图表证明 发表于 2025-3-23 11:45:13

http://reply.papertrans.cn/24/2324/232313/232313_11.png

homeostasis 发表于 2025-3-23 14:29:30

http://reply.papertrans.cn/24/2324/232313/232313_12.png

condescend 发表于 2025-3-23 20:17:31

http://reply.papertrans.cn/24/2324/232313/232313_13.png

Cholagogue 发表于 2025-3-24 00:26:22

Automatic Creation of Computer Forensic Test Imagesoes on to discuss and review a tool developed for this task. The tool creates NTFS images based on user-selectable data hiding and timeline management. In this paper we document both the creation of the tool and report on its use in a variety of test situations.

Cupping 发表于 2025-3-24 03:47:37

http://reply.papertrans.cn/24/2324/232313/232313_15.png

课程 发表于 2025-3-24 07:33:17

http://reply.papertrans.cn/24/2324/232313/232313_16.png

BLINK 发表于 2025-3-24 13:15:58

http://reply.papertrans.cn/24/2324/232313/232313_17.png

concert 发表于 2025-3-24 16:57:41

http://reply.papertrans.cn/24/2324/232313/232313_18.png

是贪求 发表于 2025-3-24 21:27:57

http://reply.papertrans.cn/24/2324/232313/232313_19.png

Entreaty 发表于 2025-3-25 01:34:25

https://doi.org/10.1007/978-3-030-86252-7lation and conclude that using this variability for passphrase creation (e.g. during the enrollment process) helps to significantly increase the performance of speaker verification and speaker identification systems.
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Computational Forensics; 5th International Wo Utpal Garain,Faisal Shafait Conference proceedings 2015 Springer International Publishing Swi