From post

Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings

, и (Ред.) том 5158 из Lecture Notes in Computer Science, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing the effectiveness of Web Application Firewalls by generic feature selection., , , , и . Logic Journal of the IGPL, 21 (4): 560-570 (2013)Improving Effectiveness of Intrusion Detection by Correlation Feature Selection., , и . IJMCMC, 3 (1): 21-34 (2011)Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy., и . Int. J. Hybrid Intell. Syst., 13 (1): 15-26 (2016)A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications., и . IWANN (2), том 9095 из Lecture Notes in Computer Science, стр. 549-563. Springer, (2015)Computational Forensics: An Overview., и . IWCF, том 5158 из Lecture Notes in Computer Science, стр. 1-10. Springer, (2008)Stroke-Morphology Analysis Using Super-Imposed Writing Movements.. IWCF, том 5158 из Lecture Notes in Computer Science, стр. 204-217. Springer, (2008)Quantifying data volatility for IoT forensics with examples from Contiki OS., , , и . Digit. Investig., 40 (Supplement): 301343 (2022)Legal and technical questions of file system reverse engineering., , , , , и . Comput. Law Secur. Rev., (2022)Network Security Systems Log Analysis for Trends and Insights: A Case Study., , , , и . IEEE ANTS, стр. 1-6. IEEE, (2020)Computational Forensics: Towards Hybrid-Intelligent Crime Investigation., и . IAS, стр. 383-386. IEEE Computer Society, (2007)