Privileged Data Within Digital Evidence
暂无分享,去创建一个
[1] M. E. Maron,et al. An evaluation of retrieval effectiveness for a full-text document-retrieval system , 1985, CACM.
[2] M. Tahar Kechadi,et al. Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications , 2014, IWCF.
[3] Mark Scanlon. Battling the digital forensic backlog through data deduplication , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[4] M. Tahar Kechadi,et al. Grid-Based Approaches for Distributed Data Mining Applications , 2009, ArXiv.
[5] M. Tahar Kechadi,et al. A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets , 2010, ADMA.
[6] Nhien-An Le-Khac,et al. Privacy Preserving Internet Browsers: Forensic Analysis of Browzar , 2017, Computer and Network Security Essentials.
[7] David Lillis,et al. On the Benefits of Information Retrieval and Information Extraction Techniques Applied to Digital Forensics , 2016, MUE 2016.
[8] Zhaohui Wu,et al. Advanced Data Mining and Applications , 2013, Lecture Notes in Computer Science.
[9] Nhien-An Le-Khac,et al. A Bespoke Forensics GIS Tool , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[10] Simson L. Garfinkel,et al. Digital forensics research: The next 10 years , 2010, Digit. Investig..