Academic Papers & Research
156 posts
-
Academic Papers & Research Blockchain and Digital Assets: A New Paradigm for Copyright and Patent Distribution through Micropayments
-
Academic Papers & Research Driving Innovation: Exploring Essential Theories in Innovation Management for Blockchain and Automation
-
Academic Papers & Research Geographical Aspects of Cybercrime: A Literature Review
-
Academic Papers & Research Corporate Sustainability and Social Responsibility are about Resilient Companies
-
Academic Papers & Research A Quantitative Analysis into the Economics of Correcting Software Bugs
-
Academic Papers & Research A Question of Platinum Plus
-
Academic Papers & Research A Step-by-Step Introduction to Using the AUTOPSY Forensic Browser
-
Academic Papers & Research An Analysis of SpyKing
-
Academic Papers & Research Building a Unix/Linux Incident response / Forensic Disk
-
Academic Papers & Research Code in a Flash
-
Academic Papers & Research Code Skills Make Better Forensic Analysts
-
Academic Papers & Research Data Recovery: ECC Data and Recovery
-
Academic Papers & Research Finding Out About Oher Users on a Linux System
-
Academic Papers & Research Finer Points of Find
-
Academic Papers & Research Forensics and Data Access Auditing
-
Academic Papers & Research Free Windows Drive Tools
-
Academic Papers & Research From Bitcoin to Bitcoin Cash: A Network Analysis
-
Academic Papers & Research Hex Dumping Flash From a Mobile
-
Academic Papers & Research How Math Can Help With Forensics
-
Academic Papers & Research Live Investigations
-
Academic Papers & Research Modeling a Double-Spending Detection System for the Bitcoin Network
-
Academic Papers & Research Of Black Swans, Platypii and Bunyips: The outlier and normal incident in risk management
-
Academic Papers & Research Overwriting Can Occur Anytime, As Long As it is Done Once After
-
Academic Papers & Research Overwriting Hard Drive Data: The Great Wiping Controversy
-
Academic Papers & Research Overwriting Hard Drive Data
-
Academic Papers & Research Packer Analysis Report-Debugging and Unpacking the NsPack 3.4 and 3.7 Packer
-
Academic Papers & Research Reverse Engineering Java
-
Academic Papers & Research Searches and the US 4th Amendment
-
Academic Papers & Research Simple Anti-Forensic and Signature stamping techniques using Unicode
-
Academic Papers & Research Spin-Stand Microscopy of Hard Disk Data
-
Academic Papers & Research SQL, Databases and Forensics
-
Academic Papers & Research SQL Rootkits
-
Academic Papers & Research Starting a Drive Repair/Recovery Lab
-
Academic Papers & Research System Scanner
-
Academic Papers & Research System State Backup
-
Academic Papers & Research The Economics of Developing Security Embedded Software
-
Academic Papers & Research Unix Logging
-
Academic Papers & Research Unix Network and System Profiling
-
Academic Papers & Research Unix System Accounting and Process Accounting
-
Academic Papers & Research Using Checklists to Make Better Best
-
Academic Papers & Research Using HELIX Live for Windows
-
Academic Papers & Research What Happens When You Overwrite Data?
-
Academic Papers & Research Live Capture Procedures
-
Academic Papers & Research A Comparative Study of Attacks Against Corporate IIS and Apache Web Servers
-
Academic Papers & Research A Distribution Protocol for Dealerless Secret Distribution
-
Academic Papers & Research A Preamble Into Aligning Systems Engineering and Information Security Risk Measures
-
Academic Papers & Research A Preamble Into Aligning Systems Engineering and Information Security Risk
-
Academic Papers & Research A Proof of Turing Completeness in Bitcoin Script
-
Academic Papers & Research A Taxonomy of Information Systems Audits, Assessments and Reviews
-
Academic Papers & Research An Analysis of Psychometric Testing for the COO Role
-
Academic Papers & Research Analysis of a Serial Based Digital Voice Recorder
-
Academic Papers & Research Anecdote and Hearsay in Science: The Need To Validate Source Material
-
Academic Papers & Research Arab Colonialism and the Roots of the Golden Age of Islam
-
Academic Papers & Research Are Credences a Measure of Belief or Rather Subjective Guess at the Probability the Belief Exists?
-
Academic Papers & Research Beyond Automated Tools and Frameworks: The Shellcode Injection Process
-
Academic Papers & Research Beyond Godel
-
Academic Papers & Research Bitcoin: A Peer-to-Peer Electronic Cash System
-
Academic Papers & Research Bitcoin: A Total Turing Machine
-
Academic Papers & Research Bitcoin and Quantum Computing
-
Academic Papers & Research Bitcoin: SEIR-C Propagation Models of Block and Transaction Dissemination
-
Academic Papers & Research Bitcoin: The Most Law-Abiding System Ever Created.
-
Academic Papers & Research Blake and Milton Reactionary and Revolutionary
-
Academic Papers & Research Choosing Your Turtle
-
Academic Papers & Research Communism, Envy, and the Desire to Promote Toxic Equality
-
Academic Papers & Research Contextualising Information About Aesthetics
-
Academic Papers & Research Criminal Specialization as a Corollary of Rational Choice
-
Academic Papers & Research Current Issues in DNS
-
Academic Papers & Research Decentralisation
-
Academic Papers & Research Decentralized Autonomous Corporation
-
Academic Papers & Research DPA Exploitation and GOTs With Python
-
Academic Papers & Research Electronic Contracting in an Insecure World
-
Academic Papers & Research Electronic Contracting, New Wine in Old Bottles
-
Academic Papers & Research Erasing Drives Should Be Quick and Easy
-
Academic Papers & Research Establishing Meaning in the First Amendment
-
Academic Papers & Research Exploiting Format Strings With Python
-
Academic Papers & Research Extending Control, API Hooking
-
Academic Papers & Research Forensic Profiling of ‘Cryptocurrency’ Criminals
-
Academic Papers & Research Group Selection and Cyber Terror
-
Academic Papers & Research Hard Drive Errors and Replacements
-
Academic Papers & Research Implementing an Information Security Management System (ISMS) Training process
-
Academic Papers & Research Kim: The Revolution Devours Its Own, Over and Over
-
Academic Papers & Research Liberty or death
-
Academic Papers & Research Linux Programming Tools
-
Academic Papers & Research Understanding Conditionals in Shellcode
-
Academic Papers & Research Madison and Federalist 10: Why Extrinsic Information Matters in Defining a System
-
Academic Papers & Research Modeling System Audit as a Sequential test with Discovery as a Failure Time Endpoint
-
Academic Papers & Research NDIFF for Incident Detection
-
Academic Papers & Research Neoliberalism and Doublespeak
-
Academic Papers & Research Payments Providers and Intermediaries as Defined in the Law of the Internet
-
Academic Papers & Research Philosophy of Cognitive Science and Classical Computation
-
Academic Papers & Research Probabilistic Settlement Finality in Proof-of-Work Blockchains: Legal Considerations
-
Academic Papers & Research Prometheus: Choosing to be Bound
-
Academic Papers & Research Proof of Work as it Relates to the Theory of the Firm
-
Academic Papers & Research Requirements for Record Keeping and Document Destruction in a Digital World
-
Academic Papers & Research Rome and the Road to the Distant East
-
Academic Papers & Research Searching for Exploits, SCAPY Fuzzing
-
Academic Papers & Research Simmering Conflicts and War by Other Means: The Seleukid Empire of Antiochus III
-
Academic Papers & Research Sisyphus Impenitent
-
Academic Papers & Research Starting to Write Your Own Linux Shellcode
-
Academic Papers & Research Taking Control, Functions to DLL Injection
-
Academic Papers & Research Testing Homogeneity of Variance
-
Academic Papers & Research The Banality of the Monsterous
-
Academic Papers & Research The Changes to Cultural Identity in a Global World
-
Academic Papers & Research The Evolution of Meaning: The Foundation of the American State Papers
-
Academic Papers & Research The Fallacy of Selfish Mining in Bitcoin: A Mathematical Critique
-
Academic Papers & Research The Great Gatsby: Limits on Social Mobility
-
Academic Papers & Research The Illusion of Scale in Segregated Witness
-
Academic Papers & Research The Impact of Internet Intermediary Liability
-
Academic Papers & Research The Irrationality Defense of Paternalism
-
Academic Papers & Research The Odyssey: An Endless Story of Reaching Home
-
Academic Papers & Research The Philosophy of Time
-
Academic Papers & Research The Scene and the Unseen
-
Academic Papers & Research There’s Nothing but Data Out There
-
Academic Papers & Research Those Who Are Left Behind
-
Academic Papers & Research Treating Generalised Anxiety Disorder (GAD)
-
Academic Papers & Research Turing Complete Bitcoin Script White Paper
-
Academic Papers & Research Understanding *NIX File Linking (ln)
-
Academic Papers & Research What Makes an Expert?
-
Academic Papers & Research Bitcoin Archives
-
Academic Papers & Research Colonialism Archives
-
Academic Papers & Research Commerce Archives
-
Academic Papers & Research Communism Archives
-
Academic Papers & Research Constitution Archives
-
Academic Papers & Research Cryptography Archives
-
Academic Papers & Research Cultures Archives
-
Academic Papers & Research Cybercrime Archives
-
Academic Papers & Research Data Archives
-
Academic Papers & Research Decolonisation Archives
-
Academic Papers & Research Digital Forensics Archives
-
Academic Papers & Research Diplomacy Archives
-
Academic Papers & Research Document Management Archives
-
Academic Papers & Research Education Archives
-
Academic Papers & Research Enforcement Archives
-
Academic Papers & Research Freedom Archives
-
Academic Papers & Research Globalisation Archives
-
Academic Papers & Research Government Archives
-
Academic Papers & Research Hardware Archives
-
Academic Papers & Research Information Security Archives
-
Academic Papers & Research International Relations Archives
-
Academic Papers & Research Law Archives
-
Academic Papers & Research Mythology Archives
-
Academic Papers & Research Philosophy Archives
-
Academic Papers & Research Psychology Archives
-
Academic Papers & Research Psychometric Testing Archives
-
Academic Papers & Research Psychotherapy Archives
-
Academic Papers & Research Reflection Archives
-
Academic Papers & Research Science Archives
-
Academic Papers & Research Security Archives
-
Academic Papers & Research Social Mobility Archives
-
Academic Papers & Research Society Archives
-
Academic Papers & Research Statistics Archives