Author of the publication

Tracking Contraband Files Transmitted Using Bittorrent.

, , , and . IFIP Int. Conf. Digital Forensics, volume 306 of IFIP Advances in Information and Communication Technology, page 159-173. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using PLSI-U to detect insider threats by datamining e-mail., , and . IJSN, 3 (2): 114-121 (2008)Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps., , and . FLAIRS Conference, AAAI Press, (2009)A function-to-task process model for adaptive automation system design., , and . Int. J. Hum.-Comput. Stud., 72 (12): 822-834 (2014)Cognitive Robot Mapping with Polylines and an Absolute Space Representation., and . ICRA, page 3771-3776. IEEE, (2004)Decision-Theoretic Layered Robotic Control Architecture., and . AAAI/IAAI, page 976. AAAI Press / The MIT Press, (1999)Network security using self organized multi agent swarms., , and . CICS, page 144-151. IEEE, (2009)Steganalysis Embedding Percentage Determination with Learning Vector Quantization., , , and . SMC, page 1861-1865. IEEE, (2006)Analysis of Tools for Detecting Rootkits and Hidden Processes., , , , , and . IFIP Int. Conf. Digital Forensics, volume 242 of IFIP, page 89-105. Springer, (2007)Fusion of Steganalysis Systems Using Bayesian Model Averaging., , and . IFIP Int. Conf. Digital Forensics, volume 285 of IFIP, page 345-355. Springer, (2008)Removing parallax-induced changes in Hyperspectral Change Detection., , , and . IGARSS, page 2012-2015. IEEE, (2012)