Open Access
Issue |
E3S Web Conf.
Volume 125, 2019
The 4th International Conference on Energy, Environment, Epidemiology and Information System (ICENIS 2019)
|
|
---|---|---|
Article Number | 25002 | |
Number of page(s) | 8 | |
Section | Health, Safety, and Environment Information Systems | |
DOI | https://doi.org/10.1051/e3sconf/201912525002 | |
Published online | 28 October 2019 |
- F.S. Rosa, R.J. Lunkes, M.M.. Brizzolla, Data on the environmental sustainability index of large Brazilian companies, Data Br., no. March 103819, (2019) [Google Scholar]
- I. Ruthven, The language of information need: Differentiating conscious and formalized information needs, Inf. Process. Manag. 56 no. 1, 77–90 (2019) [Google Scholar]
- T. Jiang, Q. Guo, Y. Xu, S. Fu, A diary study of information encountering triggered by visual stimuli on micro-blogging services, Inf. Process. Manag. 56 no. 1, 29–42 (2019) [Google Scholar]
- J. Wagner, A. Rasin, J. Grier, Database forensic analysis through internal structure carving, Digit. Investig. 14, S106–S115 (2015) [CrossRef] [Google Scholar]
- G. Horsman, Tool testing and reliability issues in the field of digital forensics, Digit. Investig. 28, 163–175 (2019) [CrossRef] [Google Scholar]
- R. Nordvik, F. Toolan, S. Axelsson, Using the object ID index as an investigative approach for NTFS file systems, Digit. Investig 28, S30–S39, (2019) [CrossRef] [Google Scholar]
- E. Casey, Interrelations between digital investigation and forensic science, Digit. Investig. 28, A1–A2 (2019) [Google Scholar]
- N. Al-Mutawa, J. Bryce, V.N.L. Franqueira, A. Marrington, J.C. Read, Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes, Digit. Investig. 28, 70–82, (2019) [CrossRef] [Google Scholar]
- D. Fleurbaaij, M. Scanlon, Privileged Data within Digital Evidence, Comput. Sci. Crytography Secur. (2017) [Google Scholar]
- F.S. Roozbahani, R. Azad, Security Solutions against Computer Networks Threats, Int. J. Adv. Netw. Appl. 2581, 2576–2581 (2015) [Google Scholar]
- M. Mufadhol, G. Aryotejo, D.Y. Kristiyanto, Rule Based Reasoning Method for Safety Room by Means of Temperature Sensor and Motion Detector, Adv. Sci. Lett. 23, 2481–2483 (2017) [Google Scholar]
- P. Pinoli, S. Ceri, D. Martinenghi, L. Nanni, Metadata management for scientific databases, Inf. Syst. 81, 1–20 (2019) [Google Scholar]
- N. Kishore, B. Kapoor, Faster file imaging framework for digital forensics, Procedia Comput. Sci. 49, no. 1, 74–81 (2015) [Google Scholar]
- X. Lin, J.H. Li, S.L. Wang, A.W.C. Liew, F. Cheng, X.S. Huang, Recent Advances in Passive Digital Image Security Forensics: A Brief Review, Engineering 4, no. 1, 29–39 (2018) [CrossRef] [Google Scholar]
- T. Okamoto, SecondDEP: Resilient computing that prevents shellcode execution in cyber-attacks, Procedia Comput. Sci. 60, no. 1, 691–699 (2015) [Google Scholar]
- L. Révay, From malware testing to virtualization, Procedia Comput. Sci. 150, 751–756 (2019) [Google Scholar]
- G. Aryotejo, D.Y. Kristiyanto, Mufadhol, Hybrid cloud: Bridging of private and public cloud computing, J. Phys. Conf. Ser. 1025, no. 1 (2018) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.