Google SafeSearch is ON

10 results (0.19 seconds) 
    Google
     Custom Search
  1. Information Security and Computer Fraud
    Website: http://www.sciepub.com/journal/ISCF · Paper Submission Rss ... 2016, 4
    (1), 1-8. DOI: 10.12691/iscf-4-1-1 ... 2015, 3(2), 32-38. DOI: 10.12691/iscf-3-2-2.

    www.sciepub.com/journal/ISCF
  2. Investigation of Artefacts Left by BitTorrent Client in Windows 8 ...
    2, 2015, pp 25-31. http://pubs.sciepub.com/iscf/3/2/1. Venčkauskas, Algimantas,
    et al. "Investigation of Artefacts Left by BitTorrent Client in Windows 8 Registry.

    pubs.sciepub.com/iscf/3/2/1/
  3. Full Text PDF
    Jun 16, 2015 ... Available online at http://pubs.sciepub.com/iscf/3/1/1. Science and Education
    Publishing. DOI:10.12691/iscf-3-1-1. Comparative Analysis of ...

    www.sciepub.com/portal/downloads?doi=10.../iscf-3-1-1...iscf...
  4. Comparative Analysis of Block Cipher-Based Encryption Algorithms ...
    1, 2015, pp 1-7. http://pubs.sciepub.com/iscf/3/1/1. RIMAN, Chadi, and Pierre E.
    ABI-CHAR. "Comparative Analysis of Block Cipher-Based Encryption Algorithms:
     ...

    pubs.sciepub.com/iscf/3/1/1/
  5. 2013 Open Access Week Free Resource List
    Oct 24, 2013 ... ... and Computer Fraud http://www.sciepub.com/journal/ISCF/Articles#.
    Ul1XYGTSN-M. Inside the global economy [Annenberg/CPB Media].

    scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1015&context...
  6. Novel Chaos Based Steganography for Images Using Matrix ...
    1, 2015, pp 8-14. http://pubs.sciepub.com/iscf/3/1/2. Reddy, V. Lokeswara. "Novel
    Chaos Based Steganography for Images Using Matrix Encoding and Cat ...

    pubs.sciepub.com/iscf/3/1/2/
  7. An Incoercible E-Voting Scheme Based on Revised Simplified ...
    Available online at http://pubs.sciepub.com/iscf/3/2/2. Science and Education
    Publishing. DOI:10.12691/iscf-3-2-2. An Incoercible E-Voting Scheme Based on ...

    arxiv.org/pdf/1512.05596
  8. The Security File System in Smart TV Operating System
    DOI: 10.12691/iscf-2-3-3. Received December 02, 2014; Revised December 19,
    2014; Accepted December 23, 2014. Copyright 2013 Science and Education ...

    pubs.sciepub.com/iscf/2/3/3/
  9. KTU researchers has developed a new forensics method for ...
    http://www.sciepub.com/portal/downloads?doi=10.12691/iscf-3-2-1&filename=
    iscf-3-2-1.pdf. Venčkauskas, Algimantas, Damaševičius, Robertas,
    Marcinkevičius ...

    www.l3ce.eu/.../ktu-researchers-has-developed-a-new-forensics-method-for- investigation-of-crime-on-internet-of-things/
  10. KTU mokslininkai sukūrė naują nusikaltimų daiktų internete ...
    http://www.sciepub.com/portal/downloads?doi=10.12691/iscf-3-2-1&filename=
    iscf-3-2-1.pdf. Venčkauskas, Algimantas, Damaševičius, Robertas,
    Marcinkevičius ...

    www.l3ce.eu/.../ktu-mokslininkai-sukure-nauja-nusikaltimu-daiktu-internete- kriminalistiniu-tyrimu-metoda/

In order to show you the most relevant results, we have omitted some entries very similar to the 10 already displayed.
If you like, you can repeat the search with the omitted results included.



 

Search Tips


©2013 Google