Author:
Brown Ross,Pham Binh,de Vel Olivier
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. CSI/FBI, 2003 Computer Crime and Security Survey. Computer Security Institute, San Fransisco, USA (2003)
2. Open Systems, http://www.opensystems.com.au (visited on October 15, 2003)
3. Niblack, W., Zhu, X., Hafner, J., et al.: Updates to the QBIC system. In: Storage and Retrieval for Image and Video Databases, vol. 3312, pp. 150–161 (1997)
4. Mohay, G., Anderson, A., Collie, B., de Vel, O., McKemmish, R.: Computer and Intrusion Forensics. Artech House Publishers, Norwood (2003)
5. Muller, H., Muller, W., Marchand-Maillet, S., et al.: Strategies for positive and negative relevance feedback in image retrieval. In: Proc. International Conference on Pattern Recognition ICPR 2000, vol. 1, pp. 1043–1046 (2000)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Sztuczna inteligencja i przestpczo przyszoci w kontekcie kryminalistycznych bada informatycznych;PRZEGLĄD POLICYJNY;2023-05-28
2. Identification of Image Spoofing Using Deep Convolution Neural Network;Proceedings of Fourth Doctoral Symposium on Computational Intelligence;2023
3. SoK;Proceedings of the 15th International Conference on Availability, Reliability and Security;2020-08-25
4. Introduction;SpringerBriefs on Cyber Security Systems and Networks;2018
5. Big forensic data reduction: digital forensic images and electronic evidence;Cluster Computing;2016-03-21