
, Bin He
, Nan Ye:
Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning. 21-39 - Raouia Mokni
, Hassen Drira
, Monji Kherallah
:
Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification. 40-58 - Wenjun Huang, Chao Liang
, Chunxia Xiao, Zhen Han:
Video-Based Person Re-Identification With Unregulated Sequences. 59-76
Volume 12, Number 3, 2020
- Jingyuan Rao, Min Tu, Xuanjin Yang:
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks. 1-14 - Yi Zhang:
User Identity Hiding Method of Android. 15-26 - Gulivindala Suresh
, Chanamallu Srinivasarao:
Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features. 27-44 - Biaoli Tao, Rangding Wang, Diqun Yan
, Chao Jin:
Anti-Forensics of Double Compressed MP3 Audio. 45-57 - Puneet Sharma, Deepak Arora, T. Sakthivel:
Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications. 58-76 - Amar B. Deshmukh, N. Usha Rani:
Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution. 77-95 - Xuehu Yan
, Yuliang Lu, Lintao Liu:
A Common General Access Structure Construction Approach in Secret Image Sharing. 96-110 - Jin Du, Liping Ding, Guangxuan Chen:
Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings. 111-121
Volume 12, Number 4, 2020
- Prathap Rudra Boppuru
, Ramesha Kenchappa
:
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context. 1-19 - Yang Zhao, Yaqin Fan, Mingrui Yin, Cheng Fang:
Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory. 20-31 - Xin Liu, RuiHua Qi, Lin Shao:
Joint Model-Based Attention for Spoken Language Understanding Task. 32-43 - Xi Chen, Fangming Ruan, Lvyang Zhang, Yang Zhao:
Design of Cyberspace Security Talents Training System Based on Knowledge Graph. 44-53 - Lili Du, Yaqin Fan, Lvyang Zhang, Lianying Wang, Tianhang Sun:
A Summary of the Development of Cyber Security Threat Intelligence Sharing. 54-67 - Xin Zheng, Jun Li, Qingrong Wu:
A Light Recommendation Algorithm of We-Media Articles Based on Content. 68-81
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.