Browsing by Author Kechadi, Tahar


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 50 to 69 of 89 < previous   next >
Published DateTitleAuthor(s)
2014Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent SyncScanlon, MarkFarina, JasonLe-Khac, Nhien-AnKechadi, Tahar
20-Sep-2014Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent SyncScanlon, MarkFarina, JasonLe-Khac, Nhien-AnKechadi, Tahar
20-Sep-2014Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study On Bittorent SyncKechadi, TaharScanlon, MarkFarina, JasonLe-Khac, Nhien-An
20-Aug-2016Leveraging IMU Data for Accurate Exercise Performance Classification and Musculoskeletal Injury Risk ScreeningWhelan, DarraghO'Reilly, MartinHuang, BingquanGiggins, Oonagh M.Kechadi, TaharCaulfield, Brian
26-Aug-2016A Lightweight Software Write-blocker for Virtual Machine ForensicsTobin, PatrickLe-Khac, Nhien-AnKechadi, Tahar
20-Aug-2016The limb movement analysis of rehabilitation exercises using wearable inertial sensorsHuang, BingquanGiggins, Oonagh M.Kechadi, TaharCaulfield, Brian
20-Aug-2016The Limb Movement Analysis of Rehabilitation Exercises using Wearable Inertial SensorsHuang, BingquanGiggins, Oonagh M.Kechadi, TaharCaulfield, Brian
8-May-2008Mining Spatio-temporal Data at Different Levels of DetailCamossi, ElenaBertolotto, MichelaKechadi, Tahar
11-Nov-2016Missing Data Analysis Using Multiple Imputation in Relation to Parkinson's DiseaseHouari, RimaBounceur, AhcèneKechadi, Taharet al.
Feb-2013MPM Job Scheduling Problem: a bi-objective approachTselios, DimitriosSavvas, Ilias K.Kechadi, Tahar
29-Oct-2014Network Forensics Readiness and Security Awareness FrameworkAl-Mahrouqi, AadilAbdalla, SamehKechadi, Tahar
Oct-2015Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation ServiceScanlon, MarkFarina, JasonKechadi, Tahar
2016A New Distributed Chinese Wall Security Policy ModelFehis, SaadNouali, OmarKechadi, Tahar
27-Aug-2015Overview of the Forensic Investigation of Cloud ServicesFarina, JasonScanlon, MarkLe-Khac, Nhien-AnKechadi, Tahar
20-Aug-2017Performance Evaluation of a Distributed Clustering Approach for Spatial DatasetsBendechache, MalikaLe-Khac, Nhien-AnKechadi, Tahar
Sep-2014Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigationvan Banerveld, MaartenLe-Khac, Nhien-AnKechadi, Tahar
16-Dec-2017Prediction of NB-UVB phototherapy treatment response of psoriasis patients using data miningMohamed, SharifaHuang, BingquanKechadi, Tahar
Sep-2015Project Maelstrom: Forensic Analysis of the BitTorrent-Powered BrowserFarina, JasonKechadi, TaharScanlon, Mark
31-Jan-2014Reconstruction et analyse smantique de chronologies cybercriminellesKechadi, TaharChabot, YoanBertaux, AurélieNicolle, Christophe
2014Reference Architecture for a Cloud Forensic Readiness SystemDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar