Quantifying Likelihood in Digital Forensic Investigations Richard E Overill 2014,21(6):1-4 Abstract (1163) View PDF (882) [HTML ]
Computer Forensics-An Essential Element of Modern IT Security Frank Y. W. Law and K. P. Chow 2014,21(6):5-8 Abstract (1090) View PDF (1059) [HTML ]
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography Richard E Overill, Jantje A M Silomon, Kam-Pui Chow and Hayson Tse 2014,21(6):9-15 Abstract (1075) View PDF (663) [HTML ]
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis Jing Xu, Fei Xu, Xiao-Jun Chen, Jin-Qiao Shi and Cheng Qi 2014,21(6):16-21 Abstract (1076) View PDF (1021) [HTML ]
Two Hybrid Methods Based on Rough Set Theory for Network Intrusion Detection Na Jiao 2014,21(6):22-27 Abstract (1055) View PDF (838) [HTML ]
A Duplex Feedback Based Web Service Recommendation Method Jian Luo and Hai-Yan Wang 2014,21(6):28-33 Abstract (1302) View PDF (1084) [HTML ]
Computer Forensics Under Cloud Computing Environment Yi Wang 2014,21(6):34-38 Abstract (1214) View PDF (795) [HTML ]
CloudForen: A Novel Framework for Digital Forensics in Cloud Computing Mathew Nyamagwa, Jigang Liu, Anyi Liu and Tetsutaro Uehara 2014,21(6):39-45 Abstract (1737) View PDF (1228) [HTML ]
Web Page Forensics: A Web Spider Based Approach Ya-Dong Li, Dong-Hui Hu, Yu-Qi Fan and Xin-Dong Wu 2014,21(6):46-50 Abstract (2197) View PDF (1869) [HTML ]
Image Tampering Detection Using No-Reference Image Quality Metrics Ying Li, Bo Wang, Xiang-Wei Kong and Yan-Qing Guo 2014,21(6):51-56 Abstract (1289) View PDF (1256) [HTML ]
Image Steganalysis System optimization Based on Boundary Samples Li-Na Wang, Min-Jie Wang, Ting-Ting Zhu and Qing Dou 2014,21(6):57-62 Abstract (1138) View PDF (903) [HTML ]
Study of the Authenticity and Credibility of QQ Chat Records Zhen-Xing Dong and Long Chen 2014,21(6):63-66 Abstract (3526) View PDF (2678) [HTML ]
An Automatically Filtering Blacklist Model of Social Network Based on Semantic Web Le Ha and Guo-Zi Sun 2014,21(6):67-73 Abstract (1893) View PDF (941) [HTML ]
Modeling and Analysis for Supply Chain Using Stochastic Process Algebra Yong-Tao Huang, Min Lv, Gang Wang, Bing-Yin Ren and Hao-Yun Zhang 2014,21(6):74-80 Abstract (1486) View PDF (851) [HTML ]
Design on a Multi-Sensor Integrated Attitude Determination System for Small UAVs Cun-Xiao Miao, Juan-Juan Cao and Jian-Cheng Fang 2014,21(6):81-92 Abstract (1787) View PDF (734) [HTML ]
Structural Design of a Tall Building with Underpinning Structure in Guangzhou Yu-Hong Ling, Hong-Wei Ma and Shao-Feng Li 2014,21(6):93-101 Abstract (2374) View PDF (2094) [HTML ]
Semantic QoS Ontology and Semantic Service Ranking Approach for IoT services Nwe Nwe Htay Win, Jian-Min Bao, Gang Cui and Purevsuren Dalaijargal 2014,21(6):102-112 Abstract (1098) View PDF (781) [HTML ]
Early Sensor Fault Detection Based on PCA and Clustering Analysis Xue-Bing Gong, Ri-Xin Wang and Min-Qiang Xu 2014,21(6):113-120 Abstract (1160) View PDF (836) [HTML ]
Biodegradation Kinetics and Mechanism of a Typical Coal Gasification Pollutant: Quinoline Peng Xu, Hong-Jun Han, Sheng-Yong Jia, Bao-Lin Hou, Hai-Feng Zhuang and Qian Zhao 2014,21(6):121-128 Abstract (1276) View PDF (760) [HTML ]