Discovery - Top 10
Type
Date issued
(6)
(22)
(51)
(36)
(16)
(6)
(1)
(3)
(2)
Journal/Proceeding/Conference
(1)
Language
(142)
HKU Organizations
Search
Add filters:
Use filters to refine the search results.
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Watershed segmentation with boundary curvature ratio based merging criterion Proceeding/Conference:Proceedings of the 9th IASTED International Conference on Signal and Image Processing | 2007 | 159 | ||
Time and Location Topic Model for analyzing Linkg forum data Proceeding/Conference:2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) | 2020 | 21 | ||
Rectal thermometer mediated cross-infection with Salmonella wandsworth in a paediatric ward Journal:Journal of Hospital Infection | 1981 | 109 | ||
Very Fast Telephone Directory Search using Large Memory Resident Data Structures Proceeding/Conference:Proceedings of the IASTED Conference on Software Engineering (SE'98) | 1998 | 106 | ||
A cost-effective digital forensic investigation model Proceeding/Conference:Annual IFIP WG 11.9 International Conference on Digital Forensics | 2009 | 111 | ||
The next generation for the forensic extraction of electronic evidence from mobile telephones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | 56 | ||
The cloud storage ecosystem – A new business model for internet piracy? Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2016 | 54 | ||
Validation of rules used in foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | 67 | ||
Forward-secure multisignature and blind signature schemes Journal:Applied Mathematics and Computation | 2005 | 384 | ||
Empirical evaluation of information leakage detection using net-flow analysis Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | 32 | ||
Object-based surveillance video retrieval system with real-time indexing methodology Proceeding/Conference:Lecture Notes in Computer Science | 2007 | 127 | ||
Enchanced monitoring rule through direct node query for Foxy network investigation Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | 21 | ||
Two improved partially blind signature schemes from bilinear pairings Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 100 | ||
A Forensic Logging System for Siemens Programmable Logic Controllers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2018 | 65 | ||
An analysis of the Green Dam Youth Escort software Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | 156 | ||
LCCT: a semisupervised model for sentiment classification Proceeding/Conference:Human Language Technologies: The 2015 Annual Conference of the North American Chapter of the ACL | 2015 | 76 | ||
Learning domain-specific sentiment lexicon with supervised sentiment-aware LDA Proceeding/Conference:Frontiers in Artificial Intelligence and Applications | 2014 | 42 | ||
Towards a better similarity measure for keyword profiling via clustering Proceeding/Conference:IEEE International Computer Software and Applications Conference Proceedings | 2013 | 41 | ||
K-Dimensional hashing scheme for hard disk integrity verification in computer forensics Journal:Journal of Zhejiang University: Science C | 2011 | 164 | ||
Threat analysis of an elevator control system Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2017 | 70 | ||
Secure hierarchical identity based signature and its application Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2004 | 150 | ||
Effects of motivation and demography on the quantitative plausibility of the Trojan Horse defence against possession of child pornography Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | 28 | ||
A Generic Bayesian Belief Model for Similar Cyber Crimes Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2013 | 39 | ||
Maintaining hard disk integrity with digital legal professional privilege (LPP) data Journal:IEEE Transactions on Information Forensics and Security | 2013 | 85 | ||
A generic anti-spyware solution by access control list at kernel level Journal:Journal of Systems and Software | 2005 | 117 |