Items where Subject is "Q Science > QA Mathematics > QA0075 Electronic computers. Computer science"

Up a level
Export as [feed] RSS
Group by: Name | Item Type
Jump to: A | B | C | D | E | F | G | H | I | L | M | N | O | P | Q | S | T | V | W | Y
Number of items at this level: 143.

A

Alham, K., Li, M., Liu, Y. and Qi, M. (2013) A distributed SVM ensemble for large scale image classification and annotation. Computers and Mathematics with Applications, 66 (10). pp. 1920-1934. ISSN 0898-1221.

Azhar, M. H. B., Deravi, F. and Dimond, K. (2008) Criticality dispersion in swarms to optimize n-tuples. In: UNSPECIFIED, ed. GECCO '08: Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation. New York: Association for Computing Machinery. pp. 1-8 ISBN 9781605581309

Azhar, M. H. B., Deravi, F. and Dimond, K. (2008) Particle swarm intelligence to optimize the learning of n-tuples. Journal of Intelligent Systems, 17 (S). pp. 169-196. ISSN 0334-1860.

B

Barton, T. and Azhar, M. (2017) Forensic analysis of popular UAV systems. In: UNSPECIFIED, ed. Proceedings of the Seventh International Conference on Emerging Security Technologies. IEEE Press. (In Press)

Barton, T. and Azhar, M. (2017) Open source forensics for a multi-platform drone system. In: UNSPECIFIED, ed. 9th EAI International Conference on Digital Forensics & Cyber Crime. Springer-Verlag. (In Press)

Baxter-Webb, J. (2015) How geek kids get geek jobs: a cross-generational inquiry into digital play and young adults' careers in IT. Ph.D. thesis, Canterbury Christ Church University.

Bennett, D. J. (2010) Assessing cryptography: evaluating students at undergraduate level. In: 4th International Conference on Cybercrime Forensics Education and Training, 2 - 3 September 2010, Canterbury Christ Church University. (Unpublished)

Bennett, D. J. (2002) Effects of navigation and position on task when presenting diagrams to blind people using sound. In: Hegarty, M., Meyer, B. and Hari Narayanan, N., eds. Diagrammatic Representation and Inference: Second International Conference, Diagrams 2002. Springer. pp. 161-175 ISBN 9783540435617

Bennett, D. J. and Lewis, D. (2007) Alice studies computing, Bob takes computer forensics: a comparison of the pedagogy of cryptology education in two groups. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

Bennett, D. J. and Stephens, P. (2009) A cognitive walkthrough of Autopsy Forensic Browser. Information Management & Computer Security, 17 (1). pp. 20-29. ISSN 0968-5227.

Bennett, D. J. and Stephens, P. (2008) A usability analysis of autopsy forensic browser. In: 2nd International Symposium on Human Aspects of Information Security and Assurance, 8 - 9 July 2008, University of Plymouth.

Bertolo, E. (2009) Using a Virtual Learning Environment (VLE) to support undergraduate research in sciences. In: International Conference of Education, Research and Innovation, Nov 2009, Madrid, Spain.

Bertolo, E. and Carlton, K. (2008) Using e-learning to support the development of an undergraduate research culture in sciences. In: International Conference of Education, Research and Innovation, 17 - 19 November 2008, Madrid, Spain.

Bracey, C. and Edgar-Nevill, D. (2007) Prosecuting low-level cybercrime in the UK. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

Brighouse, B. and Edgar-Nevill, D. (2004) The 'object' of an introductory programming course. In: Edgar-Nevill, D., Ross, M. and Staples, G., eds. INSPIRE IX: Software Quality Education for Tomorrow's Professionals. London: British Computer Society. pp. 137-144 ISBN 1902505573

Bryant, R. and Stephens, P. (2008) Digitalisation and crime. In: Bryant, R., ed. Investigating Digital Crime. Chichester: Wiley. pp. 211-230 ISBN 9780470516003

Bryant, R. and Stephens, P. (2008) Plastic card crime. In: Bryant, R., ed. Investigating Digital Crime. Chichester: Wiley. pp. 133-151 ISBN 9780470516003

C

Chellen, S. (2000) The Essential Guide to the Internet for Health Professionals – An Interactive Handbook. New York: Routledge. ISBN 041522747X.

Childs, D. and Stephens, P. (2009) An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl. International Journal of Electronic Security and Digital Forensics, 2 (2). pp. 182-198. ISSN 1751-911X.

Clark, I. J. (2012) Using technology to explore new ways of working. Multimedia Information and Technology, 38 (3). pp. 13-15. ISSN 1466-9358.

D

du Boulay, B., Avramides, K., Luckin, R., Martínez-Mirón, E., Rebolledo Méndez, G. and Carr, A. (2010) Towards systems that care: a conceptual framework based on motivation, metacognition and affect. International Journal of Artificial Intelligence in Education, 20 (3). pp. 197-229. ISSN 1560-4292.

E

Edgar-Nevill, D. (2008) Brute force equals ignorance: a first responder's more vital role in decryption. In: Cyber Defense and Disaster Recovery Conference, 3 July 2008, University of Illinois.

Edgar-Nevill, D. (2008) Building the infrastructure to support HE computer forensics. In: Edgar-Nevill, D., ed. Proceedings of CFET 2008 – 2nd Annual International Conference on Cybercrime Forensics Education and Training. Canterbury: Canterbury Christ Church University. pp. 45-50 ISBN 1899253-19x

Edgar-Nevill, D. (2009) Computer law and the problems of enforcing it. In: Joint BCS Cybercrime Forensics SG & BCS West London Branch, April 2009, London, UK.

Edgar-Nevill, D. (2010) Conscription for the cyber-war. In: Joint meeting of BCS Hampshire Branch and Cybercrime Forensics Specialist Group, 15 March 2010, Southampton Solent University. (Unpublished)

Edgar-Nevill, D. (2008) Crisis for cutting-edge professional development: a case study in forensic computing. In: Crowther, J., Edwards, V., Galloway, V., Shaw, Mae and Tett, L., eds. SCUTREA 2008 38th Annual Conference: Whither Adult Education in the Learning Paradigm? Conference Proceedings. Edinburgh: University of Edinburgh. pp. 174-181 ISBN 9780901580016

Edgar-Nevill, D. (2009) Cybercrime and the London 2012 Olympics. In: Joint BCS Cybercrime Forensics SG & BCS Hampshire Branch, Dec 2009, University of Bedfordshire, UK.

Edgar-Nevill, D. (2009) Cybercrime and the London 2012 Olympics. In: Joint BCS Cybercrime Forensics SG & BCS Consultancy SG, April 2009, London, UK.

Edgar-Nevill, D. (2009) Cybercrime forensics. In: Joint BCS Cybercrime Forensics SG & BCS Hampshire Branch, Jan 2009, Southampton Solent University, UK.

Edgar-Nevill, D. (2009) Cybercrime forensics and the London 2012 Olympics. In: 2009 American Digital Forensics, Security and Law International Conference, May 2009, Burlington, Vermont, USA.

Edgar-Nevill, D. (2010) Cybercrime vs cyber war. In: Edgar-Nevill, D., ed. Proceedings of the 4th international conference on cybercrime forensics education and training. Canterbury: Canterbury Christ Church University. pp. 45-47 ISBN 9781899253739

Edgar-Nevill, D. (2007) Cybercrime: coming to a computer near you (but probably already there!). Justice of the Peace Journal, 171 (40). pp. 700-703. ISSN 0264-3731.

Edgar-Nevill, D. (2010) Dead end trails, tracks and trapdoors that the 'white hats' leave behind: is security testing a risk that needs managing? In: e-Crime congress, March 2010, London. (Unpublished)

Edgar-Nevill, D. (2008) Internet grooming and paedophile crimes. In: Bryant, R., ed. Investigating Digital Crime. Chichester: Wiley. pp. 195-210 ISBN 9780470516003

Edgar-Nevill, D. (2009) Lessons learned from Beijing for the London 2012 Olympics. In: Proceedings of the 3rd International Conference on Cybercrime Forensics Education and Training (CFET), Sept 2009, Canterbury, Kent, UK.

Edgar-Nevill, D. (2007) Motivating and engaging forensic computing practitioners in higher education. In: Innovations in Lifelong Learning Conference, 29 June 2007, Birkbeck Institute for Lifelong Learning.

Edgar-Nevill, D., ed. (2009) Proceedings of the 3rd International Conference on Cybercrime Forensics Education and Training. Canterbury, UK: Canterbury Christ Church University. ISBN 9781899253449.

Edgar-Nevill, D., ed. (2010) Proceedings of the 4th International Conference on Cybercrime Forensics Education and Training. Canterbury: Canterbury Christ Church University. ISBN 9781899253739.

Edgar-Nevill, D., ed. (2011) Proceedings of the 5th International Conference on Cybercrime Forensics Education and Training. Canterbury: Canterbury Christ Church University. ISBN 9781899253845.

Edgar-Nevill, D. (2007) Research informed cybercrime education. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

Edgar-Nevill, D. (2009) Special edition editorial: Cybercrime forensics. International Journal of Electronic Security and Digital Forensics, 2 (2). pp. 113-115. ISSN 1751-911X.

Edgar-Nevill, D. (2007) Using IT to conduct collaborative research across distributed staff and student populations. In: CAQDAS 2007 Conference: Advances in Qualitative Software, 18 - 20 April 2007, Royal Holloway, University of London.

Edgar-Nevill, D. (2007) Work-based blended learning through University partnerships: a case study in cybercrime forensics. In: 15th International Employment Relations Association Conference, 9 - 12 July 2007, Canterbury Christ Church University.

Edgar-Nevill, D. and Bracey, C. (2010) Support for paedophile image viewers. In: Edgar-Nevill, D., ed. Proceedings of the 4th international conference on cybercrime forensics education and training. Canterbury: Canterbury Christ Church University. pp. 138-144 ISBN 9781899253739

Edgar-Nevill, D. and Hawkings, A. (2010) Detection of information compromise committed by malicious insiders. In: Edgar-Nevill, D., ed. Proceedings of the 4th international conference on cybercrime forensics education and training. Canterbury: Canterbury Christ Church University. pp. 125-128 ISBN 9781899253739

Edgar-Nevill, D. and Kessler, G. (2009) Cybercrime forensics: two views from opposite sides of the pond. In: Edgar-Nevill, D., ed. Proceedings of the 3rd International Conference on Cybercrime Forensics Education and Training CFET 2009. Canterbury, UK: Canterbury Christ Church University. ISBN 9781899253449

Edgar-Nevill, D. and Nicholl, J. (2009) Weaknesses and possibilities to improve the Copine Scale. In: Edgar-Nevill, D., ed. Proceedings of the 3rd International Conference on Cybercrime Forensics Euducation and Training CFET 2009. Canterbury, UK: Canterbury Christ Church University. ISBN 9781899253449

Edgar-Nevill, D., Petkov, D., Madachy, R. and O'Connor, R. (2009) Towards a wider application of systems approach in information systems and software engineering. In: Paradice, D., ed. Emerging Systems Approaches in Information Technologies: Concepts, theories and applications. Information Science Reference. pp. 67-85 ISBN 9781605669762

Edgar-Nevill, D. and Qi, M. (2009) Lessons learned from Beijing for the London 2012. In: Edgar-Nevill, D., ed. Proceedings of the 3rd International Conference on Cybercrime Forensics Euducation and Training CFET 2009. Canterbury, UK: Canterbury Christ Church University. ISBN 9781899253449

Edgar-Nevill, D. and Qi, M. (2007) Tracking email offenders. In: ETHICOMP Working Conference, 2 - 3 April 2007, Yunnan University, China.

Edgar-Nevill, D. and Stephens, P. (2008) Countering cybercrime. In: Bryant, R., ed. Investigating Digital Crime. Chichester: Wiley. pp. 79-96 ISBN 9780470516003

Edgar-Nevill, D. and Stephens, P. (2007) Developing cybercrime forensics: the growing pains of a new discipline. In: 3rd International Conference on Computer Science and Information Systems, 23 - 24 July 2007, Athens, Greece.

Edgar-Nevill, D. and Stephens, P. (2007) IT forensics: training or education? Infosecurity, 4 (7). pp. 12-13. ISSN 1754-4548.

F

Faulkner, E. and Henson, R. (2007) Investigating the use of and the impact of mobile technology in gathering and manipulating data and digital images in tackling fly-tipping in the Medway towns. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

G

Guo, W., Alham, N., Liu, Y., Qi, M. and Li, M. (2015) A Resource Aware MapReduce based Parallel SVM for Large Scale Image Classifications. Neural Processing Letters. pp. 1-24. ISSN 1370-4621.

H

Hashemzadeh, P., Sahota, V., Callaghan, M., Dib, H., Tizzard, A., Svensson, L. and Bayford, R. (2010) Tracking conductivity variations in the absence of accurate stat evolution models in electrical impedance tomography. In: UNSPECIFIED, ed. 2010 4th International Conference on Bioinformatics and Biomedical Engineering (iCBBE) : June 18-20, 2010 Chengdu, China. IEEE. pp. 1-6 ISBN 9781424447121

Heron, M. (2013) “Likely to be eaten by a Grue” – the relevance of text games in the modern era. Computer Games Journal, 2 (1). pp. 55-67.

Heron, M., Hanson, V. L. and Ricketts, I. (2013) ACCESS: a technical framework for adaptive accessibility support. In: UNSPECIFIED, ed. EICS '13: Proceedings of the 5th ACM SIGCHI Symposium on Engineering Interactive Computing Systems. New York: ACM. pp. 33-42 ISBN 9781450321389

Heron, M., Hanson, V. L. and Ricketts, I. (2013) Open source and accessibility: advantages and limitations. Journal of Interaction Science, 1 (1). ISSN 2194-0827.

Hoque, S., Azhar, M. H. B. and Deravi, F. (2011) Zoometrics - biometric identification of wildlife using natural body marks. International Journal of Bio-Science and Bio-Technology, 3 (3). pp. 45-53. ISSN 2233-7849.

Humphries, G. (2017) Digital Forensics curriculum and training: struggles with a distinct discipline and ontology for learning. In: UNSPECIFIED, ed. Proceedings of EDULEARN17 Conference. Barcelona, Spain: IATED. pp. 8566-8575 ISBN 9788469737774

I

Iannacci, F. (2005) Coordination processes in open source software development: the Linux case study. Emergence: Complexity & Organization, 7 (2). pp. 21-31. ISSN 1521-3250.

Induruwa, A. (2010) Constantly evolving technological challenges in cybercrime forensic investigation. In: 4th International Conference on Cybercrime Forensics Education and Training, 2 - 3 September 2010, Canterbury Christ Church University.

Induruwa, A. (2015) Internet of everything: how secure should it be? In: 2015 IEEE International Conference on Research in Computational Intelligence and Computer Networks, 20th-22nd November 2015, Kolkata, India. (Unpublished)

Induruwa, A. (2007) Managing the pedagogy of cybercrime forensics study at postgraduate level: challenges and opportunities. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

Induruwa, A. (2009) Mobile phone forensics: an overview of technical and legal aspects. International Journal of Electronic Security and Digital Forensics, 2 (2). pp. 169-181. ISSN 1751-911X.

Induruwa, A. (2009) TCP/IP networking protocols. In: 1st International Workshop on Open Source and the Internet for Scientific Environment, Sept 2009, International Centre for Theoretical Physics, Italy.

Induruwa, A. (2009) Wireless sensor networks - an introduction. In: 1st International Workshop on Open Source and the Internet for Scientific Environment, Sept 2009, International Centre for Theoretical Physics, Italy.

Induruwa, A. and Induruwa, S. (2009) Application of grid computing for fighting cybercrime. In: 3rd International Conference on Cybercrime Forensics Education and Training, Sept 2009, Canterbury Christ Church University, Kent, UK.

Induruwa, A. and Obiniyi, A. (2007) Setting up an IPv6 laboratory for the deployment of 4G networks and devices. Journal of the Nigerian Computer Society, 14 (2). pp. 52-59.

Irons, A., Lallie, H., Thomas, P. and Stephens, P. (2017) Application of problem based learning – Cybersecurity. In: HEA Annual Conference 2017, 4-6 Jul, 2017, Manchester.

Irons, A., Stephens, P. and Ferguson, R. (2009) Digital investigation as a distinct discipline: a pedagogic perspective. Digital Investigation, 6 (1-2). pp. 82-90. ISSN 1742-2876.

L

Li, M. and Qi, M. (2009) Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces. Peer-to-Peer Networking and Applications, 2 (4). pp. 283-297. ISSN 1936-6442.

Li, M., Qi, M., Rozati, M. and Yu, B. (2005) A WSRF based shopping cart system. Lecture Notes in Computer Science [Advances in Grid Computing (EGC) 2005 European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers], 3470. pp. 105-137. ISSN 0302-9743.

Li, M., Yu, B. and Qi, M. (2006) PGGA: a predictable and grouped genetic algorithm for job scheduling. Future Generation Computer Systems, 22 (5). pp. 588-599. ISSN 0167-739X.

Li, M., Yu, B., Sahota, V. and Qi, M. (2009) Web services discovery with rough sets. International Journal of Web Services Research, 6 (1). pp. 69-86. ISSN 1545-7362.

Liu, X., Li, M., Liu, Yang and Qi, M. (2010) OBIRE: ontology based bibliographic information publication and retrieval. International Journal of Distributed Systems and Technologies, 1 (4). pp. 58-73. ISSN 1947-3532.

Liu, Y., Li, M., Khan, M. and Qi, M. (2014) A MapReduce based distributed LSI for scalable information retrieval. Computing and Informatics, 33 (2). pp. 259-280. ISSN 1335-9150.

M

Marshall, A. and Stephens, P. (2008) Identity and identity theft. In: Bryant, R., ed. Investigating Digital Crime. Chichester: Wiley. pp. 179-193 ISBN 9780470516003

Masuwa-Morgan, K. and Burrell, P. (2004) Justification of the need for an ontology for accessibility requirements (theoretic framework). Interacting with Computers, 16 (3). pp. 523-555. ISSN 0953-5438.

Mousoli, R. (2008) Drupal and Joomla security. In: 2nd Annual International Conference on Cybercrime Forensics Education and Training, 1 - 2 September 2008, Canterbury Christ Church University.

Mousoli, R. (2007) Human trust and e-trust. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

Mousoli, R. and Andrade, K. (2010) Social networking sites, privacy and digital security: a case study of Facebook and Bebo. In: 4th International Conference on Cybercrime Forensics Education and Training, 2 - 3 September 2010, Canterbury Christ Church University.

Mousoli, R., Qi, M. and Edgar-Nevill, D. (2008) The social effects of spam. In: Edgar-Nevill, D., ed. Proceedings of CFET 2008 – 2nd Annual International Conference on Cybercrime Forensics Education and Training. Canterbury: Canterbury Christ Church University. pp. 71-78 ISBN 1899253-19X

Mousoli, R. and Shahabi, J. (2010) Traffic analysis, anonymity, ethics and digital 'cat and mouse' in cyberspace: a case study of China vs Iran. In: 4th International Conference on Cybercrime Forensics Education and Training, 2 - 3 September 2010, Canterbury Christ Church University.

N

Naughton, P. and Azhar, M. H. B. An investigation on forensic opportunities to recover evidential data from mobile phones and personal computers. In: International Conference on Advances in Cyber-Technologies and Cyber-System, Cyber 2017, 12-16 Nov 2017, Barcelona, Spain. (In Press)

O

O'Reilly, D. and Stephens, P. (2008) Encryption. In: Bryant, R., ed. Investigating Digital Crime. Chichester: Wiley. pp. 97-120 ISBN 9780470516003

Obiniyi, A. and Induruwa, A. (2010) The deployment of IPv6 in Nigeria: opportunities and challenges. International Journal of Computer Information Systems, 1 (3). pp. 18-23. ISSN 2229-5208.

P

Panteli, A. (2003) Code confidential: codes of practice for computing professionals. ACM SIGCAS Computers and Society, 33 (2). p. 2. ISSN 0095-2737.

Petkov, D., Edgar-Nevill, D., Madachy, R. and O'Connor, R. (2008) Information systems, software engineering, and systems thinking: challenges and opportunities. International Journal of Information Technologies and Systems Approach, 1 (1). pp. 62-78. ISSN 1935-570X.

Q

Qi, M. (2014) Big data management in digital forensics. In: UNSPECIFIED, ed. 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE). IEEE. pp. 238-243 ISBN 9781479979806

Qi, M. (2014) Digital forensics and NoSQL databases. In: UNSPECIFIED, ed. Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014. IEEE. pp. 734-739 ISBN 9781479951475

Qi, M. (2014) Employing neural networks for DDoS detection. In: 7th International Conference on Cybercrime Forensics Education and Training CFET 2014, 10th-11th July, 2014, Canterbury, UK.

Qi, M. (2008) Fast implementation of cel-based animation. In: International Conference on Advanced Infocomm Technology, 28 - 31 July 2008, Shenzhen, China.

Qi, M. (2010) Machine learning based spam filtering: advantages and challenges. In: 4th International Conference on Cybercrime Forensics Education and Training, 2 - 3 September 2010, Canterbury Christ Church University. (Unpublished)

Qi, M. (2009) P2P DDoS: Challenges and Countermeasures. In: Proceedings of IEEE 6th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD '09), Aug 2009, Tianjin, China.

Qi, M. (2009) P2P(peer to peer) network-targeted DDoS(distributed denial-of-service attacks). In: 2nd International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2009), Aug 2009, London, UK.

Qi, M. (2009) Service composition with Al planning. In: Li, M. and Yu, B., eds. Cyberinfrastructure Technologies and Applications. Nova Science Publishers Inc. pp. 179-197 ISBN 9781606920633

Qi, M. (2012) Social media in law enforcement: the role and issues. In: the 6th International Conference on Cybercrime Forensics Education and Training CFET 2012, 6 and 7 Sept 2012, Canterbury.

Qi, M. and Edgar-Nevill, D. (2007) Footprints of cyber criminals. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

Qi, M., Edgar-Nevill, D. and Mousoli, R. (2009) Spam and social effects. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIT-ATC'09, July 2009, IEEE Computer Society Press, Brisbane, Australia.

Qi, M., Hentschel, M., Li, M. and Ponraj, M. (2009) Distributed indexing for resource discovery in P2P(Peer to Peer) networks. In: Proceedings of IEEE CCGrid/ServP2P Workshop, May 2009, Shanghai, China.

Qi, M. and Mousoli, R. (2010) Semantic analysis for spam filtering. In: 6th International Conference on Natural Computation and the 7th International Conference on Fuzzy Systems and Knowledge Discovery, 10 - 12 August 2010, Yantai, China.

Qi, M. and Wang, Y. (2010) Cybercrime and relevant legislation in China. In: Reich, P., ed. Cybercrime and Security. Oxford: Oxford University Press. pp. 1-34 ISBN 9780379012811

Qi, M. and Wang, Y. (2010) Protecting intellectual property and computer software: legislation in China. In: 4th International Conference on Cybercrime Forensics Education and Training, 2 - 3 September 2010, Canterbury Christ Church University. (Unpublished)

Qi, M., Wang, Y. and Xu, R. (2008) Cybercrime legislation in China. In: 2nd Annual International Conference on Cybercrime Forensics Education and Training, 1 - 2 September 2008, Canterbury Christ Church University.

Qi, M., Wang, Y. and Xu, R. (2009) Fighting cybercrime: legislation in China. International Journal of Electronic Security and Digital Forensics, 2 (2). pp. 219-227. ISSN 1751-911X.

Qi, M., Wang, Y. and Xu, R. (2008) A case-based reasoning model for digital intrusion forensics. In: 2nd Annual International Conference on Cybercrime Forensics Education and Training, 1 - 2 September 2008, Canterbury Christ Church University.

S

Sahota, V. and Bayford, R. (2010) Jinv: a parallel method for distributed matrix inversion. In: UNSPECIFIED, ed. Developments in E-systems Engineering (DESE 2010). IEEE. pp. 163-167 ISBN 9781424480449

Sahota, V., Li, M., Baker, M. and Antonopoulos, N. (2009) A grouped P2P network for scalable grid information services. Peer-to-Peer Networking and Applications, 2 (1). pp. 3-12. ISSN 1936-6442.

Sahota, V., Li, M. and Bayford, R. (2013) A novel algorithm for online exact string matching. In: UNSPECIFIED, ed. 2013 Third International Conference on Innovative Computing Technology (INTECH). Picastaway, New Jersey: IEEE. pp. 291-295 ISBN 9781479900473

Sahota, V., Li, M. and Hadjinicolaou, M. (2010) Modelling scalable grid information services with colored Petri nets. International Journal of Grid and High Performance Computing, 2 (1). pp. 51-68. ISSN 1938-0259.

Sahota, V., Maozhen, L. and Bayford, R. (2013) MPS: improving exact string matching through pattern character frequency. Journal of Data Processing, 3 (3). pp. 127-137. ISSN 2278-6481.

Stephens, P. (2013) Cutting the costs of cybercrime forensics training without cutting corners. In: The Fourth Annual Conference of the Higher Education Forum for Learning and Development in Policing (POLCON 4), September 3-4 2013, Canterbury Christ Church University, Canterbury, UK.

Stephens, P. (2007) Cybercrime training versus computer forensics education. In: 1st International Conference on Cybercrime Forensics Education and Training, 6 - 7 September 2007, Canterbury Christ Church University.

Stephens, P. (2008) IPR and technological protection measures. In: Bryant, R., ed. Investigating Digital Crime. Chichester: Wiley. pp. 121-131 ISBN 9780470516003

Stephens, P. (2009) Teaching ''Linux as a Forensic Tool'' (Online) to European Law Enforcement. In: Readings in Technology and Education, July 2009, Ionian University/University of the Fraser Valley, Corfu, Greece.

Stephens, P. (2009) Teaching European law enforcement forensic scripting using bash. In: 3rd International Conference on Cybercrime Education and Training (CFET 2009), Sept 2009, Canterbury Christ Church University, Kent, UK.

Stephens, P. (2010) Teaching the police to program: building a simple IDE to teach shell scripting and reduce syntax errors. In: INTED2010 (International Technology, Education and Development Conference), 8-10 March 2010, Valencia, Spain.

Stephens, P. (2008) Why should we be teaching Linux forensics? In: 4th Higher Education Academy ICS Workshop on Teaching Computer Forensics, 27 November 2008, University of Glamorgan, Wales.

Stephens, P. (2012) An evaluation of Linux Cybercrime Forensics courses for European law enforcement. In: Clarke, N. and Furnell, S., eds. Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012). Plymouth University. pp. 119-128 ISBN 9781841023175

Stephens, P. (2008) The future of forensic computing: challenges, techniques and tools. In: Petratos, P. and Marcoulides, G.A., eds. Recent Advances in Computing and Management Information Systems. Athens: Athens Institute for Education and Research. pp. 55-62 ISBN 9789606672507

Stephens, P. and Childs, D. (2008) An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl. In: 2nd Annual International Conference on Cybercrime Forensics Education and Training, 1 - 2 September 2008, Canterbury Christ Church University.

Stephens, P. and Edgar-Nevill, D. (2008) Dealing with contract cheating: policies and procedures. In: HEA ICS Contract Cheating Workshop, 7 March 2008, Birmingham City University.

Stephens, P. and Edgar-Nevill, D. (2008) Developing cybercrime forensics: the growing pains of a new discipline. In: Petratos, P. and Dandapani, P., eds. Current Advances in Computing, Engineering and Information. Athens: Athens Institute for Education and Research. pp. 105-114 ISBN 9789606672347

Stephens, P. and Humphries, G. (2014) Resourcing computer forensics courses. In: 10th Annual Teaching Computer Forensics Workshop, 13 November 2014, University of Sunderland, Sunderland, UK. (Unpublished)

Stephens, P. and Induruwa, A. (2007) Cybercrime investigation training and specialist education for the European Union. In: 2nd International Workshop on Digital Forensics and Incident Analysis, 27 - 28 August, Samos, Greece.

Stephens, P. and Quay-Ross, A. (2013) Quantifying the problem of live data forensics. In: Higher Education Academy HEA STEM (Computing): Teaching Computer Forensics, November 14 2013, University of Sunderland, Sunderland, UK.

Stephens, P. and Stock, G. (2008) Group-based assignments in computing courses. In: 9th Annual Conference of the Higher Education Academy ICS, August 2008, Liverpool Hope University.

Stephens, P. and Stock, G. (2008) What can a computer forensics examiner learn from an ethical hacker? In: 2nd Annual International Conference on Cybercrime Forensics Education and Training, 1 - 2 September 2008, Canterbury Christ Church University.

Stock, G. (2009) The impact of extrinsic factors on the success of group-based assignments in undergraduate courses. In: International Technology, Education and Development Conference, March 2009, Valencia, Spain.

T

Townsend, J. and Heron, M. (2013) Authorship and autership in the collaborative development process of text-based games. In: Chercher Le Texte: Locating the Text in Electronic Literature, 23-28 September 2013, Paris, France.

Tyack, Charles S. M. and Camic, Paul M. (2017) Touchscreen interventions and the wellbeing of people with dementia and caregivers: a systematic review. International Psychogeriatrics. ISSN 1041-6102.

V

Vega, A. and Brown, D. (2011) Systems of innovation, multidisciplinarity and methodological pluralism: a realist approach to guide the future of information systems research and practice. In: Chiasson, M., Henfridsson, O., Karsten, H. and DeGross, J., eds. Researching the Future in Information Systems. IFIP Advances in Information and Communication Technology (356). London: Springer. pp. 249-268 ISBN 9783642213632

Vega, A. and Brown, D. (2011) Systems of innovation, multidisciplinarity and methodological pluralism: a realist approach to guide the future of information systems research and practice. In: Researching the Future: IFIP WG8.2 Working Conference, 6-8 June 2011, Turku, Finland.

Vega, A., Chiasson, M. and Brown, D. (2010) Critical realism, multidisciplinarity and methodological pluralism: a systemic approach to guide information systems research and practice. In: 16th Americas Conference on Information Systems: Sustainable IT Collaboration Around the Globe, 12-15 August 2010, Lima, Peru.

Vega, A., Chiasson, M. and Brown, D. (2007) Extending the research agenda on diffusion of innovations: the role of public programs in the diffusion of e-business innovations. In: IFIP 8.6 Conference 2007, 14-16 June 2007, Manchester.

Vega, A., Chiasson, M. and Brown, D. (2010) A systems perspective to improve the public support to enterprise innovation: the case of information systems diffusion in SMEs. In: Public Administration Committee (PAC) Conference, 6-8 September 2010, Nottingham.

Vernon, D. (2008) Neurofeedback: using computer technology to alter brain functioning. In: Orsucci, F. and Sala, N., eds. Reflexing Interfaces: The Complex Coevolution of Information Technology Ecosystems. Hershey, Pennsylvania, USA: IGI Global. pp. 94-108 ISBN 9781599046273

W

Watts, P. (2002) Cyber schmyber: or how I learned to stop worrying and love the net. In: Cummings, D., ed. The Internet: Brave New World? Debating Matters. Hodder and Stoughton. pp. 1-17 ISBN 9780340848418

Williams, J. (2016) An open source "open source internet research tool". In: BCS Cybercrime Forensics and the Open Source SGs, BCS Hampshire Branch, June 9th 2016, Southampton Solent University, Southampton.

Wu, T., Li, M. and Qi, M. (2010) Optimizing peer selection in BitTorrent networks with genetic algorithms. Future Generation Computer Systems, 26 (8). pp. 1151-1156. ISSN 0167-739X.

Y

Yavari, M., Li, M., Li, Shujun and Qi, M. (2015) Parallelizing abnormal event detection in crowded scenes with GPU. In: The12th IEEE International Conference on Fuzzy Systems and Knowledge Discovery (FSKD'15), 15-17 Aug 2015, Zhangjiajie, China.

This list was generated on Fri Nov 17 12:19:06 2017 UTC.

Share

Connect with us

Last edited: 29/06/2016 12:23:00