IEEE Transactions Information Forensics And Security : Vol. 8, No. 1 - 2, January - February 2013

J. Zhang, C. Chen, Y. Xiang, Et.all

Informasi Dasar

15.44.259
363.25
Jurnal Internasional - Reference
R1
  1. Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions / Jun Zhang, et al.

  2. User Authentication Through Mouse Dynamics / Chao Shen, et al.

  3. Latent Fingerprint Matching Using Descriptor-Based Hough Transform / Alessandra A. Paulino, Jianjiang Feng, Anil K. Jain

  4. Document Clustering for Forensic Analysis : an approach for improving computer inspection / Luis Filipe da Cruz Nassif Eduardo Raul Hruschka

  5. Robust Hashing for Image Authentication Using Zernike Moments and Local Features / Yan Zhao, et al.

  6. An Optimized Wavelength Band Selection for Heavily Pigmented Iris Recognition / Yazhuo Gong, et al.

  7. White-Box Traceable Ciphertext-Policy Attribute-Based Encyption Supporting Any Monotone Access Structures / Zhen Liu, Zhefu Cao, Duncan S. Wong

  8. Recognizing Surgically Altered Face Images Using Multiobjective Evolutionary Algorithm / Himanshu S. Batt, et al.

  9. Heap Graph Based Software Theft Detection / Patrick P.F. Chan, Lucas C.K. HHui S.M. Yiu

  10. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting / Gouenou Coatrieux, et al.

etc.

Subjek

Forensic computer
Information Forensic and Security

Katalog

IEEE Transactions Information Forensics And Security : Vol. 8, No. 1 - 2, January - February 2013
1556-6013
414p.: il.; 28 cm
Inggris

Sirkulasi

Rp. 0
Rp. 0
Tidak

Pengarang

J. Zhang, C. Chen, Y. Xiang, Et.all
Perorangan
Jay Kuo
 

Penerbit

IEEE (Institute of Electrical and Electronics Engineers)
New Jersey
2013

Koleksi

Kompetensi

 

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini