Search

Your search keyword '"Lawful interception"' showing total 72 results

Search Constraints

Start Over You searched for: Descriptor "Lawful interception" Remove constraint Descriptor: "Lawful interception" Topic computer Remove constraint Topic: computer
72 results on '"Lawful interception"'

Search Results

1. Requirements of EU law enforcement agencies for lawful interception of information in electronic communications networks

2. IPvest: Clustering the IP Traffic of Network Entities Hidden Behind a Single IP Address Using Machine Learning

3. An Efficient Network Classification Based on Various-Widths Clustering and Semi-Supervised Stacking

4. Escrowed decryption protocols for lawful interception of encrypted data

5. A Secure Encapsulation Schemes Based on Key Recovery System

6. Lawful Interception in WebRTC Peer-To-Peer Communication

7. Pegasus Spyware – 'A Privacy Killer'

8. A Solution to Support Integrity in the Lawful Interception Ecosystem

9. Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations

10. A hybrid clustering-classification for accurate and efficient network classification

11. Requirements Analysis Required--Otherwise Targeted Monitoring Enables Pervasive Monitoring

12. Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations

13. Improving Lawful Interception in Virtual Datacenters

14. Defeating the Downgrade Attack on Identity Privacy in 5G

15. Study on Trends in Standardization of Lawful Interception and the Continuous Packet Capture in Heterogeneous Networks

16. Digital Wiretap Warrant: Improving the security of ETSI Lawful Interception

17. WhatsApp network forensics: Discovering the communication payloads behind cybercriminals

18. Digital Privacy in Africa: Cybersecurity, Data Protection & Surveillance

19. LiaaS: Lawful Interception as a Service

20. On Identities in Modern Networks

21. 3G IP Multimedia Subsystem based framework for lawful interception

22. Implementation and performance of VoIP interception based on SIP session border controller

23. NFV Security: Emerging Technologies and Standards

24. Detection of Encrypted Multimedia Traffic through Extraction and Parameterization of Recurrence Plots

25. Monitoring and Protection Techniques

26. Secure SIP authentication scheme supporting lawful interception

27. Decision Tree Based Rules Redistribution Algorithm for IP Monitoring of Lawful Interception on IPv4 Networks

28. A three-level authenticated conference key establishment protocol for UMTS networks

29. A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

30. A Real-time Crime Detection System Based on Lawful Interception - A Case Study of MSN Messenger

31. Computational approaches to suspicion in adversarial settings

32. An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan

33. A seamless lawful interception architecture for mobile users in IEEE 802.16e networks

34. An efficient end-to-end security mechanism for IP multimedia subsystem

35. Lawful interception – key concepts, actors, trends and best practice considerations

36. The mechanics of lawful interception

37. A Decision Theory Based Tool for Detection of Encrypted WebRTC Traffic

38. Revealing Encrypted WebRTC Traffic via Machine Learning Tools

39. Secure SMS Communication Using Encryption Gateway and Digital Signature

40. CluClas: Hybrid clustering-classification approach for accurate and efficient network classification

41. Regulating Social Network Services for Lawful Interception

42. Meeting lawful interception requirements for selected IP traffic offload and local IP access traffic

43. Copra: Conditional pseudonym resolution algorithm in VANETs

44. Packet Inspection — Shifting the Paradigm of Fundamental Rights

45. Experimental Analysis of the Femtocell Location Verification Techniques

46. Law Enforcement 2.0: Regulating the Lawful Interception of Social Media

47. A security analysis of smartphone data flow and feasible solutions for lawful interception

48. Speaker Spotting: Automatic Telephony Surveillance for Homeland Security

49. Lawful interception data retention regulation recommendation: Recommendations for countries that do not have relevant regulations of this field

50. ETSI security standardization

Catalog

Books, media, physical & digital resources