Quantifying Likelihood in Digital Forensic Investigations Richard E Overill 2014,21(6):1-4 Abstract (1243) View PDF (941) [HTML ]
Computer Forensics-An Essential Element of Modern IT Security Frank Y. W. Law and K. P. Chow 2014,21(6):5-8 Abstract (1165) View PDF (1114) [HTML ]
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography Richard E Overill, Jantje A M Silomon, Kam-Pui Chow and Hayson Tse 2014,21(6):9-15 Abstract (1170) View PDF (736) [HTML ]
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis Jing Xu, Fei Xu, Xiao-Jun Chen, Jin-Qiao Shi and Cheng Qi 2014,21(6):16-21 Abstract (1182) View PDF (1084) [HTML ]
Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection Na Jiao 2014,21(6):22-27 Abstract (1236) View PDF (911) [HTML ]
A Duplex Feedback Based Web Service Recommendation Method Jian Luo and Hai-Yan Wang 2014,21(6):28-33 Abstract (1381) View PDF (1165) [HTML ]
Computer Forensics Under Cloud Computing Environment Yi Wang 2014,21(6):34-38 Abstract (1294) View PDF (853) [HTML ]
CloudForen: A Novel Framework for Digital Forensics in Cloud Computing Mathew Nyamagwa, Jigang Liu, Anyi Liu and Tetsutaro Uehara 2014,21(6):39-45 Abstract (1809) View PDF (1302) [HTML ]
Web Page Forensics: A Web Spider Based Approach Ya-Dong Li, Dong-Hui Hu, Yu-Qi Fan and Xin-Dong Wu 2014,21(6):46-50 Abstract (2317) View PDF (1929) [HTML ]
Image Tampering Detection Using No-Reference Image Quality Metrics Ying Li, Bo Wang, Xiang-Wei Kong and Yan-Qing Guo 2014,21(6):51-56 Abstract (1405) View PDF (1349) [HTML ]
Image Steganalysis System optimization Based on Boundary Samples Li-Na Wang, Min-Jie Wang, Ting-Ting Zhu and Qing Dou 2014,21(6):57-62 Abstract (1214) View PDF (957) [HTML ]
Study of the Authenticity and Credibility of QQ Chat Records Zhen-Xing Dong and Long Chen 2014,21(6):63-66 Abstract (3639) View PDF (2784) [HTML ]
An Automatically Filtering Blacklist Model of Social Network Based on Semantic Web Le Ha and Guo-Zi Sun 2014,21(6):67-73 Abstract (1984) View PDF (1015) [HTML ]
Modeling and Analysis for Supply Chain Using Stochastic Process Algebra Yong-Tao Huang, Min Lv, Gang Wang, Bing-Yin Ren and Hao-Yun Zhang 2014,21(6):74-80 Abstract (1568) View PDF (923) [HTML ]
Design on a Multi-Sensor Integrated Attitude Determination System for Small UAVs Cun-Xiao Miao, Juan-Juan Cao and Jian-Cheng Fang 2014,21(6):81-92 Abstract (1881) View PDF (794) [HTML ]
Structural Design of a Tall Building with Underpinning Structure in Guangzhou Yu-Hong Ling, Hong-Wei Ma and Shao-Feng Li 2014,21(6):93-101 Abstract (2465) View PDF (2174) [HTML ]
Semantic QoS Ontology and Semantic Service Ranking Approach for IoT services Nwe Nwe Htay Win, Jian-Min Bao, Gang Cui and Purevsuren Dalaijargal 2014,21(6):102-112 Abstract (1208) View PDF (840) [HTML ]
Early Sensor Fault Detection Based on PCA and Clustering Analysis Xue-Bing Gong, Ri-Xin Wang and Min-Qiang Xu 2014,21(6):113-120 Abstract (1247) View PDF (890) [HTML ]
Biodegradation Kinetics and Mechanism of a Typical Coal Gasification Pollutant: Quinoline Peng Xu, Hong-Jun Han, Sheng-Yong Jia, Bao-Lin Hou, Hai-Feng Zhuang and Qian Zhao 2014,21(6):121-128 Abstract (1364) View PDF (832) [HTML ]