Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/eforensics/eforensics2009.bht:"
@inproceedings{DBLP:conf/eforensics/CaldelliAP09, author = {Roberto Caldelli and Irene Amerini and Francesco Picchioni}, editor = {Matthew Sorell}, title = {Distinguishing between Camera and Scanned Images by Means of Frequency Analysis}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {95--101}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_11}, doi = {10.1007/978-3-642-02312-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/CaldelliAP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/CikicLS09, author = {Sabine Cikic and Fritz Lehmann{-}Grube and Jan Sablatnig}, editor = {Matthew Sorell}, title = {Surveillance and Datenschutz in Virtual Environments}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {212--219}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_24}, doi = {10.1007/978-3-642-02312-5\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/CikicLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/FrantiSKKHS09, author = {Pasi Fr{\"{a}}nti and Juhani Saastamoinen and Ismo K{\"{a}}rkk{\"{a}}inen and Tomi Kinnunen and Ville Hautam{\"{a}}ki and Ilja Sidoroff}, editor = {Matthew Sorell}, title = {Developing Speaker Recognition System: From Prototype to Practical Application}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {102--115}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_12}, doi = {10.1007/978-3-642-02312-5\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/FrantiSKKHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/HaltisASB09, author = {Kosta Haltis and Lee Andersson and Matthew Sorell and Russell S. A. Brinkworth}, editor = {Matthew Sorell}, title = {Surveillance Applications of Biologically-Inspired Smart Cameras}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {65--76}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_8}, doi = {10.1007/978-3-642-02312-5\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/HaltisASB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KnightMS09, author = {Simon Knight and Simon Moschou and Matthew Sorell}, editor = {Matthew Sorell}, title = {Analysis of Sensor Photo Response Non-Uniformity in {RAW} Images}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {130--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_15}, doi = {10.1007/978-3-642-02312-5\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KnightMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/KokkinenN09, author = {Heikki Kokkinen and Janne N{\"{o}}yr{\"{a}}nen}, editor = {Matthew Sorell}, title = {Forensics for Detecting {P2P} Network Originated {MP3} Files on the User Device}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {10--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_2}, doi = {10.1007/978-3-642-02312-5\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/KokkinenN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Li09, author = {Chang{-}Tsun Li}, editor = {Matthew Sorell}, title = {Detection of Block Artifacts for Digital Forensic Analysis}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {173--178}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_20}, doi = {10.1007/978-3-642-02312-5\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/Li09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiL09, author = {Chang{-}Tsun Li and Yue Li}, editor = {Matthew Sorell}, title = {Authenticating Medical Images through Repetitive Index Modulation Based Watermarking}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {153--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_17}, doi = {10.1007/978-3-642-02312-5\_17}, timestamp = {Fri, 29 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LiL09a, author = {Yue Li and Chang{-}Tsun Li}, editor = {Matthew Sorell}, title = {Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {166--172}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_19}, doi = {10.1007/978-3-642-02312-5\_19}, timestamp = {Fri, 29 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/LiL09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/LuomaL09, author = {Milton H. Luoma and Vicki Miller Luoma}, editor = {Matthew Sorell}, title = {Complying across Continents: At the Intersection of Litigation Rights and Privacy Rights}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {186--194}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_22}, doi = {10.1007/978-3-642-02312-5\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/LuomaL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MahmoudiEM09, author = {Fariborz Mahmoudi and Rasul Enayatifar and Mohsen Mirzashaeri}, editor = {Matthew Sorell}, title = {Image Encryption Using Chaotic Signal and Max-Heap Tree}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {19--28}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_3}, doi = {10.1007/978-3-642-02312-5\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MahmoudiEM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/MahmoudiMSF09, author = {Fariborz Mahmoudi and Mohsen Mirzashaeri and Ehsan Shahamatnia and Saed Faridnia}, editor = {Matthew Sorell}, title = {A Novel Handwritten Letter Recognizer Using Enhanced Evolutionary Neural Network}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {1--9}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_1}, doi = {10.1007/978-3-642-02312-5\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/MahmoudiMSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/McGrathGKC09, author = {Niall McGrath and Pavel Gladyshev and M. Tahar Kechadi and Joe Carthy}, editor = {Matthew Sorell}, title = {Investigating Encrypted Material}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {29--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_4}, doi = {10.1007/978-3-642-02312-5\_4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/McGrathGKC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/NevilleS09, author = {Timothy Neville and Matthew Sorell}, editor = {Matthew Sorell}, title = {Audit Log for Forensic Photography}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {142--152}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_16}, doi = {10.1007/978-3-642-02312-5\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/NevilleS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PanB09, author = {Lei Pan and Lynn Margaret Batten}, editor = {Matthew Sorell}, title = {Robust Correctness Testing for Digital Forensic Tools}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {54--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_7}, doi = {10.1007/978-3-642-02312-5\_7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/PanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ParkCK09, author = {Heum Park and SunHo Cho and Hyuk{-}Chul Kwon}, editor = {Matthew Sorell}, title = {Cyber Forensics Ontology for Cyber Criminal Investigation}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {160--165}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_18}, doi = {10.1007/978-3-642-02312-5\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ParkCK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/PerrotMRC09, author = {Patrick Perrot and Mathieu Morel and Joseph Razik and G{\'{e}}rard Chollet}, editor = {Matthew Sorell}, title = {Vocal Forgery in Forensic Sciences}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {179--185}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_21}, doi = {10.1007/978-3-642-02312-5\_21}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/PerrotMRC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/RaghavanCM09, author = {Sriram Raghavan and Andrew J. Clark and George M. Mohay}, editor = {Matthew Sorell}, title = {{FIA:} An Open Forensic Integration Architecture for Composing Digital Evidence}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {83--94}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_10}, doi = {10.1007/978-3-642-02312-5\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/RaghavanCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/ShiralkarLT09, author = {Trupti Shiralkar and Michael K. Lavine and Benjamin P. Turnbull}, editor = {Matthew Sorell}, title = {A Preliminary Approach to the Forensic Analysis of an Ultraportable {ASUS} Eee {PC}}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {116--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_13}, doi = {10.1007/978-3-642-02312-5\_13}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/ShiralkarLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/SlayS09, author = {Jill Slay and Elena Sitnikova}, editor = {Matthew Sorell}, title = {The Development of a Generic Framework for the Forensic Analysis of {SCADA} and Process Control Systems}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {77--82}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_9}, doi = {10.1007/978-3-642-02312-5\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/SlayS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/Sullivan09, author = {Clare Sullivan}, editor = {Matthew Sorell}, title = {Digital Identity - The Legal Person?}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {195--211}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_23}, doi = {10.1007/978-3-642-02312-5\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/Sullivan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/TurnbullOS09, author = {Benjamin P. Turnbull and Grant Osborne and Matthew Simon}, editor = {Matthew Sorell}, title = {Legal and Technical Implications of Collecting Wireless Data as an Evidence Source}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {36--41}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_5}, doi = {10.1007/978-3-642-02312-5\_5}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/TurnbullOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangC09, author = {Xue{-}Guang Wang and Zhen{-}Chuan Chai}, editor = {Matthew Sorell}, title = {A Provable Security Scheme of ID-Based Threshold Decryption}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {122--129}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_14}, doi = {10.1007/978-3-642-02312-5\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WongGC09, author = {M. L. Dennis Wong and Antionette W.{-}T. Goh and Hong Siang Chua}, editor = {Matthew Sorell}, title = {Medical Image Authentication Using {DPT} Watermarking: {A} Preliminary Attempt}, booktitle = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, pages = {42--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5\_6}, doi = {10.1007/978-3-642-02312-5\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eforensics/WongGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eforensics/2009, editor = {Matthew Sorell}, title = {Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {8}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02312-5}, doi = {10.1007/978-3-642-02312-5}, isbn = {978-3-642-02311-8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.