Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Harbin Institute of Technology
1005-9113
2014 Issue 6
Quantifying Likelihood in Digital Forensic Investigations
Richard E Overill;
..............
page:1-4
Computer Forensics-An Essential Element of Modern IT Security
Frank Y.W.Law;,K.P.Chow;
..............
page:5-8
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography
Richard E Overill;,Jantje A M Silomon;,Kam-Pui Chow;,Hayson Tse;
..............
page:9-15
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis
Jing Xu;,Fei Xu;,Xiao-Jun Chen;,Jin-Qiao Shi;,Cheng Qi;
..............
page:16-21
Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection
Na Jiao;
..............
page:22-27
A Duplex Feedback Based Web Service Recommendation Method
Jian Luo;,Hai-Yan Wang;
..............
page:28-33
Computer Forensics Under Cloud Computing Environment
Yi Wang;
..............
page:34-38
CloudForen: A Novel Framework for Digital Forensics in Cloud Computing
Mathew Nyamagwa;,Jigang Liu;,Anyi Liu;,Tetsutaro Uehara;
..............
page:39-45
Web Page Forensics: A Web Spider Based Approach
Ya-Dong Li;,Dong-Hui Hu;,Yu-Qi Fan;,Xin-Dong Wu;
..............
page:46-50
Image Tampering Detection Using No-Reference Image Quality Metrics
Ying Li;,Bo Wang;,Xiang-Wei Kong;,Yan-Qing Guo;
..............
page:51-56
Image Steganalysis System optimization Based on Boundary Samples
Li-Na Wang;,Min-Jie Wang;,Ting-Ting Zhu;,Qing Dou;
..............
page:57-62
Study of the Authenticity and Credibility of QQ Chat Records
Zhen-Xing Dong;,Long Chen;
..............
page:63-66
An Automatically Filtering Blacklist Model of Social Network Based on Semantic Web
Le Ha;,Guo-Zi Sun;
..............
page:67-73
Modeling and Analysis for Supply Chain Using Stochastic Process Algebra
Yong-Tao Huang;,Min Lv;,Gang Wang;,Bing-Yin Ren;,Hao-Yun Zhang;
..............
page:74-80
Design on a Multi-Sensor Integrated Attitude Determination System for Small UAVs
Cun-Xiao Miao;,Juan-Juan Cao;,Jian-Cheng Fang;
..............
page:81-92
Structural Design of a Tall Building with Underpinning Structure in Guangzhou
Yu-Hong Ling;,Hong-Wei Ma;,Shao-Feng Li;
..............
page:93-101
Semantic QoS Ontology and Semantic Service Ranking Approach for IoT services
Nwe Nwe Htay Win;,Jian-Min Bao;,Gang Cui;,Purevsuren Dalaijargal;
..............
page:102-112
Early Sensor Fault Detection Based on PCA and Clustering Analysis
Xue-Bing Gong;,Ri-Xin Wang;,Min-Qiang Xu;
..............
page:113-120
Biodegradation Kinetics and Mechanism of a Typical Coal Gasification Pollutant: Quinoline
Peng Xu;,Hong-Jun Han;,Sheng-Yong Jia;,Bao-Lin Hou;,Hai-Feng Zhuang;,Qian Zhao;
..............
page:121-128