Filter by: Subject

Filter by: Subject

Results Per Page:

Bots (2)
Boundary constraints (2)
Challenges (2)
Command and control (2)
Computer forensics (2)
Computer security (2)
Concurrent software systems (2)
Convergence (2)
Cosmology (2)
Cryptography (2)
Cyber-security (2)
Cybersecurity (2)
Data grid (2)
Data management (2)
Data mining (2)
Decision making (2)
Deoxyribonucleic acid (DNA) (2)
Deterrent control (2)
Digital (2)
Digital forensic investigation (2)
Digital forensic investigation (DFI) (2)
Digital investigation (2)
Dynamic multi-objective optimisation (2)
Dynamic optimization problem (DOP) (2)
Education (2)
Epistemology (2)
Evidence (2)
Evolutionary algorithm (2)
Fake identities (2)
Feature extraction (2)
Fitness landscape analysis (2)
Forensic readiness (2)
Genetic algorithm (GA) (2)
Genetic algorithms (2)
Geographic information systems (2)
Hyper-heuristics (2)
Indirect communication (2)
Internet of things (IoT) (2)
Investigation (2)
iOS (2)
Large-scale optimization (2)
Learning systems (2)
Least-squares (2)
Malicious bots (2)
Measurement (2)
Mobile (2)
Mobile forensics (2)
Mouse dynamics (2)
Neuro-evolution (2)
Nonlinear autoregressive (2)
Online social network (OSN) (2)
Ontology (2)
Particle convergence (2)
Performance measure (2)
Philosophy of science (2)
Protocols (2)
Readiness (2)
Recurrent neural networks (2)
Regularisation (2)
SDG-08: Decent work and economic growth (2)
SDG-17: Partnerships for the goals (2)
Search spaces (2)
Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) (2)
Shape memory effect (2)
Smartphone data (2)
Social engineering attack detection model (2)
Social engineering attack examples (2)
Social engineering attack framework (2)
Social networking (online) (2)
Software architecture (2)
Software development (2)
Software testing (2)
Spatial data infrastructure (SDI) (2)
Stochastic systems (2)
Survey (2)
Taxonomy (2)
Theoretical analysis (2)
Three-valued abstraction (3VA) (2)
Time series forecasting (2)
Trust (2)
Twitter (2)
Unidirectional communication (2)
Usage control (2)
Verification (2)
Visualization (2)
Wind energy (2)
Windows forensics (2)
Wireless sensor network (WSN) (2)
Worldwide web (2)
004.35 (1)
19th Century (1)
20th Century (1)
A hash function (1)
A-particles (1)
Academic alignment (1)
Academic maturity (1)
Access control mechanism (1)
Access point (1)
Access to information (1)
ACM-DL's database (1)