Search for persons
X
?
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices ,
3
Efficient Smart Phone Forensics Based on Relevance Feedback:
, In:
?
Proceedings of the 22nd international conference on World Wide Web ,
5
Measurement and analysis of child pornography trafficking o..:
, In:
?
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies ,
6
Concurrent Wi-Fi for mobile users : analysis and measure..:
, In:
?
Proceedings of the Sixth ACM International Workshop on Underwater Networks ,
7
Low spreading loss in underwater acoustic networks reduces ..:
, In:
?
Proceedings of the 18th ACM conference on Computer and communications security ,
8
Forensic investigation of the OneSwarm anonymous filesharin..:
, In:
?
Proceedings of the 6th International COnference ,
11
Assessing the vulnerability of replicated network services:
, In:
?
Proceedings of the 2010 ACM workshop on Insider threats ,
12