Quantifying Likelihood in Digital Forensic Investigations Richard E Overill 2014,21(6):1-4 Abstract (1262) View PDF (953) [HTML ]
Computer Forensics-An Essential Element of Modern IT Security Frank Y. W. Law and K. P. Chow 2014,21(6):5-8 Abstract (1184) View PDF (1125) [HTML ]
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography Richard E Overill, Jantje A M Silomon, Kam-Pui Chow and Hayson Tse 2014,21(6):9-15 Abstract (1190) View PDF (757) [HTML ]
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis Jing Xu, Fei Xu, Xiao-Jun Chen, Jin-Qiao Shi and Cheng Qi 2014,21(6):16-21 Abstract (1206) View PDF (1096) [HTML ]
Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection Na Jiao 2014,21(6):22-27 Abstract (1266) View PDF (928) [HTML ]
A Duplex Feedback Based Web Service Recommendation Method Jian Luo and Hai-Yan Wang 2014,21(6):28-33 Abstract (1400) View PDF (1181) [HTML ]
Computer Forensics Under Cloud Computing Environment Yi Wang 2014,21(6):34-38 Abstract (1323) View PDF (867) [HTML ]
CloudForen: A Novel Framework for Digital Forensics in Cloud Computing Mathew Nyamagwa, Jigang Liu, Anyi Liu and Tetsutaro Uehara 2014,21(6):39-45 Abstract (1830) View PDF (1328) [HTML ]
Web Page Forensics: A Web Spider Based Approach Ya-Dong Li, Dong-Hui Hu, Yu-Qi Fan and Xin-Dong Wu 2014,21(6):46-50 Abstract (2349) View PDF (1944) [HTML ]
Image Tampering Detection Using No-Reference Image Quality Metrics Ying Li, Bo Wang, Xiang-Wei Kong and Yan-Qing Guo 2014,21(6):51-56 Abstract (1436) View PDF (1373) [HTML ]
Image Steganalysis System optimization Based on Boundary Samples Li-Na Wang, Min-Jie Wang, Ting-Ting Zhu and Qing Dou 2014,21(6):57-62 Abstract (1248) View PDF (966) [HTML ]
Study of the Authenticity and Credibility of QQ Chat Records Zhen-Xing Dong and Long Chen 2014,21(6):63-66 Abstract (3668) View PDF (2799) [HTML ]
An Automatically Filtering Blacklist Model of Social Network Based on Semantic Web Le Ha and Guo-Zi Sun 2014,21(6):67-73 Abstract (2011) View PDF (1024) [HTML ]
Modeling and Analysis for Supply Chain Using Stochastic Process Algebra Yong-Tao Huang, Min Lv, Gang Wang, Bing-Yin Ren and Hao-Yun Zhang 2014,21(6):74-80 Abstract (1613) View PDF (938) [HTML ]
Design on a Multi-Sensor Integrated Attitude Determination System for Small UAVs Cun-Xiao Miao, Juan-Juan Cao and Jian-Cheng Fang 2014,21(6):81-92 Abstract (1942) View PDF (804) [HTML ]
Structural Design of a Tall Building with Underpinning Structure in Guangzhou Yu-Hong Ling, Hong-Wei Ma and Shao-Feng Li 2014,21(6):93-101 Abstract (2502) View PDF (2185) [HTML ]
Semantic QoS Ontology and Semantic Service Ranking Approach for IoT services Nwe Nwe Htay Win, Jian-Min Bao, Gang Cui and Purevsuren Dalaijargal 2014,21(6):102-112 Abstract (1237) View PDF (857) [HTML ]
Early Sensor Fault Detection Based on PCA and Clustering Analysis Xue-Bing Gong, Ri-Xin Wang and Min-Qiang Xu 2014,21(6):113-120 Abstract (1265) View PDF (910) [HTML ]
Biodegradation Kinetics and Mechanism of a Typical Coal Gasification Pollutant: Quinoline Peng Xu, Hong-Jun Han, Sheng-Yong Jia, Bao-Lin Hou, Hai-Feng Zhuang and Qian Zhao 2014,21(6):121-128 Abstract (1387) View PDF (844) [HTML ]