共 50 条
- [31] On the Security of Image Manipulation Forensics ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2015, PT I, 2015, 9314 : 97 - 105
- [32] It security forensics: Promises and shortcomings ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS17 - IS17
- [33] IT security forensics: Promises and shortcomings WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS17 - IS17
- [35] Wi-Fi network signals as a source of digital evidence: Wireless network forensics ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1355 - 1360
- [38] It security forensics: Promises and shortcomings SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : IS17 - IS17
- [39] Research on Metaverse Security and Forensics CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 799 - 825
- [40] IT security forensics: Promises and shortcomings SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS17 - IS17