Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijdcf/ijdcf15.bht:"
@article{DBLP:journals/ijdcf/ChengQWW23, author = {Shi Cheng and Yan Qu and Chuyue Wang and Jie Wan}, title = {Assurance of Network Communication Information Security Based on Cyber-Physical Fusion and Deep Learning}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--18}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.332858}, doi = {10.4018/IJDCF.332858}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ChengQWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/KumarSKS23, author = {Vijay Kumar and Sahil Sharma and Chandan Kumar and Aditya Kumar Sahu}, title = {Latest Trends in Deep Learning Techniques for Image Steganography}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.318666}, doi = {10.4018/IJDCF.318666}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/KumarSKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/NichoAAMI23, author = {Mathew Nicho and Maha Alblooki and Saeed AlMutiwei and Christopher D. McDermott and Olufemi Ilesanmi}, title = {A Crime Scene Reconstruction for Digital Forensic Analysis: An {SUV} Case Study}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--20}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.327358}, doi = {10.4018/IJDCF.327358}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/NichoAAMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/PanZLSYZ23, author = {Heng Pan and Yaoyao Zhang and Jianmei Liu and Xueming Si and Zhongyuan Yao and Liang Zhao}, title = {{MD-S3C3:} {A} Medical Data Secure Sharing Scheme With Cloud and Chain Cooperation}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.329219}, doi = {10.4018/IJDCF.329219}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/PanZLSYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangDH23, author = {Suzhen Wang and Yongchen Deng and Zhongbo Hu}, title = {Task Offloading in Cloud-Edge Environments: {A} Deep-Reinforcement-Learning-Based Solution}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--23}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.332066}, doi = {10.4018/IJDCF.332066}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/WangXXSSC23, author = {Wei Wang and Longxing Xing and Na Xu and Jiatao Su and Wenting Su and Jiarong Cao}, title = {{UAV} Edge Caching Content Recommendation Algorithm Based on Graph Neural Network}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.332774}, doi = {10.4018/IJDCF.332774}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/WangXXSSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/YaoJY23, author = {Wenjun Yao and Ying Jiang and Yang Yang}, title = {The Metric for Automatic Code Generation Based on Dynamic Abstract Syntax Tree}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--20}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.325062}, doi = {10.4018/IJDCF.325062}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/YaoJY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/Zhang23, author = {Dawei Zhang}, title = {Abnormality Retrieval Method of Laboratory Surveillance Video Based on Deep Automatic Encoder}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.325224}, doi = {10.4018/IJDCF.325224}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ZhuY23, author = {Yuwen Zhu and Lei Yu}, title = {Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology}, journal = {Int. J. Digit. Crime Forensics}, volume = {15}, number = {1}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.4018/ijdcf.317100}, doi = {10.4018/IJDCF.317100}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ZhuY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.