-
1
-
-
0028401306
-
Case-based reasoning: Foundational issues, methodological variations, and system approaches
-
IOS Press
-
Aamodt, A. Plaza, E. (1994); Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches. AI Communications. IOS Press, Vol. 7: 1, pp. 39-59.
-
(1994)
AI Communications
, vol.7
, Issue.1
, pp. 39-59
-
-
Aamodt, A.1
Plaza, E.2
-
2
-
-
49049120354
-
-
Arthur, K.K., Olivier, M.S., Venter, H.S. and Eloff, H.P. (2008) Considerations Towards a Cyber Crime Profiling System Information and Computer Security Architectures (ICSA) Research Group DOI 10.1109/ARES.2008.107
-
(2008)
Considerations Towards a Cyber Crime Profiling System Information and Computer Security Architectures (ICSA) Research Group
-
-
Arthur, K.K.1
Olivier, M.S.2
Venter, H.S.3
Eloff, H.P.4
-
5
-
-
48749115314
-
FACE: Automated digital evidence discovery and correlation
-
ELSEVIER, Science Direct
-
Case, A, Christina, A, Marziale, L, Richard, G, G, Roussev, V 2008, 'FACE: Automated digital evidence discovery and correlation', Digital Investigation, 5, S65-S75, ELSEVIER, Science Direct, doi:10.1016/j.diin.2008.05.008
-
(2008)
Digital Investigation
, vol.5
, pp. S65-S75
-
-
Case, A.1
Christina, A.2
Marziale, L.3
Richard, G.G.4
Roussev, V.5
-
6
-
-
33644910908
-
Moving forward in a changing landscape
-
Casey, E. and Friedberg, S. (2006) Moving forward in a changing landscape Digital Investigation 3, 1-2
-
(2006)
Digital Investigation
, vol.3
, pp. 1-2
-
-
Casey, E.1
Friedberg, S.2
-
7
-
-
33845701766
-
Authentication mobile phone users using keystroke analysis
-
Clarck, N. and Furnell S. (2006) Authentication Mobile Phone Users Using keystroke Analysis. International Journal of Information Security. Volume 6, No. 1, pp1-14
-
(2006)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 1-14
-
-
Clarck, N.1
Furnell, S.2
-
9
-
-
77954728672
-
Rigorous development of automated inconsistency checks for digital evidence using the B method
-
Gladyshev, P. and Enbacka, A. (2007) Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method. International Journal of Digital Evidence 6 (2).
-
(2007)
International Journal of Digital Evidence
, vol.6
, Issue.2
-
-
Gladyshev, P.1
Enbacka, A.2
-
11
-
-
71649105238
-
The growing phenomenon of crime and the internet: A cybercrime execution and analysis model
-
Hunton, P. (2009) The growing phenomenon of crime and the internet: A cybercrime execution and analysis model. Computer Law and Security Review, 25, s28-s35.
-
(2009)
Computer Law and Security Review
, vol.25
, pp. s28-s35
-
-
Hunton, P.1
-
12
-
-
84917720815
-
-
[Online] Available at Accessed: 30 September 2013)
-
ICSPA (2012) The Impact of Cybercrime on Canada. [Online] Available at: https://www.icspa.org/uploads/media/ICSPA-Canada-Cyber-Crime-Study-ROW---Media-Release-Final-01.pdf(Accessed: 30 September 2013)
-
(2012)
The Impact of Cybercrime on Canada
-
-
-
13
-
-
0025489075
-
The self-organizing map
-
Kohonen, T. (1990) The self-organizing map. IEEE Proceeding (Volume:78, issue:9)
-
(1990)
IEEE Proceeding
, vol.78
, Issue.9
-
-
Kohonen, T.1
-
14
-
-
82755182926
-
-
Lim, S. Savoldi, A. Lee, C. and Lee, S. (2012) On-the-spot digital investigation by means of LDFS: Live Data Forensic System Mathematical and Computer Modelling Volume 55 223-240
-
(2012)
On-the-spot Digital Investigation by Means of LDFS: Live Data Forensic System Mathematical and Computer Modelling
, vol.55
, pp. 223-240
-
-
Lim, S.1
Savoldi, A.2
Lee, C.3
Lee, S.4
-
16
-
-
84917720814
-
-
Retrieved from
-
Norton (2013) CyberCrime report 2012. Retrieved from: http://now-static.norton.com/now/en/pu/images/Promotions/2013/PDFs/NCR%20-%20%20Mobile%20-%20Europe%20FINAL%20FINAL.pdf
-
(2013)
CyberCrime Report 2012
-
-
-
17
-
-
84880170201
-
Artificial intelligence and big data
-
March-April
-
O'Leary, D. E. "Artificial Intelligence and Big Data," IEEE Intelligent Systems, Vol. 28, no. 2, pp. 96-99, March-April 2013, doi:10.1109/MIS.2013.39
-
(2013)
IEEE Intelligent Systems
, vol.28
, Issue.2
, pp. 96-99
-
-
O'Leary, D.E.1
-
19
-
-
84879753537
-
-
Retrieved from
-
Ponemon Institute (2012) Cost of cybercrime study: United States. Retrieved from http://www.ponemon.org/local/upload/file/2012-US-Cost-of-Cyber-Crime-Study-FINAL6%20.pdf
-
(2012)
Cost of Cybercrime Study: United States
-
-
|