Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijdcf:"
@article{DBLP:journals/ijdcf/ChengQWW23, author = {Shi Cheng and Yan Qu and Chuyue Wang and Jie Wan}, title = {Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--18}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.332858}, doi = {10.4018/IJDCF.332858}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ChengQWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KumarSKS23, author = {Vijay Kumar and Sahil Sharma and Chandan Kumar and Aditya Kumar Sahu}, title = {Latest Trends in Deep Learning Techniques for Image Steganography}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.318666}, doi = {10.4018/IJDCF.318666}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/KumarSKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/NichoAAMI23, author = {Mathew Nicho and Maha Alblooki and Saeed AlMutiwei and Christopher D. McDermott and Olufemi Ilesanmi}, title = {A Crime Scene Reconstruction for Digital Forensic Analysis: An {SUV} Case Study}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--20}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.327358}, doi = {10.4018/IJDCF.327358}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/NichoAAMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PanZLSYZ23, author = {Heng Pan and Yaoyao Zhang and Jianmei Liu and Xueming Si and Zhongyuan Yao and Liang Zhao}, title = {{MD-S3C3:} {A} Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.329219}, doi = {10.4018/IJDCF.329219}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/PanZLSYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangDH23, author = {Suzhen Wang and Yongchen Deng and Zhongbo Hu}, title = {Task Offloading in Cloud-Edge Environments: {A} Deep-Reinforcement-Learning-Based Solution}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--23}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.332066}, doi = {10.4018/IJDCF.332066}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangXXSSC23, author = {Wei Wang and Longxing Xing and Na Xu and Jiatao Su and Wenting Su and Jiarong Cao}, title = {{UAV} Edge Caching Content Recommendation Algorithm Based on Graph Neural Network}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.332774}, doi = {10.4018/IJDCF.332774}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangXXSSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YaoJY23, author = {Wenjun Yao and Ying Jiang and Yang Yang}, title = {The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--20}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.325062}, doi = {10.4018/IJDCF.325062}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/YaoJY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Zhang23, author = {Dawei Zhang}, title = {Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.325224}, doi = {10.4018/IJDCF.325224}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuY23, author = {Yuwen Zhu and Lei Yu}, title = {Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.317100}, doi = {10.4018/IJDCF.317100}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CaiQLCLWYW22, author = {Guiyan Cai and Liang Qu and Yongdong Li and Guoan Cheng and Xin Lu and Yiqi Wang and Fengqin Yao and Shengke Wang}, title = {Semisupervised Surveillance Video Character Extraction and Recognition With Attentional Learning Multiframe Fusion}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315745}, doi = {10.4018/IJDCF.315745}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/CaiQLCLWYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CaiTZXF22, author = {Zengyu Cai and Chunchen Tan and Jianwei Zhang and Tengteng Xiao and Yuan Feng}, title = {An Unhealthy Webpage Discovery System Based on Convolutional Neural Network}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315614}, doi = {10.4018/IJDCF.315614}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/CaiTZXF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenHZXLX22, author = {Wan Chen and Daojun Han and Lei Zhang and Qi Xiao and Qiuyue Li and Hongzhen Xiang}, title = {A Model Study on Hierarchical Assisted Exploration of {RBAC}}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302871}, doi = {10.4018/IJDCF.302871}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenHZXLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuaLJ22, author = {Ye Hua and Qu Xi Long and Li Zhen Jin}, title = {Monocular Depth Matching With Hybrid Sampling and Depth Label Propagation}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--14}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302879}, doi = {10.4018/IJDCF.302879}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuaLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/JiangZLLSWQL22, author = {Wenqian Jiang and Ce Zhang and Di Liu and Kaiwei Liu and Zhichao Sun and Jianyuan Wang and Zhongyin Qiu and Weigong Lv}, title = {{SRGM} Decision Model Considering Cost-Reliability}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302873}, doi = {10.4018/IJDCF.302873}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/JiangZLLSWQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KaradshehAAAA22, author = {Louay Karadsheh and Haroun Alryalat and Ja'far Alqatawna and Samer Fawaz Alhawari and Mufleh Amin Al{-}Jarrah}, title = {The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {1}, pages = {1--26}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.286762}, doi = {10.4018/IJDCF.286762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/KaradshehAAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiangZWY22, author = {Xiubo Liang and Yu Zhao and Junhan Wu and Keting Yin}, title = {A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--20}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302876}, doi = {10.4018/IJDCF.302876}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiangZWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuZLXZW22, author = {Shannan Liu and Ronghua Zhang and Changzheng Liu and Chenxi Xu and Jie Zhou and Jiaojiao Wang}, title = {Improvement of the {PBFT} Algorithm Based on Grouping and Reputation Value Voting}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315615}, doi = {10.4018/IJDCF.315615}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuZLXZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangGWZL22, author = {Jing Wang and Jianhou Gan and Jun Wang and Juxiang Zhou and Zeguang Lu}, title = {Face Anonymity Based on Facial Pose Consistency}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--12}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302872}, doi = {10.4018/IJDCF.302872}, timestamp = {Mon, 25 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangGWZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangWPZL22, author = {Junchao Wang and Jin Wei and Jianmin Pang and Fan Zhang and Shunbin Li}, title = {Security Enhancement Through Compiler-Assisted Software Diversity With Deep Reinforcement Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302878}, doi = {10.4018/IJDCF.302878}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangWPZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XuCTWGY22, author = {Dawei Xu and Tianxin Chen and Zhonghua Tan and Fudong Wu and Jiaqi Gao and Yunfan Yang}, title = {Web Vulnerability Detection Analyzer Based on Python}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--17}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302875}, doi = {10.4018/IJDCF.302875}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XuCTWGY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YuZZSLM22, author = {Runde Yu and Xianwei Zhang and Yimeng Zhang and Jianfeng Song and Kang Liu and Qiguang Miao}, title = {Design and Implementation of Identity Verification Software Based on Deep Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315796}, doi = {10.4018/IJDCF.315796}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YuZZSLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZangSWYXL22, author = {Dongmei Zang and Xinlei Sheng and Liya Wang and Aimin Yang and Tao Xue and Jie Li}, title = {Research and Application of Warship Multiattribute Threat Assessment Based on Improved {TOPSIS} Gray Association Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--14}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315288}, doi = {10.4018/IJDCF.315288}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZangSWYXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZengYWKF22, author = {Chunyan Zeng and Yao Yang and Zhifeng Wang and Shuai Kong and Shixiong Feng}, title = {Audio Tampering Forensics Based on Representation Learning of {ENF} Phase Sequence}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {1}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302894}, doi = {10.4018/IJDCF.302894}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZengYWKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangCZ22, author = {Fan Zhang and Wei Chen and Yongqiong Zhu}, title = {Golden Eye: An OS-Independent Algorithm for Recovering Files From Hard-Disk Raw Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {3}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.315793}, doi = {10.4018/IJDCF.315793}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangLY22, author = {Shaobo Zhang and Yuhang Liu and Dequan Yang}, title = {A Novel {IDS} Securing Industrial Control System of Critical Infrastructure Using Deception Technology}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--20}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302874}, doi = {10.4018/IJDCF.302874}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangPYC22, author = {Ran Zhang and Zhihan Pan and Yifeng Yin and Zengyu Cai}, title = {A Model of Network Security Situation Assessment Based on {BPNN} Optimized by {SAA-SSA}}, journal = {Int. J. Digit. Crime Forensics}, volume = {14}, number = {2}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.4018/ijdcf.302877}, doi = {10.4018/IJDCF.302877}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangPYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AbulaishHJ21, author = {Muhammad Abulaish and Nur Al Hasan Haldar and Jahiruddin}, title = {{P2DF:} {A} Privacy-Preserving Digital Forensics Framework}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--15}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.288547}, doi = {10.4018/IJDCF.288547}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/AbulaishHJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Al-RoomIBSYMH21, author = {Khalifa Al{-}Room and Farkhund Iqbal and Thar Baker and Babar Shah and Benjamin Yankson and {\'{A}}ine MacDermott and Patrick C. K. Hung}, title = {Drone Forensics: {A} Case Study of Digital Forensic Investigations Conducted on Common Drone Models}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {1}, pages = {1--25}, year = {2021}, url = {https://doi.org/10.4018/IJDCF.2021010101}, doi = {10.4018/IJDCF.2021010101}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/Al-RoomIBSYMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CaoLLZJDB21, author = {Pengcheng Cao and Weiwei Liu and Guangjie Liu and Jiangtao Zhai and Xiaopeng Ji and Yuewei Dai and Huiwen Bai}, title = {Design a Wireless Covert Channel Based on Dither Analog Chaotic Code}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {115--133}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030108}, doi = {10.4018/IJDCF.2021030108}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CaoLLZJDB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CaoSJDX21, author = {Xiushi Cao and Tanfeng Sun and Xinghao Jiang and Yi Dong and Ke Xu}, title = {An Intra-Prediction Mode-Based Video Steganography With Secure Strategy}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {4}, pages = {1--15}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210701.oa1}, doi = {10.4018/IJDCF.20210701.OA1}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CaoSJDX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChSC21, author = {Rupa Ch. and Sumaiya Shaikh and Mukesh Chinta}, title = {Multimedia Concealed Data Detection Using Quantitative Steganalysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {101--113}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa6}, doi = {10.4018/IJDCF.20210901.OA6}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ChSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChakiD21, author = {Jyotismita Chaki and Nilanjan Dey}, title = {Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {1}, pages = {26--47}, year = {2021}, url = {https://doi.org/10.4018/IJDCF.2021010102}, doi = {10.4018/IJDCF.2021010102}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ChakiD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenCZL21, author = {Guangxuan Chen and Guangxiao Chen and Lei Zhang and Qiang Liu}, title = {An Incremental Acquisition Method for Web Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--13}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021110116}, doi = {10.4018/IJDCF.2021110116}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DasGV21, author = {More Swami Das and A. Govardhan and Doddapaneni VijayaLakshmi}, title = {A Model of Cloud Forensic Application With Assurance of Cloud Log}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {114--129}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa7}, doi = {10.4018/IJDCF.20210901.OA7}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DasGV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DingHZO21, author = {Xiangling Ding and Yanming Huang and Dengyong Zhang and Junlin Ouyang}, title = {Identification of Interpolated Frames by Motion-Compensated Frame-Interpolation via Measuring Irregularity of Optical Flow}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--13}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.295813}, doi = {10.4018/IJDCF.295813}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/DingHZO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DuYDCL21, author = {Jin Du and Feng Yuan and Liping Ding and Guangxuan Chen and Xuehua Liu}, title = {Research on Threat Information Network Based on Link Prediction}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {94--102}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030106}, doi = {10.4018/IJDCF.2021030106}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DuYDCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DuanLGJZQ21, author = {Xintao Duan and Baoxia Li and Daidou Guo and Kai Jia and En Zhang and Chuan Qin}, title = {Coverless Information Hiding Based on {WGAN-GP} Model}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {4}, pages = {57--70}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210701.oa5}, doi = {10.4018/IJDCF.20210701.OA5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/DuanLGJZQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GhoshSSP21, author = {Partha Ghosh and Dipankar Sarkar and Joy Sharma and Santanu Phadikar}, title = {An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {77--93}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030105}, doi = {10.4018/IJDCF.2021030105}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GhoshSSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangHC21, author = {Ning Huang and Shuguang Huang and Chao Chang}, title = {Automatic Generation of {ROP} Through Static Instructions Assignment and Dynamic Memory Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {57--76}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030104}, doi = {10.4018/IJDCF.2021030104}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/JanaDBN21, author = {Shantanu Jana and Nibaran Das and Subhadip Basu and Mita Nasipuri}, title = {Survey of Human Gait Analysis and Recognition for Medical and Forensic Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--20}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.289432}, doi = {10.4018/IJDCF.289432}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/JanaDBN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Kangsheng21, author = {Bao Kangsheng}, title = {Information Hiding Model Based on Channel Construction of Orthogonal Basis}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {3}, pages = {1--18}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210501.oa1}, doi = {10.4018/IJDCF.20210501.OA1}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Kangsheng21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KeC21, author = {Yongzhen Ke and Yiping Cui}, title = {Multiple Fusion Strategies in Localization of Local Deformation Tampering}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {103--114}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030107}, doi = {10.4018/IJDCF.2021030107}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/KeC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KeserwaniGPG21, author = {Pankaj Kumar Keserwani and Mahesh Chandra Govil and Emmanuel S. Pilli and Prajjval Govil}, title = {An Optimal {NIDS} for {VCN} Using Feature Selection and Deep Learning Technique: {IDS} for {VCN}}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--25}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20211101.oa10}, doi = {10.4018/IJDCF.20211101.OA10}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/KeserwaniGPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLYXT21, author = {Hanlin Liu and Jingju Liu and Xuehu Yan and Pengfei Xue and Dingwei Tan}, title = {An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {16--34}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030102}, doi = {10.4018/IJDCF.2021030102}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLYXT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuWMTW21, author = {Lianshan Liu and Xiaoli Wang and Lingzhuang Meng and Gang Tian and Ting Wang}, title = {Reversible Data Hiding in a Chaotic Encryption Domain Based on Odevity Verification}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20211101.oa9}, doi = {10.4018/IJDCF.20211101.OA9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuWMTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuX21, author = {Yong Liu and Dawen Xu}, title = {{HEVC} Information-Hiding Algorithm Based on Intra-Prediction and Matrix Coding}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--15}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20211101.oa11}, doi = {10.4018/IJDCF.20211101.OA11}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LuSW21, author = {Hai Lu and Liping Shao and Qinglong Wang}, title = {A High Capacity Test Disguise Method Combined With Interpolation Backup and Double Authentications}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--23}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.295815}, doi = {10.4018/IJDCF.295815}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LuSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MengF21, author = {Yitong Meng and Jinlong Fei}, title = {Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--30}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.288548}, doi = {10.4018/IJDCF.288548}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/MengF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MillerCL21, author = {Shane Miller and Kevin Curran and Tom Lunney}, title = {Identifying the Use of Anonymising Proxies to Conceal Source {IP} Addresses}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--20}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20211101.oa8}, doi = {10.4018/IJDCF.20211101.OA8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MillerCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MillerCL21a, author = {Shane Miller and Kevin Curran and Tom Lunney}, title = {Detection of Anonymising Proxies Using Machine Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.286756}, doi = {10.4018/IJDCF.286756}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/MillerCL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MittalB21, author = {Ruchi Mittal and Mahinder Pal Singh Bhatia}, title = {Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {1}, pages = {79--93}, year = {2021}, url = {https://doi.org/10.4018/IJDCF.2021010105}, doi = {10.4018/IJDCF.2021010105}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/MittalB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MohanML21, author = {Ashok Kumar Mohan and Sethumadhavan Madathil and K. V. Lakshmy}, title = {Holistic Analytics of Digital Artifacts: Unique Metadata Association Model}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {78--100}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa5}, doi = {10.4018/IJDCF.20210901.OA5}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MohanML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Naaz21, author = {Sameena Naaz}, title = {Detection of Phishing in Internet of Things Using Machine Learning Approach}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {1--15}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030101}, doi = {10.4018/IJDCF.2021030101}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Naaz21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PawarG21, author = {Digambar Pawar and Mayank Gajpal}, title = {Image Forensic Tool {(IFT):} Image Retrieval, Tampering Detection, and Classification}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--15}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.287606}, doi = {10.4018/IJDCF.287606}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/PawarG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/QinZTXH21, author = {Jiaohua Qin and Zhuo Zhou and Yun Tan and Xuyu Xiang and Zhibin He}, title = {A Big Data Text Coverless Information Hiding Based on Topic Distribution and {TF-IDF}}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {4}, pages = {40--56}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210701.oa4}, doi = {10.4018/IJDCF.20210701.OA4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/QinZTXH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RJ21, author = {Sunitha R. and Chandrika J.}, title = {Malevolent Node Detection Based on Network Parameters Mining in Wireless Sensor Networks}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {130--144}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa8}, doi = {10.4018/IJDCF.20210901.OA8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/RJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RahmanT21, author = {Rizwan Ur Rahman and Deepak Singh Tomar}, title = {Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features Set}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--27}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20211101.oa6}, doi = {10.4018/IJDCF.20211101.OA6}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/RahmanT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ReddyR21, author = {M. Sravan Kumar Reddy and Dharmendra Singh Rajput}, title = {Design and Development of Ternary-Based Anomaly Detection in Semantic Graphs Using Metaheuristic Algorithm}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {43--64}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa3}, doi = {10.4018/IJDCF.20210901.OA3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ReddyR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SahuK21, author = {Ajay Kumar Sahu and Ashish Kumar}, title = {A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {1}, pages = {65--78}, year = {2021}, url = {https://doi.org/10.4018/IJDCF.2021010104}, doi = {10.4018/IJDCF.2021010104}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/SahuK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShiSJDX21, author = {Henan Shi and Tanfeng Sun and Xinghao Jiang and Yi Dong and Ke Xu}, title = {A {HEVC} Video Steganalysis Against DCT/DST-Based Steganography}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {3}, pages = {19--33}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210501.oa2}, doi = {10.4018/IJDCF.20210501.OA2}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ShiSJDX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShreeD21, author = {Barkha Shree and Parneeta Dhaliwal}, title = {Behavioural Evidence Analysis: {A} Paradigm Shift in Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {20--42}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa2}, doi = {10.4018/IJDCF.20210901.OA2}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ShreeD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SomanR21, author = {Rajashree Soman and Sukumar R.}, title = {Secure Storage and Sharing of Visitor Images Generated by Smart Entrance on Public Cloud}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {65--77}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa4}, doi = {10.4018/IJDCF.20210901.OA4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SomanR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SuKDL21, author = {Tingting Su and Yan Ke and Yi Ding and Jia Liu}, title = {Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {4}, pages = {71--89}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210701.oa6}, doi = {10.4018/IJDCF.20210701.OA6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SuKDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TN21, author = {Chethana H. T. and Trisiladevi C. Nagavi}, title = {A New Framework for Matching Forensic Composite Sketches With Digital Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {5}, pages = {1--19}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210901.oa1}, doi = {10.4018/IJDCF.20210901.OA1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/TN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ThankiBK21, author = {Rohit M. Thanki and Surekha Borra and Ashish Kothari}, title = {Fragile Watermarking Framework for Tamper Detection of Color Biometric Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {2}, pages = {35--56}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.2021030103}, doi = {10.4018/IJDCF.2021030103}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ThankiBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangYZ21, author = {Kaixi Wang and Xiangmei Yu and Ziyi Zou}, title = {A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20211101.oa4}, doi = {10.4018/IJDCF.20211101.OA4}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuWZZZG21, author = {Shiqi Wu and Bo Wang and Jianxiang Zhao and Mengnan Zhao and Kun Zhong and Yanqing Guo}, title = {Virtual Sample Generation and Ensemble Learning Based Image Source Identification With Small Training Samples}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {3}, pages = {34--46}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210501.oa3}, doi = {10.4018/IJDCF.20210501.OA3}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WuWZZZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuYLL21, author = {Guan{-}Zhong Wu and Xiangyu Yu and Hui Liang and Minting Li}, title = {Two-Step Image-in-Image Steganography via {GAN}}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--12}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.295814}, doi = {10.4018/IJDCF.295814}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WuYLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuZLYS21, author = {Jianbin Wu and Yang Zhang and Chuwei Luo and Lin Feng Yuan and Xiao Kang Shen}, title = {A Modification-Free Steganography Algorithm Based on Image Classification and {CNN}}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {3}, pages = {47--58}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210501.oa4}, doi = {10.4018/IJDCF.20210501.OA4}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WuZLYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XiaoLXZ21, author = {Di Xiao and Jia Liang and Yanping Xiang and Jiaqi Zhou}, title = {Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--19}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.295812}, doi = {10.4018/IJDCF.295812}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XiaoLXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YadavSG21, author = {Sumit Kumar Yadav and Kavita Sharma and Ananya Gupta}, title = {SafeWomen: {A} Smart Device to Secure Women's Environment Using ATmega328 With an Android Tracking App}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {1}, pages = {48--64}, year = {2021}, url = {https://doi.org/10.4018/IJDCF.2021010103}, doi = {10.4018/IJDCF.2021010103}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/YadavSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YangMZ21, author = {Liuqing Yang and Wei Meng and Xudong Zhao}, title = {Color Image Encryption Using Angular Graph Fourier Transform}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {3}, pages = {59--82}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210501.oa5}, doi = {10.4018/IJDCF.20210501.OA5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YangMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YuWLH21, author = {Lei Yu and Haoyu Wang and Linyu Li and Houhua He}, title = {Towards Automated Detection of Higher-Order Command Injection Vulnerabilities in IoT Devices: Fuzzing With Dynamic Data Flow Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.286755}, doi = {10.4018/IJDCF.286755}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/YuWLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoWL21, author = {Zheng Zhao and Penghui Wang and Wei Lu}, title = {Multi-Layer Fusion Neural Network for Deepfake Detection}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {4}, pages = {26--39}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210701.oa3}, doi = {10.4018/IJDCF.20210701.OA3}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoZLLLY21, author = {Xuemei Zhao and Tongtong Zhang and Jun Liu and Canju Lu and Huan Lu and Xuehu Yan}, title = {Applying Secret Image Sharing to Economics}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {4}, pages = {16--25}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20210701.oa2}, doi = {10.4018/IJDCF.20210701.OA2}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoZLLLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuYS21, author = {Alex Yao Chu Zhu and Wei{-}Qi Yan and Roopak Sinha}, title = {{ROP} Defense Using Trie Graph for System Security}, journal = {Int. J. Digit. Crime Forensics}, volume = {13}, number = {6}, pages = {1--12}, year = {2021}, url = {https://doi.org/10.4018/ijdcf.20211101.oa7}, doi = {10.4018/IJDCF.20211101.OA7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AlmutairiSRSYZM20, author = {Ahmed Almutairi and Behzad Shoarian Satari and Carlos Rivas and Cristian Florin Stanciu and Mozhdeh Yamani and Zahra Zohoorsaadat and Serguei A. Mokhov}, title = {Evaluation of Autopsy and Volatility for Cybercrime Investigation: {A} Forensic Lucid Case Study}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {58--89}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010104}, doi = {10.4018/IJDCF.2020010104}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AlmutairiSRSYZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BoppuruK20, author = {Prathap Rudra Boppuru and Ramesha Kenchappa}, title = {Spatio-Temporal Crime Analysis Using {KDE} and {ARIMA} Models in the Indian Context}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100101}, doi = {10.4018/IJDCF.2020100101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/BoppuruK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BouafifKI20, author = {Hana Bouafif and Faouzi Kamoun and Farkhund Iqbal}, title = {Towards a Better Understanding of Drone Forensics: {A} Case Study of Parrot {AR} Drone 2.0}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {35--57}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010103}, doi = {10.4018/IJDCF.2020010103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/BouafifKI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenRZZ20, author = {Xi Chen and Fangming Ruan and Lvyang Zhang and Yang Zhao}, title = {Design of Cyberspace Security Talents Training System Based on Knowledge Graph}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {44--53}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100104}, doi = {10.4018/IJDCF.2020100104}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenRZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DeshmukhR20, author = {Amar B. Deshmukh and N. Usha Rani}, title = {Optimization-Driven Kernel and Deep Convolutional Neural Network for Multi-View Face Video Super Resolution}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {77--95}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070106}, doi = {10.4018/IJDCF.2020070106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DeshmukhR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DuDC20, author = {Jin Du and Liping Ding and Guangxuan Chen}, title = {Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {111--121}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070108}, doi = {10.4018/IJDCF.2020070108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DuDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DuFZWS20, author = {Lili Du and Yaqin Fan and Lvyang Zhang and Lianying Wang and Tianhang Sun}, title = {A Summary of the Development of Cyber Security Threat Intelligence Sharing}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {54--67}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100105}, doi = {10.4018/IJDCF.2020100105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DuFZWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangH20, author = {Dan Huang and Fangjun Huang}, title = {Reversible Data Hiding Based on Adaptive Block Selection Strategy}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {157--168}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010108}, doi = {10.4018/IJDCF.2020010108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangLT20, author = {Chee Cheun Huang and Chien Eao Lee and Vrizlynn L. L. Thing}, title = {A Novel Video Forgery Detection Model Based on Triangular Polarity Feature Classification}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {14--34}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010102}, doi = {10.4018/IJDCF.2020010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangLXH20, author = {Wenjun Huang and Chao Liang and Chunxia Xiao and Zhen Han}, title = {Video-Based Person Re-Identification With Unregulated Sequences}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {59--76}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040104}, doi = {10.4018/IJDCF.2020040104}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangLXH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KalashRMBWI20, author = {Mahmoud Kalash and Mrigank Rochan and Noman Mohammed and Neil D. B. Bruce and Yang Wang and Farkhund Iqbal}, title = {A Deep Learning Framework for Malware Classification}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {90--108}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010105}, doi = {10.4018/IJDCF.2020010105}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/KalashRMBWI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuQS20, author = {Xin Liu and RuiHua Qi and Lin Shao}, title = {Joint Model-Based Attention for Spoken Language Understanding Task}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {32--43}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100103}, doi = {10.4018/IJDCF.2020100103}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuQS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MacDermottBBIS20, author = {{\'{A}}ine MacDermott and Thar Baker and Paul Buck and Farkhund Iqbal and Qi Shi}, title = {The Internet of Things: Challenges and Considerations for Cybercrime Investigations and Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {1--13}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010101}, doi = {10.4018/IJDCF.2020010101}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/MacDermottBBIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MokniDK20, author = {Raouia Mokni and Hassen Drira and Monji Kherallah}, title = {Deep-Analysis of Palmprint Representation Based on Correlation Concept for Human Biometrics Identification}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {40--58}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040103}, doi = {10.4018/IJDCF.2020040103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MokniDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RaoTY20, author = {Jingyuan Rao and Min Tu and Xuanjin Yang}, title = {Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {1--14}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070101}, doi = {10.4018/IJDCF.2020070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/RaoTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SharmaAS20, author = {Puneet Sharma and Deepak Arora and T. Sakthivel}, title = {Mobile Cloud Forensic Readiness Process Model for Cloud-Based Mobile Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {58--76}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070105}, doi = {10.4018/IJDCF.2020070105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SharmaAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SureshS20, author = {Gulivindala Suresh and Chanamallu Srinivasarao}, title = {Copy Move Forgery Detection Through Differential Excitation Component-Based Texture Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {27--44}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070103}, doi = {10.4018/IJDCF.2020070103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/SureshS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TaoWYJ20, author = {Biaoli Tao and Rangding Wang and Diqun Yan and Chao Jin}, title = {Anti-Forensics of Double Compressed {MP3} Audio}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {45--57}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070104}, doi = {10.4018/IJDCF.2020070104}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TaoWYJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangHLL20, author = {Yufei Wang and Yongjian Hu and Alan Wee{-}Chung Liew and Chang{-}Tsun Li}, title = {{ENF} Based Video Forgery Detection Algorithm}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {131--156}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010107}, doi = {10.4018/IJDCF.2020010107}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuLWLLFT20, author = {Chao Wu and Yuan'an Liu and Fan Wu and Feng Liu and Hui Lu and Wenhao Fan and Bihua Tang}, title = {A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {1}, pages = {109--130}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020010106}, doi = {10.4018/IJDCF.2020010106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WuLWLLFT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XiaoXYLK20, author = {Jinsheng Xiao and Wenxin Xiong and Yuan Yao and Liang Li and Reinhard Klette}, title = {Lane Detection Algorithm Based on Road Structure and Extended Kalman Filter}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {1--20}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040101}, doi = {10.4018/IJDCF.2020040101}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XiaoXYLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanLL20, author = {Xuehu Yan and Yuliang Lu and Lintao Liu}, title = {A Common General Access Structure Construction Approach in Secret Image Sharing}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {96--110}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070107}, doi = {10.4018/IJDCF.2020070107}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YuSLHY20, author = {Xinguo Yu and Wu Song and Xiaopan Lyu and Bin He and Nan Ye}, title = {Reading Both Single and Multiple Digital Video Clocks Using Context-Aware Pixel Periodicity and Deep Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {2}, pages = {21--39}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020040102}, doi = {10.4018/IJDCF.2020040102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YuSLHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Zhang20, author = {Yi Zhang}, title = {User Identity Hiding Method of Android}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {3}, pages = {15--26}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020070102}, doi = {10.4018/IJDCF.2020070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Zhang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoFYF20, author = {Yang Zhao and Yaqin Fan and Mingrui Yin and Cheng Fang}, title = {Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {20--31}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100102}, doi = {10.4018/IJDCF.2020100102}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoFYF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhengLW20, author = {Xin Zheng and Jun Li and Qingrong Wu}, title = {A Light Recommendation Algorithm of We-Media Articles Based on Content}, journal = {Int. J. Digit. Crime Forensics}, volume = {12}, number = {4}, pages = {68--81}, year = {2020}, url = {https://doi.org/10.4018/IJDCF.2020100106}, doi = {10.4018/IJDCF.2020100106}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhengLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BaiSLW19, author = {Jian Bai and Yao Sun and Ting Li and Dingkang Wang}, title = {Applying Horner's Rule to Optimize Lightweight {MDS} Matrices}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {82--96}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100106}, doi = {10.4018/IJDCF.2019100106}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/BaiSLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BorraT19, author = {Surekha Borra and Rohit M. Thanki}, title = {A {FRT} - {SVD} Based Blind Medical Watermarking Technique for Telemedicine Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {2}, pages = {13--33}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019040102}, doi = {10.4018/IJDCF.2019040102}, timestamp = {Mon, 23 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/BorraT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChengFYS19, author = {Yuqiao Cheng and Zhengxin Fu and Bin Yu and Gang Shen}, title = {General Construction for Extended Visual Cryptography Scheme Using {QR} Codes}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {1--17}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010101}, doi = {10.4018/IJDCF.2019010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChengFYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuangLLLX19, author = {Xinchao Huang and Zihan Liu and Wei Lu and Hongmei Liu and Shijun Xiang}, title = {Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {2}, pages = {47--62}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019040104}, doi = {10.4018/IJDCF.2019040104}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/HuangLLLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HussainBAL19, author = {Md. Muzakkir Hussain and M. M. Sufyan Beg and Mohammad Saad Alam and Shahedul Haque Laskar}, title = {Big Data Analytics Platforms for Electric Vehicle Integration in Transport Oriented Smart Cities: Computing Platforms for Platforms for Electric Vehicle Integration in Smart Cities}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {3}, pages = {23--42}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019070102}, doi = {10.4018/IJDCF.2019070102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HussainBAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/JiangWCL19, author = {Wei Jiang and Xianda Wu and Xiang Cui and Chaoge Liu}, title = {A Highly Efficient Remote Access Trojan Detection Method}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {1--13}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100101}, doi = {10.4018/IJDCF.2019100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/JiangWCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiWYL19, author = {Jian Li and Jinwei Wang and Shuang Yu and Xiangyang Luo}, title = {A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {100--113}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010108}, doi = {10.4018/IJDCF.2019010108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiWYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLYLDJ19, author = {Hanlin Liu and Jingju Liu and Xuehu Yan and Lintao Liu and Wanmeng Ding and Yue Jiang}, title = {A Novel Behavior Steganography Model Based on Secret Sharing}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {97--117}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100107}, doi = {10.4018/IJDCF.2019100107}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLYLDJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LongLP19, author = {Min Long and You Li and Fei Peng}, title = {Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of {AVL} Tree}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {126--137}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010110}, doi = {10.4018/IJDCF.2019010110}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LongLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LuGLL19, author = {Yu Lu and Lingchen Gu and Ju Liu and Peng Lan}, title = {Performance Evaluation and Scheme Selection of Person Re-Identification Algorithms in Video Surveillance}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {50--65}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100104}, doi = {10.4018/IJDCF.2019100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LuGLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MaWL19, author = {Bin Ma and Xiao{-}Yu Wang and Bing Li}, title = {A New Kind of High Capacity and Security Reversible Data Hiding Scheme}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {118--129}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100108}, doi = {10.4018/IJDCF.2019100108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MaWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MakkaouiHE19, author = {Khalid El Makkaoui and Abderrahim Beni Hssane and Abdellah Ezzati}, title = {Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {3}, pages = {90--102}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019070105}, doi = {10.4018/IJDCF.2019070105}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MakkaouiHE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MalikWWA19, author = {Asad Malik and Hongxia Wang and Hanzhou Wu and Sani M. Abdullahi}, title = {Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {46--61}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010104}, doi = {10.4018/IJDCF.2019010104}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MalikWWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengYWZK19, author = {Anjie Peng and Gao Yu and Yadong Wu and Qiong Zhang and Xiangui Kang}, title = {A Universal Image Forensics of Smoothing Filtering}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {18--28}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010102}, doi = {10.4018/IJDCF.2019010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PengYWZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/QianWZF19, author = {Zhenxing Qian and Zichi Wang and Xinpeng Zhang and Guorui Feng}, title = {Breaking Steganography: Slight Modification with Distortion Minimization}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {114--125}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010109}, doi = {10.4018/IJDCF.2019010109}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/QianWZF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShahBK19, author = {Junaid Latief Shah and Heena Farooq Bhat and Asif Iqbal Khan}, title = {CloudIoT: Towards Seamless and Secure Integration of Cloud Computing With Internet of Things}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {3}, pages = {1--22}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019070101}, doi = {10.4018/IJDCF.2019070101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ShahBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SheelaST19, author = {S. J. Sheela and K. V. Suresh and Deepaknath Tandur}, title = {Secured Transmission of Clinical Signals Using Hyperchaotic {DNA} Confusion and Diffusion Transform}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {3}, pages = {43--64}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019070103}, doi = {10.4018/IJDCF.2019070103}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/SheelaST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/VinayakumarSP19, author = {R. Vinayakumar and K. P. Soman and Prabaharan Poornachandran}, title = {A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {3}, pages = {65--89}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019070104}, doi = {10.4018/IJDCF.2019070104}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/VinayakumarSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangNZ19, author = {Xinyi Wang and Shaozhang Niu and Jiwei Zhang}, title = {Digital Image Forensics Based on {CFA} Interpolation Feature and Gaussian Mixture Model}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {2}, pages = {1--12}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019040101}, doi = {10.4018/IJDCF.2019040101}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangYZ19, author = {Zichi Wang and Zhaoxia Yin and Xinpeng Zhang}, title = {Asymmetric Distortion Function for {JPEG} Steganography Using Block Artifact Compensation}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {90--99}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010107}, doi = {10.4018/IJDCF.2019010107}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuDHZ19, author = {Yuanxin Wu and Wen Diao and Dongdong Hou and Weiming Zhang}, title = {Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {29--45}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010103}, doi = {10.4018/IJDCF.2019010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WuDHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuZSC19, author = {Yanpeng Wu and Huiji Zhang and Yi Sun and Minghui Chen}, title = {Steganalysis of {AMR} Based on Statistical Features of Pitch Delay}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {66--81}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100105}, doi = {10.4018/IJDCF.2019100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WuZSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XiaLZST19, author = {Shuangkui Xia and Meihua Liu and Xinchen Zhang and Hong Sun and Mao Tian}, title = {Exploiting Routing Strategy of {DTN} for Message Forwarding in Information Hiding Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {2}, pages = {34--46}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019040103}, doi = {10.4018/IJDCF.2019040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XiaLZST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XieYQM19, author = {Dawei Xie and Haining Yang and Jing Qin and Jixin Ma}, title = {Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {14--27}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100102}, doi = {10.4018/IJDCF.2019100102}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XieYQM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YangHHP19, author = {Jichen Yang and Qianhua He and Yongjian Hu and Weiqiang Pan}, title = {CBC-Based Synthetic Speech Detection}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {2}, pages = {63--74}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019040105}, doi = {10.4018/IJDCF.2019040105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YangHHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangLWZL19, author = {Cong Zhang and Yuanan Liu and Fan Wu and Lidong Zhai and Hui Lu}, title = {Analysis of WeChat Subscription Influence Based on Topic Diffusion}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {130--148}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100109}, doi = {10.4018/IJDCF.2019100109}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangLWZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangNZ19, author = {Mengmeng Zhang and Rongrong Ni and Yao Zhao}, title = {A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {4}, pages = {28--49}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019100103}, doi = {10.4018/IJDCF.2019100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhongLMWX19, author = {Ping Zhong and Mengdi Li and Kai Mu and Juan Wen and Yiming Xue}, title = {Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {78--89}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010106}, doi = {10.4018/IJDCF.2019010106}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhongLMWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuZG19, author = {Jie Zhu and Xianfeng Zhao and Qingxiao Guan}, title = {Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {62--77}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010105}, doi = {10.4018/IJDCF.2019010105}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AbdullahiWM18, author = {Sani M. Abdullahi and Hongxia Wang and Asad Malik}, title = {Fingerprint Image Hashing Based on Minutiae Points and Shape Context}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {1--20}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100101}, doi = {10.4018/IJDCF.2018100101}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AbdullahiWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AbulaishH18, author = {Muhammad Abulaish and Nur Al Hasan Haldar}, title = {Advances in Digital Forensics Frameworks and Tools: {A} Comparative Insight and Ranking}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {95--119}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040106}, doi = {10.4018/IJDCF.2018040106}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AbulaishH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenDCQ18, author = {Guangxuan Chen and Liping Ding and Guangxiao Chen and Panke Qin}, title = {Reliable Security Strategy for Message-Oriented Middleware}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {12--23}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010102}, doi = {10.4018/IJDCF.2018010102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenDCQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenDDZQCL18, author = {Guangxuan Chen and Liping Ding and Jin Du and Guomin Zhou and Panke Qin and Guangxiao Chen and Qiang Liu}, title = {Trust Evaluation Strategy for Single Sign-on Solution in Cloud}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {1--11}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010101}, doi = {10.4018/IJDCF.2018010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenDDZQCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenP18, author = {Juan Chen and Fei Peng}, title = {A Perceptual Encryption Scheme for {HEVC} Video with Lossless Compression}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {67--78}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010106}, doi = {10.4018/IJDCF.2018010106}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenX18, author = {Kai Chen and Dawen Xu}, title = {An Efficient Reversible Data Hiding Scheme for Encrypted Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {1--22}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040101}, doi = {10.4018/IJDCF.2018040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DingLYL18, author = {Wanmeng Ding and Kesheng Liu and Xuehu Yan and Lintao Liu}, title = {Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {120--136}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040107}, doi = {10.4018/IJDCF.2018040107}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DingLYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DongZHL18, author = {Xiaojuan Dong and Weiming Zhang and Xianjun Hu and Keyang Liu}, title = {A Cloud-User Watermarking Protocol Protecting the Right to Be Forgotten for the Outsourced Plain Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {118--139}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100109}, doi = {10.4018/IJDCF.2018100109}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DongZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GaoGZL18, author = {Lin Gao and Tiegang Gao and Jie Zhao and Yonglei Liu}, title = {Reversible Watermarking in Digital Image Using {PVO} and {RDWT}}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {40--55}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040103}, doi = {10.4018/IJDCF.2018040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GaoGZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GaoHGC18, author = {Hang Gao and Mengting Hu and Tiegang Gao and Renhong Cheng}, title = {Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {24--39}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010103}, doi = {10.4018/IJDCF.2018010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GaoHGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuoLW18, author = {Teng Guo and Feng Liu and Wen Wang}, title = {Visual Gambling}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {43--49}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070104}, doi = {10.4018/IJDCF.2018070104}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuoLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiL18, author = {Peng Li and Zuquan Liu}, title = {An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {78--94}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070107}, doi = {10.4018/IJDCF.2018070107}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiangFXWY18, author = {Zhuoqian Liang and Bingwen Feng and Xuba Xu and Xiaotian Wu and Tao Yang}, title = {Geometrically Invariant Image Watermarking Using Histogram Adjustment}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {54--66}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010105}, doi = {10.4018/IJDCF.2018010105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiangFXWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLGR18, author = {Xiaoxi Liu and Ju Liu and Lingchen Gu and Yannan Ren}, title = {Keyframe-Based Vehicle Surveillance Video Retrieval}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {52--61}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100104}, doi = {10.4018/IJDCF.2018100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLL18, author = {Yimin Liu and Wenyan Liu and Xiangyang Luo}, title = {Survey on the Indoor Localization Technique of Wi-Fi Access Points}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {27--42}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070103}, doi = {10.4018/IJDCF.2018070103}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuZNT18, author = {Lu Liu and Yao Zhao and Rongrong Ni and Qi Tian}, title = {Copy-Move Forgery Localization Using Convolutional Neural Networks and {CFA} Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {140--155}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100110}, doi = {10.4018/IJDCF.2018100110}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuZNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LongPG18, author = {Min Long and Fei Peng and Xiaoqing Gong}, title = {A Format-Compliant Encryption for Secure {HEVC} Video Sharing in Multimedia Social Network}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {23--39}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040102}, doi = {10.4018/IJDCF.2018040102}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LongPG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/McKeagueC18, author = {Jonathan McKeague and Kevin Curran}, title = {Detecting the Use of Anonymous Proxies}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {74--94}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040105}, doi = {10.4018/IJDCF.2018040105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/McKeagueC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengWL18, author = {Fei Peng and Shuai{-}ping Wang and Min Long}, title = {Print-Scan Resilient Binary Map Watermarking Based on {DCT} and Scrambling}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {80--89}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100106}, doi = {10.4018/IJDCF.2018100106}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PengWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RanjanSKP18, author = {Preetish Ranjan and Vrijendra Singh and Prabhat Kumar and Satya Prakash}, title = {Models for the Detection of Malicious Intent People in Society}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {15--26}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070102}, doi = {10.4018/IJDCF.2018070102}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/RanjanSKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/RenNY18, author = {Yueqiu Ren and Minh Nguyen and Wei{-}Qi Yan}, title = {Real-Time Recognition of Series Seven New Zealand Banknotes}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {50--65}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070105}, doi = {10.4018/IJDCF.2018070105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/RenNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TuXX18, author = {Min Tu and Shiyang Xu and Jianfeng Xu}, title = {Evaluation Method of Public Transportation System Based on Fuzzy Cloud Model}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {36--51}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100103}, doi = {10.4018/IJDCF.2018100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TuXX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangLLXZW18, author = {Ruxin Wang and Wei Lu and Jixian Li and Shijun Xiang and Xianfeng Zhao and Jinwei Wang}, title = {Digital Image Splicing Detection Based on Markov Features in {QDCT} and {QWT} Domain}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {90--107}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100107}, doi = {10.4018/IJDCF.2018100107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangLLXZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WuSFLLL18, author = {Fan Wu and Ran Sun and Wenhao Fan and Yuanan Liu and Feng Liu and Hui Lu}, title = {A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {95--113}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070108}, doi = {10.4018/IJDCF.2018070108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WuSFLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XiongTZ18, author = {Jianying Xiong and Min Tu and Ying Zhou}, title = {Using Weighted Similarity to Assess Risk of Illegal Fund Raising in Online {P2P} Lending}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {62--79}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100105}, doi = {10.4018/IJDCF.2018100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XiongTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanLLM18, author = {Xuehu Yan and Yuliang Lu and Lintao Liu and Duohe Ma}, title = {Image Secret Sharing Construction for General Access Structure with Meaningful Share}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {66--77}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070106}, doi = {10.4018/IJDCF.2018070106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanWL18, author = {Wei Qi Yan and Xiaotian Wu and Feng Liu}, title = {Progressive Scrambling for Social Media}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {56--73}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040104}, doi = {10.4018/IJDCF.2018040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YeHCQ18, author = {Qing Ye and Mingxing Hu and Guangxuan Chen and Panke Qin}, title = {An Improved Encryption Scheme for Traitor Tracing from Lattice}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {21--35}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100102}, doi = {10.4018/IJDCF.2018100102}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YeHCQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YueLML18, author = {Chen Yue and Tianliang Lu and Cai Manchun and Jingying Li}, title = {Evaluation of the Attack Effect Based on Improved Grey Clustering Model}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {92--100}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010108}, doi = {10.4018/IJDCF.2018010108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YueLML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YutingGDK18, author = {Sun Yuting and Jing Guo and Ling Du and Yongzhen Ke}, title = {Blind Detection of Partial-Color-Manipulation Based on Self-PRNU Estimation}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {3}, pages = {1--14}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018070101}, doi = {10.4018/IJDCF.2018070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YutingGDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangC18, author = {Xuan Zhang and Kam{-}Pui Chow}, title = {A Framework for Dark Web Threat Intelligence Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {4}, pages = {108--117}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018100108}, doi = {10.4018/IJDCF.2018100108}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangHC18, author = {Ping Zhang and Yijun He and Kam{-}Pui Chow}, title = {Fraud Track on Secure Electronic Check System}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {2}, pages = {137--144}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018040108}, doi = {10.4018/IJDCF.2018040108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangYXG18, author = {Shun Zhang and Liang Yang and Xihao Xu and Tiegang Gao}, title = {Secure Steganography in {JPEG} Images Based on Histogram Modification and Hyper Chaotic System}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {40--53}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010104}, doi = {10.4018/IJDCF.2018010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangYXG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhouYSY18, author = {Lei Zhou and Wei Qi Yan and Yun Shu and Jian Yu}, title = {{CVSS:} {A} Cloud-Based Visual Surveillance System}, journal = {Int. J. Digit. Crime Forensics}, volume = {10}, number = {1}, pages = {79--91}, year = {2018}, url = {https://doi.org/10.4018/IJDCF.2018010107}, doi = {10.4018/IJDCF.2018010107}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhouYSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Ahmed17, author = {Abdulghani Ali Ahmed}, title = {Investigation Approach for Network Attack Intention Recognition}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {17--38}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010102}, doi = {10.4018/IJDCF.2017010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Ahmed17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AizeziJAM17, author = {Yasen Aizezi and Anwar Jamal and Ruxianguli Abudurexiti and Mutalipu Muming}, title = {Research on Digital Forensics Based on Uyghur Web Text Classification}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {30--39}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100103}, doi = {10.4018/IJDCF.2017100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AizeziJAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenLYL17, author = {Zhe Chen and Jicang Lu and Pengfei Yang and Xiangyang Luo}, title = {Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {48--61}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100105}, doi = {10.4018/IJDCF.2017100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenLYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenPLL17, author = {Juan Chen and Fei Peng and Jie Li and Min Long}, title = {A Lossless Watermarking for 3D {STL} Model Based on Entity Rearrangement and Bit Mapping}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {25--37}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040103}, doi = {10.4018/IJDCF.2017040103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenPLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DiZ17, author = {Hong Di and Xin Zhang}, title = {Deception Detection by Hybrid-Pair Wireless fNIRS System}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {15--24}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040102}, doi = {10.4018/IJDCF.2017040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DiZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuLQ17, author = {Lingchen Gu and Ju Liu and Aixi Qu}, title = {Performance Evaluation and Scheme Selection of Shot Boundary Detection and Keyframe Extraction in Content-Based Video Retrieval}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {15--29}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100102}, doi = {10.4018/IJDCF.2017100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuoJLW17, author = {Teng Guo and Jian Jiao and Feng Liu and Wen Wang}, title = {On the Pixel Expansion of Visual Cryptography Scheme}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {38--44}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040104}, doi = {10.4018/IJDCF.2017040104}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/GuoJLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Liu17, author = {Zhi Jun Liu}, title = {A Cyber Crime Investigation Model Based on Case Characteristics}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {40--47}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100104}, doi = {10.4018/IJDCF.2017100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Liu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLYW17, author = {Lintao Liu and Yuliang Lu and Xuehu Yan and Song Wan}, title = {A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {28--37}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070103}, doi = {10.4018/IJDCF.2017070103}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuWSZ17, author = {Xin Liu and Shen Wang and Jianzhi Sang and Weizhe Zhang}, title = {A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix {VSS}}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {1--10}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070101}, doi = {10.4018/IJDCF.2017070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuWSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LuSYB17, author = {Jia Lu and Jun Shen and Wei Qi Yan and Boris Bacic}, title = {An Empirical Study for Human Behavior Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {11--27}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070102}, doi = {10.4018/IJDCF.2017070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LuSYB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Pradhan17, author = {Padma Lochan Pradhan}, title = {Dynamic Semi-Group {CIA} Pattern Optimizing the Risk on {RTS}}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {51--70}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010104}, doi = {10.4018/IJDCF.2017010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Pradhan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Pradhan17a, author = {Padma Lochan Pradhan}, title = {Proposed Round Robin {CIA} Pattern on {RTS} for Risk Assessment}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {71--85}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010105}, doi = {10.4018/IJDCF.2017010105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Pradhan17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SunLQ17, author = {Fang Sun and Zhenghui Liu and Chuanda Qi}, title = {Speech Content Authentication Scheme based on High-Capacity Watermark Embedding}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {1--14}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040101}, doi = {10.4018/IJDCF.2017040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SunLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TsimperidisRK17, author = {Ioannis Tsimperidis and Shahin Rostami and Vasilios Katos}, title = {Age Detection Through Keystroke Dynamics from User Authentication Failures}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {1--16}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010101}, doi = {10.4018/IJDCF.2017010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TsimperidisRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WanLYL17, author = {Song Wan and Yuliang Lu and Xuehu Yan and Lintao Liu}, title = {A Novel Visual Secret Sharing Scheme Based on {QR} Codes}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {38--48}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070104}, doi = {10.4018/IJDCF.2017070104}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WanLYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Wang17, author = {Ning Wang}, title = {A Knowledge Model of Digital Evidence Review Elements Based on Ontology}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {49--57}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070105}, doi = {10.4018/IJDCF.2017070105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Wang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangNY17, author = {Jia Wang and Minh Ngueyn and WeiQi Yan}, title = {A Framework of Event-Driven Traffic Ticketing System}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {1}, pages = {39--50}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017010103}, doi = {10.4018/IJDCF.2017010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangWY17, author = {Guangyu Wang and Xiaotian Wu and WeiQi Yan}, title = {The State-of-the-Art Technology of Currency Identification: {A} Comparative Study}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {3}, pages = {58--72}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017070106}, doi = {10.4018/IJDCF.2017070106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YanLLWDL17, author = {Xuehu Yan and Yuliang Lu and Lintao Liu and Song Wan and Wanmeng Ding and Hanlin Liu}, title = {Exploiting the Homomorphic Property of Visual Cryptography}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {2}, pages = {45--56}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017040105}, doi = {10.4018/IJDCF.2017040105}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YanLLWDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuGZCC17, author = {Jie Zhu and Qingxiao Guan and Xianfeng Zhao and Yun Cao and Gong Chen}, title = {A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {1--14}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100101}, doi = {10.4018/IJDCF.2017100101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuGZCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuY17, author = {Alex Zhu and Wei Qi Yan}, title = {Exploring Defense of {SQL} Injection Attack in Penetration Testing}, journal = {Int. J. Digit. Crime Forensics}, volume = {9}, number = {4}, pages = {62--71}, year = {2017}, url = {https://doi.org/10.4018/IJDCF.2017100106}, doi = {10.4018/IJDCF.2017100106}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Abdullah16, author = {Nurul Azma Abdullah}, title = {X{\_}myKarve: Non-Contiguous {JPEG} File Carver}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {3}, pages = {63--84}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016070105}, doi = {10.4018/IJDCF.2016070105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Abdullah16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Ch16, author = {Rupa Ch.}, title = {Squint Pixel Steganography: {A} Novel Approach to Detect Digital Crimes and Recovery of Medical Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {4}, pages = {37--47}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016100104}, doi = {10.4018/IJDCF.2016100104}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/Ch16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Cho16, author = {Gyu{-}Sang Cho}, title = {A New Timestamp Digital Forensic Method Using a Modified Superincreasing Sequence}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {3}, pages = {11--33}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016070102}, doi = {10.4018/IJDCF.2016070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Cho16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CuiY16, author = {Wei Cui and Wei Qi Yan}, title = {A Scheme for Face Recognition in Complex Environments}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {1}, pages = {26--36}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016010102}, doi = {10.4018/IJDCF.2016010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CuiY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/FangL16, author = {Cheng Fang and Bo Ya Liu}, title = {Exploration of Web Page Structural Patterns Based on Request Dependency Graph Decomposition}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {4}, pages = {1--13}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016100101}, doi = {10.4018/IJDCF.2016100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/FangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuNY16, author = {Datong Gu and Minh Nguyen and WeiQi Yan}, title = {Cross Models for Twin Recognition}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {4}, pages = {26--36}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016100103}, doi = {10.4018/IJDCF.2016100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LuLML16, author = {Chunlin Lu and Yue Li and Mingjie Ma and Na Li}, title = {A Hybrid {NIDS} Model Using Artificial Neural Network and {D-S} Evidence}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {1}, pages = {37--50}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016010103}, doi = {10.4018/IJDCF.2016010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LuLML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MireDMP16, author = {Archana V. Mire and Sanjay B. Dhok and Naresh J. Mistry and Prakash D. Porey}, title = {Tampering Localization in Double Compressed Images by Investigating Noise Quantization}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {3}, pages = {46--62}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016070104}, doi = {10.4018/IJDCF.2016070104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MireDMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShengG16, author = {Guorui Sheng and Tiegang Gao}, title = {Detection of Seam-Carving Image Based on Benford's Law for Forensic Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {1}, pages = {51--61}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016010104}, doi = {10.4018/IJDCF.2016010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ShengG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SunZDWL16, author = {Fenggang Sun and Lidong Zhai and Yue{-}Jin Du and Peng Wang and Jun Li}, title = {Design of Mobile Botnet Based on Open Service}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {3}, pages = {1--10}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016070101}, doi = {10.4018/IJDCF.2016070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SunZDWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TsaiHLC16, author = {Yuan{-}Yu Tsai and Yao{-}Hsien Huang and Ruo{-}Jhu Lin and Chi{-}Shiang Chan}, title = {An Adjustable Interpolation-based Data Hiding Algorithm Based on {LSB} Substitution and Histogram Shifting}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {2}, pages = {48--61}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016040105}, doi = {10.4018/IJDCF.2016040105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TsaiHLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Wang16, author = {Nana Wang}, title = {Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {1}, pages = {1--25}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016010101}, doi = {10.4018/IJDCF.2016010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Wang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangLY16, author = {Guangyu Wang and Feng Liu and Wei Qi Yan}, title = {Basic Visual Cryptography Using Braille}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {3}, pages = {85--93}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016070106}, doi = {10.4018/IJDCF.2016070106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangLYL16, author = {Ping Wang and Xiangyang Luo and Chunfang Yang and Fenlin Liu}, title = {Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {2}, pages = {36--47}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016040104}, doi = {10.4018/IJDCF.2016040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangLYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangY16, author = {Jia Wang and Wei Qi Yan}, title = {BP-Neural Network for Plate Number Recognition}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {3}, pages = {34--45}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016070103}, doi = {10.4018/IJDCF.2016070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YangC16, author = {Zhihai Yang and Zhongmin Cai}, title = {Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {2}, pages = {16--26}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016040102}, doi = {10.4018/IJDCF.2016040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YangC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YangGXG16, author = {Liang Yang and Tiegang Gao and Yan Xuan and Hang Gao}, title = {Contrast Modification Forensics Algorithm Based on Merged Weight Histogram of Run Length}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {2}, pages = {27--35}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016040103}, doi = {10.4018/IJDCF.2016040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YangGXG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoWGGY16, author = {Jie Zhao and Qiuzi Wang and Jichang Guo and Lin Gao and Fusheng Yang}, title = {An Overview on Passive Image Forensics Technology for Automatic Computer Forgery}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {4}, pages = {14--25}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016100102}, doi = {10.4018/IJDCF.2016100102}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoWGGY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoZY16, author = {Xianfeng Zhao and Jie Zhu and Haibo Yu}, title = {On More Paradigms of Steganalysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {8}, number = {2}, pages = {1--15}, year = {2016}, url = {https://doi.org/10.4018/IJDCF.2016040101}, doi = {10.4018/IJDCF.2016040101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AchumbaOED15, author = {Ifeyinwa Eucharia Achumba and Kennedy Chinedu Okafor and Gloria N. Ezeh and Uchenna Hermes Diala}, title = {OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {2}, pages = {31--52}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015040103}, doi = {10.4018/IJDCF.2015040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AchumbaOED15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AzzouziK15, author = {Abdeslam El Azzouzi and Kamal Eddine El Kadiri}, title = {Semantic System for Attacks and Intrusions Detection}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {4}, pages = {19--32}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015100102}, doi = {10.4018/IJDCF.2015100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AzzouziK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CurranS15, author = {Kevin Curran and Andrew Snodgrass}, title = {A Novel Cue based Picture Word Shape Character Password Creation Scheme}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {3}, pages = {37--59}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015070103}, doi = {10.4018/IJDCF.2015070103}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CurranS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/FaheemKL15, author = {Muhammad Faheem and M. Tahar Kechadi and Nhien{-}An Le{-}Khac}, title = {The State of the Art Forensic Techniques in Mobile Cloud Environment: {A} Survey, Challenges and Current Trends}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {2}, pages = {1--19}, year = {2015}, url = {https://doi.org/10.4018/ijdcf.2015040101}, doi = {10.4018/IJDCF.2015040101}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/FaheemKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GaoGZ15, author = {Lin Gao and Tiegang Gao and Jie Zhao}, title = {Reversible Watermarking in Medical Image Using {RDWT} and Sub-Sample}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {4}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015100101}, doi = {10.4018/IJDCF.2015100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GaoGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GarhwalY15, author = {Abhimanyu Singh Garhwal and Wei Qi Yan}, title = {Evaluations of Image Degradation from Multiple Scan-Print}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {4}, pages = {55--65}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015100104}, doi = {10.4018/IJDCF.2015100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GarhwalY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuoAT15, author = {Yuanfang Guo and Oscar C. Au and Ketan Tang}, title = {Watermark Embedding for Multiscale Error Diffused Halftone Images by Adopting Visual Cryptography}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {1}, pages = {51--68}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015010103}, doi = {10.4018/IJDCF.2015010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuoAT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LongLP15, author = {Min Long and Yan Liu and Fei Peng}, title = {A Semi-Fragile Reversible Watermarking for 2D {CAD} Engineering Graphics with Accurate Tampering Localization}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {3}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.4018/ijdcf.2015070101}, doi = {10.4018/IJDCF.2015070101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LongLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ManimuruganN15, author = {Manimurugan Shanmuganathan and C. Narmatha}, title = {Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with {LS} Compressions}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {1}, pages = {26--50}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015010102}, doi = {10.4018/IJDCF.2015010102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ManimuruganN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MireDMP15, author = {Archana V. Mire and Sanjay B. Dhok and Narendra J. Mistry and Prakash D. Porey}, title = {Localization of Tampering Created with Facebook Images by Analyzing Block Factor Histogram Voting}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {4}, pages = {33--54}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015100103}, doi = {10.4018/IJDCF.2015100103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MireDMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PratBL15, author = {Lionel Prat and Cheryl Baker and Nhien{-}An Le{-}Khac}, title = {MapExif: An Image Scanning and Mapping Tool for Investigators}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {2}, pages = {53--78}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015040104}, doi = {10.4018/IJDCF.2015040104}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PratBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SagheerA15, author = {Ali Makki Sagheer and Laith Hamid Abed}, title = {Visual Secret Sharing Without Pixel Expansion}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {2}, pages = {20--30}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015040102}, doi = {10.4018/IJDCF.2015040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SagheerA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TongYY15, author = {Yi Jie Tong and Wei Qi Yan and Jin Yu}, title = {Analysis of a Secure Virtual Desktop Infrastructure System}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {1}, pages = {69--84}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015010104}, doi = {10.4018/IJDCF.2015010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TongYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WanHLHZZM15, author = {Xuejiao Wan and Jingsha He and Gongzheng Liu and Na Huang and Xingye Zhu and Bin Zhao and Yonghao Mai}, title = {Survey of Digital Forensics Technologies and Tools for Android based Intelligent Devices}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {1}, pages = {1--25}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015010101}, doi = {10.4018/IJDCF.2015010101}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WanHLHZZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangZZ15, author = {Nana Wang and Xiangjun Zhao and Han Zhang}, title = {Block-based Reversible Fragile Watermarking for 2D Vector Map Authentication}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {3}, pages = {60--80}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015070104}, doi = {10.4018/IJDCF.2015070104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangLW15, author = {Fan Zhang and Zhenghui Liu and Hongxia Wang}, title = {A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform}, journal = {Int. J. Digit. Crime Forensics}, volume = {7}, number = {3}, pages = {19--36}, year = {2015}, url = {https://doi.org/10.4018/IJDCF.2015070102}, doi = {10.4018/IJDCF.2015070102}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BhaleraoR14, author = {Abhir Bhalerao and Gregory Reynolds}, title = {Ruler Detection for Autoscaling Forensic Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {1}, pages = {9--27}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014010102}, doi = {10.4018/IJDCF.2014010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/BhaleraoR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChandranY14, author = {Rahul Chandran and Wei Qi Yan}, title = {Attack Graph Analysis for Network Anti-Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {1}, pages = {28--50}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014010103}, doi = {10.4018/IJDCF.2014010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChandranY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GaoG14, author = {Lin Gao and Tiegang Gao}, title = {A Novel Medical Image Tamper Detection and Recovery Scheme using {LSB} Embedding and {PWLCM}}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {2}, pages = {1--22}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014040101}, doi = {10.4018/IJDCF.2014040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GaoG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuanWL14, author = {Yu Guan and Xingjie Wei and Chang{-}Tsun Li}, title = {On the Generalization Power of Face and Gait in Gender Recognition}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {1}, pages = {1--8}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014010101}, doi = {10.4018/IJDCF.2014010101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuanWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HanQFZ14, author = {Xiyu Han and Zhenxing Qian and Guorui Feng and Xinpeng Zhang}, title = {Reversible Data Hiding in Encrypted Images Based on Image Interpolation}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {3}, pages = {16--29}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014070102}, doi = {10.4018/IJDCF.2014070102}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/HanQFZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuZY14, author = {Xiaocheng Hu and Weiming Zhang and Nenghai Yu}, title = {Optimizing Non-Local Pixel Predictors for Reversible Data Hiding}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {3}, pages = {1--15}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014070101}, doi = {10.4018/IJDCF.2014070101}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiCL14, author = {Jia{-}Hong Li and Tzungher Chen and Wei{-}Bin Lee}, title = {Tattooing Attack: {A} New Type of Watermarking Attacks on Image Authentication}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {3}, pages = {30--46}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014070103}, doi = {10.4018/IJDCF.2014070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PhongY14, author = {Chiem Trieu Phong and Wei Qi Yan}, title = {An Overview of Penetration Testing}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {4}, pages = {50--74}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014100104}, doi = {10.4018/IJDCF.2014100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PhongY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SekharS14, author = {Resmi Sekhar and Shaji Ramaswamy Swarnammal}, title = {A Methodological Review on Copy-Move Forgery Detection for Image Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {4}, pages = {34--49}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014100103}, doi = {10.4018/IJDCF.2014100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SekharS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShangYWX14, author = {Yueyun Shang and Dengpan Ye and Zhuo Wei and Yajuan Xie}, title = {GPU-Based {MPEG-2} to Secure Scalable Video Transcoding}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {2}, pages = {52--69}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014040104}, doi = {10.4018/IJDCF.2014040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ShangYWX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShengGZ14, author = {Guorui Sheng and Tiegang Gao and Shun Zhang}, title = {Detection of Content-Aware Image Resizing for Forensic Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {2}, pages = {23--39}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014040102}, doi = {10.4018/IJDCF.2014040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ShengGZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TangMZY14, author = {Qi Tang and Guoli Ma and Weiming Zhang and Nenghai Yu}, title = {Reversible Data Hiding for {DNA} Sequences and Its Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {4}, pages = {1--13}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014100101}, doi = {10.4018/IJDCF.2014100101}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TangMZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/XieR14, author = {Li Xie and Yanli Ren}, title = {Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {2}, pages = {40--51}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014040103}, doi = {10.4018/IJDCF.2014040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/XieR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YangG14, author = {Qunting Yang and Tiegang Gao}, title = {Robust Reversible Data Hiding Scheme Based on Gravity Center Difference}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {4}, pages = {14--33}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014100102}, doi = {10.4018/IJDCF.2014100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YangG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangG14, author = {Shun Zhang and Tiegang Gao}, title = {Visible Watermarking Scheme for Quick Response Code Based on Reversible Data Hiding}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {3}, pages = {47--63}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014070104}, doi = {10.4018/IJDCF.2014070104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangGY14, author = {Shun Zhang and Tiegang Gao and Fusheng Yang}, title = {A High Capacity Reversible Data Hiding Scheme Based on Multi-Level Integer {DWT} and Histogram Modification}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {1}, pages = {51--64}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014010104}, doi = {10.4018/IJDCF.2014010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangGY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AdeyemiRA13, author = {Adeyemi R. Ikuesan and Shukor Abd Razak and Nor Amira Nor Azhan}, title = {A Review of Current Research in Network Forensic Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {1}, pages = {1--26}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013010101}, doi = {10.4018/JDCF.2013010101}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AdeyemiRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AndriotisTMIO13, author = {Panagiotis Andriotis and Zacharias Tzermias and Anthi Mparmpaki and Sotiris Ioannidis and George C. Oikonomou}, title = {Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {4}, pages = {34--54}, year = {2013}, url = {https://doi.org/10.4018/ijdcf.2013100103}, doi = {10.4018/IJDCF.2013100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AndriotisTMIO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AuerBEUU13, author = {Stefan Auer and Alexander Bliem and Dominik Engel and Andreas Uhl and Andreas Unterweger}, title = {Bitstream-Based {JPEG} Encryption in Real-time}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {3}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013070101}, doi = {10.4018/JDCF.2013070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AuerBEUU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AzizBI13, author = {Benjamin Aziz and Clive Blackwell and Shareeful Islam}, title = {A Framework for Digital Forensics and Investigations: The Goal-Driven Approach}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {2}, pages = {1--22}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013040101}, doi = {10.4018/JDCF.2013040101}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/AzizBI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BarniFT13, author = {Mauro Barni and Marco Fontani and Benedetta Tondi}, title = {A Universal Attack Against Histogram-Based Image Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {3}, pages = {35--52}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013070103}, doi = {10.4018/JDCF.2013070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/BarniFT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/FontaniBRPB13, author = {Marco Fontani and Tiziano Bianchi and Alessia De Rosa and Alessandro Piva and Mauro Barni}, title = {A Forensic Tool for Investigating Image Forgeries}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {4}, pages = {15--33}, year = {2013}, url = {https://doi.org/10.4018/ijdcf.2013100102}, doi = {10.4018/IJDCF.2013100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/FontaniBRPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GnasigamoneyS13, author = {Selvi Salome Gnasigamoney and Manjit Singh Sidhu}, title = {E-Behaviour Trends and Patterns among Malaysian Pre-Adolescents and Adolescents}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {2}, pages = {50--62}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013040104}, doi = {10.4018/JDCF.2013040104}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GnasigamoneyS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KaravarsamisNBP13, author = {Sotiris Karavarsamis and Nikos Ntarmos and Konstantinos Blekas and Ioannis Pitas}, title = {Detecting Pornographic Images by Localizing Skin ROIs}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {1}, pages = {39--53}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013010103}, doi = {10.4018/JDCF.2013010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/KaravarsamisNBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuW13, author = {Zhenghui Liu and Hongxia Wang}, title = {A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in {DCT} Domain}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {3}, pages = {15--34}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013070102}, doi = {10.4018/JDCF.2013070102}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LongW13, author = {Min Long and Hao Wang}, title = {Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {2}, pages = {23--34}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013040102}, doi = {10.4018/JDCF.2013040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LongW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LuYX13, author = {Laijie Lu and Gaobo Yang and Ming Xia}, title = {Anti-Forensics for Unsharp Masking Sharpening in Digital Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {3}, pages = {53--65}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013070104}, doi = {10.4018/JDCF.2013070104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LuYX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MartinOJ13, author = {Thomas Anthony Martin and Laurence O'Toole and Andrew Jones}, title = {On the Reliability of Cryptopometry}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {1}, pages = {27--38}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013010102}, doi = {10.4018/JDCF.2013010102}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MartinOJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PanagakisK13, author = {Yannis Panagakis and Constantine Kotropoulos}, title = {Telephone Handset Identification by Collaborative Representations}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {4}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.4018/ijdcf.2013100101}, doi = {10.4018/IJDCF.2013100101}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PanagakisK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengZL13, author = {Fei Peng and Xiao{-}wen Zhu and Min Long}, title = {An Effective Selective Encryption Scheme for {H.264} Video based on Chaotic Qi System}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {2}, pages = {35--49}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013040103}, doi = {10.4018/JDCF.2013040103}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PengZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShebaroPC13, author = {Bilal Shebaro and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Jedidiah R. Crandall}, title = {Exploiting Geometrical Structure for Forensic Applications of Timing Inference Channels}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {1}, pages = {54--69}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013010104}, doi = {10.4018/JDCF.2013010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ShebaroPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/alZahirI13, author = {Saif alZahir and Md Wahedul Islam}, title = {Audio Watermarking Scheme Using IMFs and {HHT} for Forensic Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {4}, pages = {55--67}, year = {2013}, url = {https://doi.org/10.4018/ijdcf.2013100104}, doi = {10.4018/IJDCF.2013100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/alZahirI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/BattenPK12, author = {Lynn Margaret Batten and Lei Pan and Nisar Khan}, title = {Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {1--14}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100101}, doi = {10.4018/JDCF.2012100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/BattenPK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenLN12, author = {Likai Chen and Wei Lu and Jiangqun Ni}, title = {An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {49--62}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010104}, doi = {10.4018/JDCF.2012010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GidwaniAYI12, author = {T. Gidwani and M. J. Argano and Wei{-}Qi Yan and F. Issa}, title = {A Comprehensive Survey of Event Analytics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {33--46}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070103}, doi = {10.4018/JDCF.2012070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GidwaniAYI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GrisposSG12, author = {George Grispos and Tim Storer and William Bradley Glisson}, title = {Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {28--48}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040103}, doi = {10.4018/JDCF.2012040103}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/GrisposSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Grobler12, author = {Marthie Grobler}, title = {The Need for Digital Evidence Standardisation}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {1--12}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040101}, doi = {10.4018/JDCF.2012040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Grobler12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HaggertyCHT12, author = {John Haggerty and Mark C. Casson and Sheryllynne Haggerty and Mark John Taylor}, title = {A Framework for the Forensic Analysis of User Interaction with Social Media}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {15--30}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100102}, doi = {10.4018/JDCF.2012100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HaggertyCHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HayatiP12, author = {Pedram Hayati and Vidyasagar M. Potdar}, title = {Spam 2.0 State of the Art}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {17--36}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010102}, doi = {10.4018/JDCF.2012010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HayatiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuLWL12, author = {Yongjian Hu and Chang{-}Tsun Li and Yufei Wang and Bei{-}Bei Liu}, title = {An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {20--32}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070102}, doi = {10.4018/JDCF.2012070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuLWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Ishihara12, author = {Shunichi Ishihara}, title = {Probabilistic Evaluation of {SMS} Messages as Forensic Evidence: Likelihood Ratio Based Approach with Lexical Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {47--57}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070104}, doi = {10.4018/JDCF.2012070104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Ishihara12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LempereurMS12, author = {Brett Lempereur and Madjid Merabti and Qi Shi}, title = {Pypette: {A} Platform for the Evaluation of Live Digital Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {31--46}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100103}, doi = {10.4018/JDCF.2012100103}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/LempereurMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MarcialisCR12, author = {Gian Luca Marcialis and Pietro Coli and Fabio Roli}, title = {Fingerprint Liveness Detection Based on Fake Finger Characteristics}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {3}, pages = {1--19}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012070101}, doi = {10.4018/JDCF.2012070101}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MarcialisCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengLL12, author = {Fei Peng and Juan Liu and Min Long}, title = {Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {1--16}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010101}, doi = {10.4018/JDCF.2012010101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PengLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SunLYS12, author = {Wei Sun and Zhe{-}Ming Lu and Fa{-}Xin Yu and Rong{-}Jun Shen}, title = {Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based Audio Retrieval}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {49--69}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040104}, doi = {10.4018/JDCF.2012040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SunLYS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/VlachopoulosMC12, author = {Konstantinos Vlachopoulos and Emmanouil Magkos and Vassilios Chrissikopoulos}, title = {A Model for Hybrid Evidence Investigation}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {4}, pages = {47--62}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012100104}, doi = {10.4018/JDCF.2012100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/VlachopoulosMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangNWZ12, author = {Chang Wang and Jiangqun Ni and Chuntao Wang and Ruiyu Zhang}, title = {An Adaptive {JPEG} Steganographic Scheme Based on the Block Entropy of {DCT} Coefficients}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {2}, pages = {13--27}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012040102}, doi = {10.4018/JDCF.2012040102}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WangNWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YuSZNC12, author = {Lifang Yu and Yun Q. Shi and Yao Zhao and Rongrong Ni and Gang Cao}, title = {A Study on Embedding Efficiency of Matrix Encoding}, journal = {Int. J. Digit. Crime Forensics}, volume = {4}, number = {1}, pages = {37--48}, year = {2012}, url = {https://doi.org/10.4018/jdcf.2012010103}, doi = {10.4018/JDCF.2012010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YuSZNC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AbouzakharCC11, author = {Nasser Abouzakhar and Huankai Chen and Bruce Christianson}, title = {An Enhanced Fuzzy {ARM} Approach for Intrusion Detection}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {2}, pages = {41--61}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011040104}, doi = {10.4018/JDCF.2011040104}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AbouzakharCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AnandJW11, author = {Sarabjot Singh Anand and Arshad Jhumka and Kimberley Wade}, title = {Towards the Ordering of Events from Multiple Textual Evidence Sources}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {2}, pages = {16--34}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011040102}, doi = {10.4018/JDCF.2011040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AnandJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuruNMD11, author = {Devanur S. Guru and K. B. Nagasundara and S. Manjunath and R. Dinesh}, title = {An Approach for Hand Vein Representation and Indexing}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {2}, pages = {1--15}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011040101}, doi = {10.4018/JDCF.2011040101}, timestamp = {Sat, 25 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GuruNMD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HaggertyKLT11, author = {John Haggerty and Alexander John Karran and David J. Lamb and Mark John Taylor}, title = {A Framework for the Forensic Investigation of Unstructured Email Relationship Data}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {3}, pages = {1--18}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011070101}, doi = {10.4018/JDCF.2011070101}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/HaggertyKLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuLZL11, author = {Yongjian Hu and Chang{-}Tsun Li and Changhui Zhou and Xufeng Lin}, title = {Source Camera Identification Issues: Forensic Features Selection and Robustness}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {4}, pages = {1--15}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011100101}, doi = {10.4018/JDCF.2011100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuLZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KalajdzicPT11, author = {Kenan Kalajdzic and Ahmed Patel and Mona Taghavi}, title = {Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {3}, pages = {50--60}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011070104}, doi = {10.4018/JDCF.2011070104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/KalajdzicPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MagklarasFP11, author = {George Magklaras and Steven Furnell and Maria Papadaki}, title = {{LUARM:} An Audit Engine for Insider Misuse Detection}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {3}, pages = {37--49}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011070103}, doi = {10.4018/JDCF.2011070103}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MagklarasFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MichalasKP11, author = {Antonis Michalas and Nikos Komninos and Neeli R. Prasad}, title = {Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {1}, pages = {14--36}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011010102}, doi = {10.4018/JDCF.2011010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MichalasKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengL11, author = {Fei Peng and Yu{-}Zhou Lei}, title = {An Effective Reversible Watermarking for 2D {CAD} Engineering Graphics Based on Improved {QIM}}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {1}, pages = {53--69}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011010104}, doi = {10.4018/JDCF.2011010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PengL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PengL11a, author = {Fei Peng and Honglin Li}, title = {A Steganalysis Method for 2D Engineering Graphics Based on the Statistic of Geometric Features}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {2}, pages = {35--40}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011040103}, doi = {10.4018/JDCF.2011040103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PengL11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SoobhanLL11, author = {Ahmad Ryad Soobhany and Richard Leary and K. P. Lam}, title = {On the Performance of Li's Unsupervised Image Classifier and the Optimal Cropping Position of Images for Forensic Investigations}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {1}, pages = {1--13}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011010101}, doi = {10.4018/JDCF.2011010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SoobhanLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SpyridopoulosK11, author = {Theodoros Spyridopoulos and Vasilios Katos}, title = {Requirements for a Forensically Ready Cloud Storage Service}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {3}, pages = {19--36}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011070102}, doi = {10.4018/JDCF.2011070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SpyridopoulosK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TiwariM11, author = {Rajesh Kumar Tiwari and G. Sahoo Mesra}, title = {Microsoft Power Point Files: {A} Secure Steganographic Carrier}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {4}, pages = {16--28}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011100102}, doi = {10.4018/JDCF.2011100102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TiwariM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TiwariS11, author = {Rajesh Kumar Tiwari and G. Sahoo Mesra}, title = {Microsoft Excel File: {A} Steganographic Carrier File}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {1}, pages = {37--52}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011010103}, doi = {10.4018/JDCF.2011010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TiwariS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YangL11, author = {Chun{-}Ning Yang and Zhe{-}Ming Lu}, title = {A Blind Image Watermarking Scheme Utilizing {BTC} Bitplanes}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {4}, pages = {42--53}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011100104}, doi = {10.4018/JDCF.2011100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/YangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZaharisMTIP11, author = {Alexandros Zaharis and Adamantini Martini and Theo Tryfonas and Christos Ilioudis and George Pangalos}, title = {Lightweight Steganalysis Based on Image Reconstruction and Lead Digit Distribution Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {3}, number = {4}, pages = {29--41}, year = {2011}, url = {https://doi.org/10.4018/jdcf.2011100103}, doi = {10.4018/JDCF.2011100103}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZaharisMTIP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AmeriniCCPP10, author = {Irene Amerini and Roberto Caldelli and Vito Cappellini and Francesco Picchioni and Alessandro Piva}, title = {Estimate of {PRNU} Noise Based on Different Noise Models for Source Camera Identification}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {21--33}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040102}, doi = {10.4018/JDCF.2010040102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AmeriniCCPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CaldelliAP10, author = {Roberto Caldelli and Irene Amerini and Francesco Picchioni}, title = {A DFT-Based Analysis to Discern Between Camera and Scanned Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {21--29}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010102}, doi = {10.4018/JDCF.2010010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CaldelliAP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChennammaR10, author = {H. R. Chennamma and Lalitha Rangarajan}, title = {Source Camera Identification Based on Sensor Readout Noise}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {28--42}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070103}, doi = {10.4018/JDCF.2010070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChennammaR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/CurranRPC10, author = {Kevin Curran and Andrew Robinson and Stephen Peacocke and Sean Cassidy}, title = {Mobile Phone Forensic Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {15--27}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070102}, doi = {10.4018/JDCF.2010070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/CurranRPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/DavisS10, author = {Michael Davis and Alice Sedsman}, title = {Grey Areas - The Legal Dimensions of Cloud Computing}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {30--39}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010103}, doi = {10.4018/JDCF.2010010103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/DavisS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Edmond10, author = {Gary Edmond}, title = {Suspect sciences? Evidentiary Problems with Emerging Technologies}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {40--72}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010104}, doi = {10.4018/JDCF.2010010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Edmond10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HaltisSB10, author = {Kosta Haltis and Matthew Sorell and Russell S. A. Brinkworth}, title = {A Biologically Inspired Smart Camera for Use in Surveillance Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {1--14}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070101}, doi = {10.4018/JDCF.2010070101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HaltisSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KwittMU10, author = {Roland Kwitt and Peter Meerwald and Andreas Uhl}, title = {Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {34--46}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040103}, doi = {10.4018/JDCF.2010040103}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/KwittMU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LaadjelBKY10, author = {Moussadek Laadjel and Ahmed Bouridane and Fatih Kurugollu and WeiQi Yan}, title = {Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {1--15}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100101}, doi = {10.4018/JDCF.2010100101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LaadjelBKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiR10, author = {Qiming Li and Sujoy Roy}, title = {Secure Robust Hash Functions and Their Applications in Non-interactive Communications}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {51--62}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100104}, doi = {10.4018/JDCF.2010100104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiuLZYL10, author = {Jin Liu and Hefei Ling and Fuhao Zou and WeiQi Yan and Zhengding Lu}, title = {Digital Image Forensics Using Multi-Resolution Histograms}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {37--50}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100103}, doi = {10.4018/JDCF.2010100103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiuLZYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MatamL10, author = {B. R. Matam and David Lowe}, title = {Watermark-Only Security Attack on {DM-QIM} Watermarking: Vulnerability to Guided Key Guessing}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {64--87}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040105}, doi = {10.4018/JDCF.2010040105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MatamL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/McGrathGC10, author = {Niall McGrath and Pavel Gladyshev and Joe Carthy}, title = {Cryptopometry as a Methodology for Investigating Encrypted Material}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {1}, pages = {1--20}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010010101}, doi = {10.4018/JDCF.2010010101}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/McGrathGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/NiuKZ10, author = {Yaqing Niu and Sridhar Krishnan and Qin Zhang}, title = {Spatio-Temporal Just Noticeable Distortion Model Guided Video Watermarking}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {16--36}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100102}, doi = {10.4018/JDCF.2010100102}, timestamp = {Sun, 19 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/NiuKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SamphaiboonD10, author = {Natthawut Samphaiboon and Matthew M. Dailey}, title = {Steganography in Thai Text}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {3}, pages = {43--64}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010070104}, doi = {10.4018/JDCF.2010070104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SamphaiboonD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WeirLY10, author = {Jonathan Weir and Raymond Lau and WeiQi Yan}, title = {Digital Image Splicing Using Edges}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {4}, pages = {63--75}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010100105}, doi = {10.4018/JDCF.2010100105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/WeirLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Zarri10, author = {Gian Piero Zarri}, title = {A Conceptual Methodology for Dealing with Terrorism "Narratives"}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {47--63}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040104}, doi = {10.4018/JDCF.2010040104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Zarri10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhaoHS10, author = {Xi Zhao and Anthony Tung Shuen Ho and Yun Q. Shi}, title = {Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking}, journal = {Int. J. Digit. Crime Forensics}, volume = {2}, number = {2}, pages = {1--20}, year = {2010}, url = {https://doi.org/10.4018/jdcf.2010040101}, doi = {10.4018/JDCF.2010040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhaoHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChenDW09, author = {Yan Chen and Xiaoqing Ding and Patrick S. P. Wang}, title = {Dynamic Structural Statistical Model Based Online Signature Verification}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {3}, pages = {21--41}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009070102}, doi = {10.4018/JDCF.2009070102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChenDW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChennammaRR09, author = {H. R. Chennamma and Lalitha Rangarajan and M. S. Rao}, title = {Robust Near Duplicate Image Matching for Digital Image Forensics}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {3}, pages = {62--79}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009070104}, doi = {10.4018/JDCF.2009070104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChennammaRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Eggendorfer09, author = {Tobias Eggendorfer}, title = {Methods to Identify Spammers}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {2}, pages = {55--68}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009040105}, doi = {10.4018/JDCF.2009040105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Eggendorfer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Garfinkel09, author = {Simson L. Garfinkel}, title = {Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {1}, pages = {1--28}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009010101}, doi = {10.4018/JDCF.2009010101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Garfinkel09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GottschalkK09, author = {Petter Gottschalk and Ragnar Kristoffersen}, title = {Understanding the Process of Online Grooming: The Behavior of Men who Target Young People Online in Norway}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {4}, pages = {1--18}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009062401}, doi = {10.4018/JDCF.2009062401}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/GottschalkK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/GuptaP09, author = {Gaurav Gupta and Josef Pieprzyk}, title = {Reversible and Blind Database Watermarking Using Difference Expansion}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {2}, pages = {42--54}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009040104}, doi = {10.4018/JDCF.2009040104}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/GuptaP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Jin09, author = {Hongxia Jin}, title = {Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {1}, pages = {59--74}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009010104}, doi = {10.4018/JDCF.2009010104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Jin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Ker09, author = {Andrew D. Ker}, title = {Locally Square Distortion and Batch Steganographic Capacity}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {1}, pages = {29--44}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009010102}, doi = {10.4018/JDCF.2009010102}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Ker09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiL09, author = {Chang{-}Tsun Li and Yue Li}, title = {Medical Images Authentication through Repetitive Index Modulation Based Watermarking}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {4}, pages = {32--39}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009062403}, doi = {10.4018/JDCF.2009062403}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/LiLW09, author = {Chang{-}Tsun Li and Yue Li and Chia{-}Hung Wei}, title = {Protection of Digital Mammograms on PACSs Using Data Hiding Techniques}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {1}, pages = {75--88}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009010105}, doi = {10.4018/JDCF.2009010105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/LiLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/MaioranaCN09, author = {Emanuele Maiorana and Patrizio Campisi and Alessandro Neri}, title = {Template Protection and Renewability for Dynamic Time Warping Based Biometric Signature Verification}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {4}, pages = {40--57}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009062404}, doi = {10.4018/JDCF.2009062404}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/MaioranaCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/NilssonL09, author = {Dennis K. Nilsson and Ulf Larson}, title = {Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {2}, pages = {28--41}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009040103}, doi = {10.4018/JDCF.2009040103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/NilssonL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PoursoltanmohammadiS09, author = {Amirsaman Poursoltanmohammadi and Matthew Sorell}, title = {Reliable Motion Detection, Location and Audit in Surveillance Video}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {4}, pages = {19--31}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009062402}, doi = {10.4018/JDCF.2009062402}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/PoursoltanmohammadiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Ridder09, author = {Chris K. Ridder}, title = {Evidentiary Implications of Potential Security Weaknesses in Forensic Software}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {3}, pages = {80--91}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009070105}, doi = {10.4018/JDCF.2009070105}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Ridder09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SablatnigLGC09, author = {Jan Sablatnig and Fritz Lehmann{-}Grube and Sven Grottke and Sabine Cikic}, title = {Dealing with Multiple Truths in Online Virtual Worlds}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {2}, pages = {69--82}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009040106}, doi = {10.4018/JDCF.2009040106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SablatnigLGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SavoldiG09, author = {Antonio Savoldi and Paolo Gubian}, title = {Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {3}, pages = {42--61}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009070103}, doi = {10.4018/JDCF.2009070103}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SavoldiG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/SlayS09, author = {Jill Slay and Matthew Simon}, title = {Voice Over {IP:} Privacy and Forensic Implications}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {1}, pages = {89--101}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009010106}, doi = {10.4018/JDCF.2009010106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/SlayS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Sorell09, author = {Matthew Sorell}, title = {Unexpected Artifacts in a Digital Photograph}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {1}, pages = {45--58}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009010103}, doi = {10.4018/JDCF.2009010103}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Sorell09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Sorell09a, author = {Matthew Sorell}, title = {Conditions for Effective Detection and Identification of Primary Quantisation of Re-Quantized {JPEG} Images}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {2}, pages = {13--27}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009040102}, doi = {10.4018/JDCF.2009040102}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Sorell09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Steel09, author = {Chad M. S. Steel}, title = {Web-Based Child Pornography: Quantification and Qualification of Demand}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {4}, pages = {58--69}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009062405}, doi = {10.4018/JDCF.2009062405}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Steel09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Willassen09, author = {Svein Yngvar Willassen}, title = {A Model Based Approach to Timestamp Evidence Interpretation}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {2}, pages = {1--12}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009040101}, doi = {10.4018/JDCF.2009040101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/Willassen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhangCCYW09, author = {Chengcui Zhang and Xin Chen and Wei{-}bang Chen and Lin Yang and Gary Warner}, title = {Spam Image Clustering for Identifying Common Sources of Unsolicited Emails}, journal = {Int. J. Digit. Crime Forensics}, volume = {1}, number = {3}, pages = {1--20}, year = {2009}, url = {https://doi.org/10.4018/jdcf.2009070101}, doi = {10.4018/JDCF.2009070101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhangCCYW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.