Uncovering Limitations of E01 Self-Verifying Files
暂无分享,去创建一个
[1] Tim Berners-Lee,et al. Creating a Policy-Aware Web: Discretionary, Rule-Based Access for the World Wide Web , 2008 .
[2] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[3] R.E. Wilson. Outage Analysis and Maintenance Strategies in Hydroelectric Production , 2015 .
[4] Eoghan Casey,et al. Handbook of Digital Forensics and Investigation , 2009 .
[5] Wenbing Zhao. Enhancing the Resiliency of Smart Grid Monitoring and Control , 2018 .
[6] Michael D. Myers,et al. A classification scheme for interpretive research in information systems , 2001 .
[7] Brian W. Hollocks. Qualitative Research in IS: Issues and Trends , 2002, Eur. J. Inf. Syst..
[8] D. Deepak,et al. Information Systems on Hesitant Fuzzy Sets , 2016, Int. J. Rough Sets Data Anal..
[9] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[10] Martin Boldt,et al. Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies , 2019, Int. J. Inf. Secur. Priv..
[11] Alok Kumar Shukla,et al. Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection , 2019, Int. J. Inf. Secur. Priv..
[12] Eoghan Casey,et al. What does "forensically sound" really mean? , 2007, Digit. Investig..
[13] Tor Helleseth,et al. Advances in cryptology, EUROCRYPT '93 : Workshop on the Theory and Application of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993 : proceedings , 1994 .
[14] Mehdi Khosrow-Pour,et al. Printed at: , 2011 .