IEEE Transactions Information Forensics And Security: Vol. 9, No. 1-2, January - February 2014

X. Lv, Y. Mu, H. Li, Et.all

Informasi Dasar

15.44.262
363.25
Jurnal Internasional - Reference
R1
  1. Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs / Xixiang Lv, Yi Mu, Hui Li

  2. Gabor Ordinal Measures for Face Recognition / Zhenhua Chai, et al.

  3. Building a Scalable System for Stealthy P2P-Botnet Detection / Junjie Zhang, et al.

  4. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation / Jiantao Zhou, et al.

  5. Human Identity and Gender Recognition from Gait Sequences with Arbitrary Walking Directions / Jiwen Lu, Gang Wang, Pierre Moulin

  6. A High Performance Fingerprint Matching System for Large Databases Based on GPU / Pablo David Gutierrez, et al.

  7. Data-Centric OS Kernel Malware Characterization / Junghwaan Ree, et al.

  8. Digital Image Sharing by Diverse Image Media / Kai-Hui Lee, Pei-Ling Chiu

  9. Catch Me If You Can: evaluating Android anti-malware against transformation attacks / Vaibhav Rastogi, Yan Chen, Xuxian Jiang

  10. Top-k Query Result Completeness Verification in Tiered Sensor Networks / Chia-Mu Yu, et al.

etc.

Subjek

Forensic computer
Information Forensic and Security

Katalog

IEEE Transactions Information Forensics And Security: Vol. 9, No. 1-2, January - February 2014
ISSN: 1556-6013
324p.: il.; 28 cm
Inggris

Sirkulasi

Rp. 0
Rp. 0
Tidak

Pengarang

X. Lv, Y. Mu, H. Li, Et.all
Perorangan
Jay Kuo
 

Penerbit

IEEE (Institute of Electrical and Electronics Engineers)
Los Angeles
2014

Koleksi

Kompetensi

 

Download / Flippingbook

 

Ulasan

Belum ada ulasan yang diberikan
anda harus sign-in untuk memberikan ulasan ke katalog ini