|
distributed denial-of-service (ddos) |
7 |
|
intrusion detection |
7 |
|
routers |
7 |
|
testbed |
7 |
|
cryptography |
6 |
|
boundary smoothness |
5 |
|
cryptanalysis |
5 |
|
de-interlacing methods |
5 |
|
edge dependent interpolation |
5 |
|
group signature |
5 |
|
hard disk integrity |
5 |
|
merging criterion |
5 |
|
motion adaptive interpolation |
5 |
|
optimal number of segments |
5 |
|
watershed segmentation |
5 |
|
3-dimension hashing |
4 |
|
bloom filter |
4 |
|
computer forensics |
4 |
|
computer networks |
4 |
|
contour measurement |
4 |
|
database operation |
4 |
|
database systems |
4 |
|
decentralized control |
4 |
|
digital arithmetic |
4 |
|
digital forensic engineering |
4 |
|
edge detection |
4 |
|
electronic crime countermeasures |
4 |
|
forensic analysis |
4 |
|
forensic investigation |
4 |
|
homomorphic encryption |
4 |
|
indexing (of information) |
4 |
|
latent sector errors (lses) |
4 |
|
legal professional privilege (lpp) |
4 |
|
multiparty matching |
4 |
|
object-based retrieval system |
4 |
|
privacy |
4 |
|
probabilistic logics |
4 |
|
real time systems |
4 |
|
sensor networks |
4 |
|
systematic approaches |
4 |
|
text-based matching |
4 |
|
actuation |
3 |
|
applied cryptography |
3 |
|
bilinear pairings |
3 |
|
bitcoin simulation model |
3 |
|
bittorrent model |
3 |
|
blind signature |
3 |
|
chinese information processing |
3 |
|
chinese shanzhai phones |
3 |
|
chinese word extraction |
3 |
|
cloud forensics |
3 |
|
cloudfront |
3 |
|
combinatorial group testing (cgt) |
3 |
|
commutative encryption |
3 |
|
computing technology |
3 |
|
confidential forensic investigation |
3 |
|
context-aware |
3 |
|
cryptographic primitives |
3 |
|
cyber-physical system |
3 |
|
datamining |
3 |
|
deblurring |
3 |
|
deleted data |
3 |
|
digital crimes |
3 |
|
digital evidence |
3 |
|
dual cube |
3 |
|
e-lottery |
3 |
|
elliptic curve cryptosystems |
3 |
|
error rates |
3 |
|
face model |
3 |
|
face reconstruction |
3 |
|
file carving |
3 |
|
file sharing |
3 |
|
firewalls |
3 |
|
forensics technology |
3 |
|
forward security |
3 |
|
forward-secure signature |
3 |
|
goodness measure |
3 |
|
hard disk sector allocation |
3 |
|
heuristic-based address clustering |
3 |
|
hierarchical identity-based signature |
3 |
|
identity-based partially blind signature |
3 |
|
identity-based signcryption |
3 |
|
initial seeders |
3 |
|
integrity verification |
3 |
|
internet forum |
3 |
|
internet piracy |
3 |
|
internet surveillance |
3 |
|
k-dimensional hashing |
3 |
|
keyword clustering |
3 |
|
live forensics |
3 |
|
mediatek |
3 |
|
memory analysis |
3 |
|
motion estimation |
3 |
|
multisignature |
3 |
|
network security |
3 |
|
peer to peer |
3 |
|
phonebook |
3 |
|
photo forensics |
3 |
|
pose estimation |
3 |
|
privacy preserving forensics |
3 |
|
privacy-preserving multiple keyword search |
3 |
|
provable security |
3 |
|
public ciphertext authenticity |
3 |
|
public key cryptosystems |
3 |
|
public verifiability |
3 |
|
remote forensics |
3 |
|
search on encrypted data |
3 |
|
security |
3 |
|
self-defense |
3 |
|
semantical security |
3 |
|
sensitivity analysis |
3 |
|
shanzhai mobile phone |
3 |
|
similarity measure |
3 |
|
spatially varing blur kernels |
3 |
|
super-resolution |
3 |
|
tamper proofing |
3 |
|
texture mapping |
3 |
|
threshold partially blind signature |
3 |
|
tracking |
3 |
|
user profiling |
3 |
|
verifiable random function |
3 |
|
virus detection |
3 |
|
volatile data |
3 |
|
web crawler |
3 |
|
audio |
2 |
|
bag-of-gait |
2 |
|
binding corporate rules |
2 |
|
biometric |
2 |
|
block cipher |
2 |
|
cast-128 |
2 |
|
color similarity |
2 |
|
computer programming |
2 |
|
computers |
2 |
|
data controllers and data processors |
2 |
|
data mining |
2 |
|
data privacy |
2 |
|
data protection |
2 |
|
data security |
2 |
|
differential cryptanalysis |
2 |
|
digital forensics |
2 |
|
digital investigation |
2 |
|
forensics |
2 |
|
foxmail |
2 |
|
fragmentation point |
2 |
|
fragmented jpeg file |
2 |
|
gait recognition |
2 |
|
graph cuts optimization |
2 |
|
human identification |
2 |
|
incident response |
2 |
|
industrial control systems |
2 |
|
instant message |
2 |
|
internet applications |
2 |
|
jpeg file carving |
2 |
|
logging system |
2 |
|
machine learning |
2 |
|
motion vectors consistency |
2 |
|
msn |
2 |
|
object silhouette segmentation |
2 |
|
one-class svm |
2 |
|
programmable logic controllers |
2 |
|
programming logic controller |
2 |
|
protection of personaldata |
2 |
|
qq |
2 |
|
smartphone |
2 |
|
software computers |
2 |
|
temporal aligned selection |
2 |
|
trans-border data transfer |
2 |
|
video stitching |
2 |
|
video surveillance |
2 |
|
voice chat |
2 |
|
water treatment system |
2 |
|
weak key |
2 |
|
006.35 c52 |
1 |
|
495.13028 c5 |
1 |
|
analysis |
1 |
|
animals |
1 |
|
bayesian network |
1 |
|
bayesian networks |
1 |
|
bayesian posterior probability |
1 |
|
behavior analysis |
1 |
|
behavioral characteristics |
1 |
|
bittorrent file sharing |
1 |
|
business model |
1 |
|
chinese language -- dictionaries. |
1 |
|
civil unrest |
1 |
|
cloud storage ecosystem |
1 |
|
community detection |
1 |
|
competing hypotheses |
1 |
|
computer crime |
1 |
|
computer crimes - prevention. |
1 |
|
computer crimes. |
1 |
|
computer model |
1 |
|
computer security. |
1 |
|
computer technology |
1 |
|
confidence interval |
1 |
|
control systems |
1 |
|
covid-19 sensing |
1 |
|
criminal profiling |
1 |
|
cross infection - transmission |
1 |
|
cyber attacks |
1 |
|
cyberlocker |
1 |
|
cyberlockers |
1 |
|
cybersecurity |
1 |
|
ddos |
1 |
|
ddos attacks |
1 |
|
deep learning |
1 |
|
deepfake detection |
1 |
|
digital forensic hypotheses |
1 |
|
digital forensic investigation |
1 |
|
discussion forums |
1 |
|
disentanglement learning |
1 |
|
disinfection |
1 |
|
electronic evidence |
1 |
|
elevator control |
1 |
|
evidential probability |
1 |
|
evidentiary reasoning |
1 |
|
fat |
1 |
|
feature selection |
1 |
|
file system analysis |
1 |
|
first seeder |
1 |
|
flash mob organizers |
1 |
|
forensic perspective |
1 |
|
forensic sciences. |
1 |
|
forensics tools |
1 |
|
foxy |
1 |
|
foxy network |
1 |
|
gnutella 2 protocol |
1 |
|
green dam youth escort |
1 |
|
humans |
1 |
|
hypotheses |
1 |
|
identity tracking |
1 |
|
image forensic |
1 |
|
infant |
1 |
|
information extraction |
1 |
|
information retrieval |
1 |
|
initial seeder |
1 |
|
international standards |
1 |
|
internet auction fraud |
1 |
|
internet crimes |
1 |
|
internet pirates |
1 |
|
interpretibility representation |
1 |
|
investigation model |
1 |
|
knowledge extraction |
1 |
|
knowledge graph |
1 |
|
knowledge graph reasoning |
1 |
|
ladder logic programming |
1 |
|
learning (artificial intelligence) |
1 |
|
light-weight ddos solution |
1 |
|
memory acquisition |
1 |
|
memory forensics |
1 |
|
mice |
1 |
|
mitigation |
1 |
|
mobile telephone |
1 |
|
multilayer perceptrons |
1 |
|
named entity recognition |
1 |
|
natural language processing |
1 |
|
natural language processing (computer science) |
1 |
|
network simulation |
1 |
|
occupy central campaign |
1 |
|
odds |
1 |
|
operational complexity model |
1 |
|
packet filtering |
1 |
|
packet profiling |
1 |
|
peer-to-peer network forensics |
1 |
|
peer-to-peer networks |
1 |
|
piracy |
1 |
|
plc forensics |
1 |
|
political events |
1 |
|
possession of child pornography |
1 |
|
predictive modeling |
1 |
|
privacy preservation |
1 |
|
privacy protection |
1 |
|
probability |
1 |
|
probability theory |
1 |
|
public health |
1 |
|
quantification of plausibility |
1 |
|
real-name registration |
1 |
|
reasoning |
1 |
|
rectum |
1 |
|
relation extraction |
1 |
|
relevance of evidence |
1 |
|
reliability study |
1 |
|
salmonella infections - transmission |
1 |
|
scada security |
1 |
|
science and law |
1 |
|
sentiment classification |
1 |
|
social media |
1 |
|
social media in china |
1 |
|
social media platform |
1 |
|
storage media |
1 |
|
taxonomy |
1 |
|
thermometers |
1 |
|
threats |
1 |
|
time analysis |
1 |
|
vulnerability |
1 |
|
yahoo! case |
1 |