-
1“... with those reported in the literature for qualitative forensic investigations. The most often causes of RSS...”
Get full text
Others -
2“... of the forensic accounting. Further, based on Taiwan’s fraud case and forensic human resource, this paper provides...”
Get full text
Others -
3“... and Chinese characters for digital forensics. This study uses Japanese characters as the experimental samples...”
Get full text
Others -
4“... because it involves in the property right and the right of personal liberty. Using engineering kickback...”
Get full text
Others -
5“... applied to various fields like Medical Science, Mathematics, Biology, Meteorology, Engineer Science...”
Get full text
Others -
6“... for network security engineers. IETF proposed an ICMP-based Traceback solution, but it faces severe practical...”
Get full text
Others -
7“...碩士 === 東吳大學 === 會計學系 === 103 === America's "forensic accounting" began in 1953 published by Max...”
Get full text
Others -
8by 林愷庭“... Engineering on malware analysis is a process which is used on malware in order to understand its operation...”
Published 2012
Get full text
Others -
9“...-plasticity silty sand with fine particles and low-plastic. In engineering design, low-plasticity silty sand...”
Get full text
Others -
10“... nature combined with “social engineering.” It perfectly utilizes zero-day attack, in connection with weak...”
Get full text
Others -
11“... for management is lacking in the relevant research on building''s life-cycle and the building forensic problems...”
Get full text
Others -
12“... that is in charge of the 3 E policies (traffic engineering, education, and enforcement), so as to improve traffic...”
Get full text
Others -
13by 許阿明“... switched from building new network in the past to maintaining current network at present. Engineer’s...”
Published 2002
Get full text
Others -
14“... is the most important research issue in the field of digital forensics. By means of malware classification, we...”
Get full text
Others -
15“... object is steal sensitive information. Such attack type usually accompanies Social Engineering or zero...”
Get full text
Others -
16“..., Basic Oxygen Furnace Slag for pavement engineering will still be restricted. This study by up...”
Get full text
Others -
17“... analysis, which first performs static analysis. We use reverse engineering for application and analyze...”
Get full text
Others -
18“... engineering, industrial design, quality control and defect detection, monuments preservation, guide device...”
Get full text
Others