Search dblp for Publications

export results for "toc:db/journals/ijdcf/ijdcf15.bht:"

 download as .bib file

@article{DBLP:journals/ijdcf/ChengQWW23,
  author       = {Shi Cheng and
                  Yan Qu and
                  Chuyue Wang and
                  Jie Wan},
  title        = {Assurance of Network Communication Information Security Based on Cyber-Physical
                  Fusion and Deep Learning},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--18},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.332858},
  doi          = {10.4018/IJDCF.332858},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ChengQWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/KumarSKS23,
  author       = {Vijay Kumar and
                  Sahil Sharma and
                  Chandan Kumar and
                  Aditya Kumar Sahu},
  title        = {Latest Trends in Deep Learning Techniques for Image Steganography},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.318666},
  doi          = {10.4018/IJDCF.318666},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/KumarSKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/NichoAAMI23,
  author       = {Mathew Nicho and
                  Maha Alblooki and
                  Saeed AlMutiwei and
                  Christopher D. McDermott and
                  Olufemi Ilesanmi},
  title        = {A Crime Scene Reconstruction for Digital Forensic Analysis: An {SUV}
                  Case Study},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--20},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.327358},
  doi          = {10.4018/IJDCF.327358},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/NichoAAMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/PanZLSYZ23,
  author       = {Heng Pan and
                  Yaoyao Zhang and
                  Jianmei Liu and
                  Xueming Si and
                  Zhongyuan Yao and
                  Liang Zhao},
  title        = {{MD-S3C3:} {A} Medical Data Secure Sharing Scheme With Cloud and Chain
                  Cooperation},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.329219},
  doi          = {10.4018/IJDCF.329219},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/PanZLSYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangDH23,
  author       = {Suzhen Wang and
                  Yongchen Deng and
                  Zhongbo Hu},
  title        = {Task Offloading in Cloud-Edge Environments: {A} Deep-Reinforcement-Learning-Based
                  Solution},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--23},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.332066},
  doi          = {10.4018/IJDCF.332066},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/WangXXSSC23,
  author       = {Wei Wang and
                  Longxing Xing and
                  Na Xu and
                  Jiatao Su and
                  Wenting Su and
                  Jiarong Cao},
  title        = {{UAV} Edge Caching Content Recommendation Algorithm Based on Graph
                  Neural Network},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.332774},
  doi          = {10.4018/IJDCF.332774},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/WangXXSSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/YaoJY23,
  author       = {Wenjun Yao and
                  Ying Jiang and
                  Yang Yang},
  title        = {The Metric for Automatic Code Generation Based on Dynamic Abstract
                  Syntax Tree},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--20},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.325062},
  doi          = {10.4018/IJDCF.325062},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/YaoJY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/Zhang23,
  author       = {Dawei Zhang},
  title        = {Abnormality Retrieval Method of Laboratory Surveillance Video Based
                  on Deep Automatic Encoder},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.325224},
  doi          = {10.4018/IJDCF.325224},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ZhuY23,
  author       = {Yuwen Zhu and
                  Lei Yu},
  title        = {Key Node Identification Based on Vulnerability Life Cycle and the
                  Importance of Network Topology},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {15},
  number       = {1},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.4018/ijdcf.317100},
  doi          = {10.4018/IJDCF.317100},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ZhuY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics