Finding Needle in the Case-Stack: Effective Remote Monitoring of Courts
暂无分享,去创建一个
Fareed Zaffar | Muhammad Adeel Zaffar | Amn Rahman | Hassan Nawaz | Omer Naeem | Farooq Naseer | Fareed Zaffar | M. Zaffar | Farooq Naseer | A. Rahman | Hassan Nawaz | Omer Naeem
[1] Gregory Silverman,et al. Rise of the Machines: Justice Information Systems and the Question of Public Access to Court Records over the Internet , 2004 .
[2] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[3] Antonio Cordella,et al. Information system and information infrastructure deployment: the challenge of the Italian e-justice approach , 2004, ECIS.
[4] Mark Burdon,et al. Ensuring the integrity of the E-court process , 2006 .
[5] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[6] Marco Velicogna,et al. Justice systems and ICT What can be learned from Europe , 2007 .
[7] Saurabh Bagchi,et al. Collaborative intrusion detection system (CIDS): a framework for accurate and efficient IDS , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[8] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[9] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[10] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.