History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 | next | last

Result 1 to 13 of 13 total

A complexity based forensic analysis of the trojan horse defence (English)
ARES, 764-768 (2011).
1
Sensitivity analysis of Bayesian networks used in forensic investigations (English)
IFIP Int. Conf. Digital Forensics, 231-243 (2011).
2
Evaluation of evidence in internet auction fraud investigations (English)
IFIP Int. Conf. Digital Forensics, 121-132 (2010).
3
A complexity based model for quantifying forensic evidential probabilities (English)
ARES, 671-676 (2010).
4
A cost-effective model for digital forensic investigations (English)
IFIP Int. Conf. Digital Forensics, 231-240 (2009).
5
On the role of the facilitator in information security risk assessment. (English)
J. Comput. Virol. 3, No. 2, 143-148 (2007).
6
Triangulating the views of human and non-human stakeholders in information system security risk assessment (English)
Security and Management, 172-178 (2007).
7
Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector (English)
IEEE Congress on Evolutionary Computation (1), 405-412 (2003).
8
Data parallel evaluation of univariate polynomials by the Knuth‒Eve algorithm. (English)
Parallel Comput. 23, No.13, 2115-2127 (1997).
9
Heterogeneous computing machines and Amdahl’s law. (English)
Parallel Comput. 22, No.3, 407-413 (1996).
10
$α\sb{\text{critical}}$ for parallel processors. (English)
Parallel Comput. 21, No.3, 467-471 (1995).
11
Performance of parallel algorithms for the evaluation of power series. (English)
Parallel Comput. 20, No.8, 1205-1213 (1994).
12
On the combinatorial complexity of fuzzy pattern matching in music analysis (English)
Computers and the Humanities 27, No. 2, 105-110 (1993).
13
first | previous | 1 | next | last

Result 1 to 13 of 13 total