distributed denial-of-service (ddos) |
7 |
intrusion detection |
7 |
routers |
7 |
testbed |
7 |
cryptography |
6 |
boundary smoothness |
5 |
cryptanalysis |
5 |
de-interlacing methods |
5 |
edge dependent interpolation |
5 |
group signature |
5 |
hard disk integrity |
5 |
merging criterion |
5 |
motion adaptive interpolation |
5 |
optimal number of segments |
5 |
watershed segmentation |
5 |
3-dimension hashing |
4 |
bloom filter |
4 |
computer forensics |
4 |
computer networks |
4 |
contour measurement |
4 |
database operation |
4 |
database systems |
4 |
decentralized control |
4 |
digital arithmetic |
4 |
digital forensic engineering |
4 |
edge detection |
4 |
electronic crime countermeasures |
4 |
forensic analysis |
4 |
homomorphic encryption |
4 |
indexing (of information) |
4 |
latent sector errors (lses) |
4 |
legal professional privilege (lpp) |
4 |
multiparty matching |
4 |
object-based retrieval system |
4 |
privacy |
4 |
probabilistic logics |
4 |
real time systems |
4 |
sensor networks |
4 |
systematic approaches |
4 |
text-based matching |
4 |
actuation |
3 |
applied cryptography |
3 |
bilinear pairings |
3 |
bitcoin simulation model |
3 |
bittorrent model |
3 |
blind signature |
3 |
chinese information processing |
3 |
chinese shanzhai phones |
3 |
chinese word extraction |
3 |
cloud forensics |
3 |
cloudfront |
3 |
combinatorial group testing (cgt) |
3 |
commutative encryption |
3 |
computing technology |
3 |
confidential forensic investigation |
3 |
context-aware |
3 |
cryptographic primitives |
3 |
cyber-physical system |
3 |
datamining |
3 |
deblurring |
3 |
deleted data |
3 |
digital crimes |
3 |
digital evidence |
3 |
dual cube |
3 |
e-lottery |
3 |
elliptic curve cryptosystems |
3 |
error rates |
3 |
face model |
3 |
face reconstruction |
3 |
file carving |
3 |
file sharing |
3 |
firewalls |
3 |
forensic investigation |
3 |
forensics technology |
3 |
forward security |
3 |
forward-secure signature |
3 |
goodness measure |
3 |
hard disk sector allocation |
3 |
heuristic-based address clustering |
3 |
hierarchical identity-based signature |
3 |
identity-based partially blind signature |
3 |
identity-based signcryption |
3 |
initial seeders |
3 |
integrity verification |
3 |
internet forum |
3 |
internet piracy |
3 |
internet surveillance |
3 |
k-dimensional hashing |
3 |
keyword clustering |
3 |
live forensics |
3 |
mediatek |
3 |
memory analysis |
3 |
motion estimation |
3 |
multisignature |
3 |
network security |
3 |
peer to peer |
3 |
phonebook |
3 |
photo forensics |
3 |
pose estimation |
3 |
privacy preserving forensics |
3 |
privacy-preserving multiple keyword search |
3 |
provable security |
3 |
public ciphertext authenticity |
3 |
public key cryptosystems |
3 |
public verifiability |
3 |
remote forensics |
3 |
search on encrypted data |
3 |
security |
3 |
self-defense |
3 |
semantical security |
3 |
sensitivity analysis |
3 |
shanzhai mobile phone |
3 |
similarity measure |
3 |
spatially varing blur kernels |
3 |
super-resolution |
3 |
tamper proofing |
3 |
texture mapping |
3 |
threshold partially blind signature |
3 |
tracking |
3 |
user profiling |
3 |
verifiable random function |
3 |
virus detection |
3 |
volatile data |
3 |
web crawler |
3 |
audio |
2 |
bag-of-gait |
2 |
binding corporate rules |
2 |
biometric |
2 |
block cipher |
2 |
cast-128 |
2 |
color similarity |
2 |
computer programming |
2 |
computers |
2 |
data controllers and data processors |
2 |
data privacy |
2 |
data protection |
2 |
data security |
2 |
differential cryptanalysis |
2 |
digital forensics |
2 |
digital investigation |
2 |
forensics |
2 |
foxmail |
2 |
fragmentation point |
2 |
fragmented jpeg file |
2 |
gait recognition |
2 |
graph cuts optimization |
2 |
human identification |
2 |
incident response |
2 |
industrial control systems |
2 |
instant message |
2 |
internet applications |
2 |
jpeg file carving |
2 |
logging system |
2 |
machine learning |
2 |
motion vectors consistency |
2 |
msn |
2 |
object silhouette segmentation |
2 |
one-class svm |
2 |
programmable logic controllers |
2 |
programming logic controller |
2 |
protection of personaldata |
2 |
qq |
2 |
smartphone |
2 |
software computers |
2 |
temporal aligned selection |
2 |
trans-border data transfer |
2 |
video stitching |
2 |
video surveillance |
2 |
voice chat |
2 |
water treatment system |
2 |
weak key |
2 |
006.35 c52 |
1 |
495.13028 c5 |
1 |
analysis |
1 |
animals |
1 |
bayesian network |
1 |
bayesian networks |
1 |
bayesian posterior probability |
1 |
behavior analysis |
1 |
behavioral characteristics |
1 |
bittorrent file sharing |
1 |
business model |
1 |
chinese language -- dictionaries. |
1 |
civil unrest |
1 |
cloud storage ecosystem |
1 |
competing hypotheses |
1 |
computer crime |
1 |
computer crimes - prevention. |
1 |
computer crimes. |
1 |
computer model |
1 |
computer security. |
1 |
computer technology |
1 |
control systems |
1 |
covid-19 sensing |
1 |
criminal profiling |
1 |
cross infection - transmission |
1 |
cyber attacks |
1 |
cyberlocker |
1 |
cyberlockers |
1 |
cybersecurity |
1 |
data mining |
1 |
ddos |
1 |
ddos attacks |
1 |
digital forensic hypotheses |
1 |
digital forensic investigation |
1 |
discussion forums |
1 |
disinfection |
1 |
electronic evidence |
1 |
elevator control |
1 |
evidential probability |
1 |
evidentiary reasoning |
1 |
fat |
1 |
feature selection |
1 |
file system analysis |
1 |
first seeder |
1 |
flash mob organizers |
1 |
forensic perspective |
1 |
forensic sciences. |
1 |
forensics tools |
1 |
foxy |
1 |
foxy network |
1 |
gnutella 2 protocol |
1 |
green dam youth escort |
1 |
humans |
1 |
hypotheses |
1 |
identity tracking |
1 |
infant |
1 |
information extraction |
1 |
information retrieval |
1 |
initial seeder |
1 |
international standards |
1 |
internet auction fraud |
1 |
internet crimes |
1 |
internet pirates |
1 |
investigation model |
1 |
knowledge extraction |
1 |
knowledge graph |
1 |
knowledge graph reasoning |
1 |
ladder logic programming |
1 |
learning (artificial intelligence) |
1 |
light-weight ddos solution |
1 |
memory acquisition |
1 |
memory forensics |
1 |
mice |
1 |
mitigation |
1 |
mobile telephone |
1 |
multilayer perceptrons |
1 |
named entity recognition |
1 |
natural language processing |
1 |
natural language processing (computer science) |
1 |
network simulation |
1 |
occupy central campaign |
1 |
odds |
1 |
operational complexity model |
1 |
packet filtering |
1 |
packet profiling |
1 |
peer-to-peer network forensics |
1 |
peer-to-peer networks |
1 |
piracy |
1 |
plc forensics |
1 |
political events |
1 |
possession of child pornography |
1 |
predictive modeling |
1 |
privacy preservation |
1 |
privacy protection |
1 |
probability |
1 |
probability theory |
1 |
public health |
1 |
quantification of plausibility |
1 |
real-name registration |
1 |
reasoning |
1 |
rectum |
1 |
relation extraction |
1 |
relevance of evidence |
1 |
salmonella infections - transmission |
1 |
scada security |
1 |
science and law |
1 |
sentiment classification |
1 |
social media in china |
1 |
social media platform |
1 |
storage media |
1 |
taxonomy |
1 |
thermometers |
1 |
threats |
1 |
time analysis |
1 |
vulnerability |
1 |
yahoo! case |
1 |