Quantifying Likelihood in Digital Forensic Investigations Richard E Overill 2014,21(6):1-4 Abstract (1196) View PDF (903) [HTML ]
Computer Forensics-An Essential Element of Modern IT Security Frank Y. W. Law and K. P. Chow 2014,21(6):5-8 Abstract (1122) View PDF (1083) [HTML ]
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography Richard E Overill, Jantje A M Silomon, Kam-Pui Chow and Hayson Tse 2014,21(6):9-15 Abstract (1096) View PDF (688) [HTML ]
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis Jing Xu, Fei Xu, Xiao-Jun Chen, Jin-Qiao Shi and Cheng Qi 2014,21(6):16-21 Abstract (1109) View PDF (1045) [HTML ]
Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection Na Jiao 2014,21(6):22-27 Abstract (1089) View PDF (867) [HTML ]
A Duplex Feedback Based Web Service Recommendation Method Jian Luo and Hai-Yan Wang 2014,21(6):28-33 Abstract (1329) View PDF (1113) [HTML ]
Computer Forensics Under Cloud Computing Environment Yi Wang 2014,21(6):34-38 Abstract (1242) View PDF (811) [HTML ]
CloudForen: A Novel Framework for Digital Forensics in Cloud Computing Mathew Nyamagwa, Jigang Liu, Anyi Liu and Tetsutaro Uehara 2014,21(6):39-45 Abstract (1764) View PDF (1253) [HTML ]
Web Page Forensics: A Web Spider Based Approach Ya-Dong Li, Dong-Hui Hu, Yu-Qi Fan and Xin-Dong Wu 2014,21(6):46-50 Abstract (2239) View PDF (1895) [HTML ]
Image Tampering Detection Using No-Reference Image Quality Metrics Ying Li, Bo Wang, Xiang-Wei Kong and Yan-Qing Guo 2014,21(6):51-56 Abstract (1326) View PDF (1297) [HTML ]
Image Steganalysis System optimization Based on Boundary Samples Li-Na Wang, Min-Jie Wang, Ting-Ting Zhu and Qing Dou 2014,21(6):57-62 Abstract (1158) View PDF (924) [HTML ]
Study of the Authenticity and Credibility of QQ Chat Records Zhen-Xing Dong and Long Chen 2014,21(6):63-66 Abstract (3571) View PDF (2730) [HTML ]
An Automatically Filtering Blacklist Model of Social Network Based on Semantic Web Le Ha and Guo-Zi Sun 2014,21(6):67-73 Abstract (1919) View PDF (964) [HTML ]
Modeling and Analysis for Supply Chain Using Stochastic Process Algebra Yong-Tao Huang, Min Lv, Gang Wang, Bing-Yin Ren and Hao-Yun Zhang 2014,21(6):74-80 Abstract (1506) View PDF (884) [HTML ]
Design on a Multi-Sensor Integrated Attitude Determination System for Small UAVs Cun-Xiao Miao, Juan-Juan Cao and Jian-Cheng Fang 2014,21(6):81-92 Abstract (1815) View PDF (761) [HTML ]
Structural Design of a Tall Building with Underpinning Structure in Guangzhou Yu-Hong Ling, Hong-Wei Ma and Shao-Feng Li 2014,21(6):93-101 Abstract (2411) View PDF (2130) [HTML ]
Semantic QoS Ontology and Semantic Service Ranking Approach for IoT services Nwe Nwe Htay Win, Jian-Min Bao, Gang Cui and Purevsuren Dalaijargal 2014,21(6):102-112 Abstract (1135) View PDF (808) [HTML ]
Early Sensor Fault Detection Based on PCA and Clustering Analysis Xue-Bing Gong, Ri-Xin Wang and Min-Qiang Xu 2014,21(6):113-120 Abstract (1184) View PDF (857) [HTML ]
Biodegradation Kinetics and Mechanism of a Typical Coal Gasification Pollutant: Quinoline Peng Xu, Hong-Jun Han, Sheng-Yong Jia, Bao-Lin Hou, Hai-Feng Zhuang and Qian Zhao 2014,21(6):121-128 Abstract (1309) View PDF (797) [HTML ]