Search

Your search keyword '"Lawful interception"' showing total 227 results

Search Constraints

Start Over You searched for: Descriptor "Lawful interception" Remove constraint Descriptor: "Lawful interception"
227 results on '"Lawful interception"'

Search Results

51. The Indonesian Law Enforcement Challenges over Encrypted Global Social Networking Platforms

52. Techniques study of IMS/SIP based Lawful Interception in 3G networks

53. Study on Trends in Standardization of Lawful Interception and the Continuous Packet Capture in Heterogeneous Networks

54. Digital Wiretap Warrant: Improving the security of ETSI Lawful Interception

55. WhatsApp network forensics: Discovering the communication payloads behind cybercriminals

56. Digital Privacy in Africa: Cybersecurity, Data Protection & Surveillance

57. LiaaS: Lawful Interception as a Service

58. Fast RTP Detection and Codecs Classification in Internet Traffic

59. On Identities in Modern Networks

60. High-speed flow-based classification on FPGA

61. Low-cost and high-performance: VoIP monitoring and full-data retention at multi-Gb/s rates using commodity hardware

62. On the Optimal Lawful Intercept Access Points Placement Problem in Hybrid Software-Defined Networks.

63. Netfox detective: A novel open-source network forensics analysis tool.

64. 3G IP Multimedia Subsystem based framework for lawful interception

65. Detection of Encrypted Multimedia Traffic through Extraction and Parameterization of Recurrence Plots

66. Monitoring and Protection Techniques

67. Lawful interception and retention of data in the electronic communications

68. Secure SIP authentication scheme supporting lawful interception

69. Decision Tree Based Rules Redistribution Algorithm for IP Monitoring of Lawful Interception on IPv4 Networks

70. A three-level authenticated conference key establishment protocol for UMTS networks

71. A Real-time Crime Detection System Based on Lawful Interception - A Case Study of MSN Messenger

72. Computational approaches to suspicion in adversarial settings

73. An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan

74. A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks

75. A seamless lawful interception architecture for mobile users in IEEE 802.16e networks

76. An efficient end-to-end security mechanism for IP multimedia subsystem

77. Lawful interception – key concepts, actors, trends and best practice considerations

78. The mechanics of lawful interception

79. Odposlech a záznam telekomunikačního provozu v trestním řízení vedeném proti právnické osobě

80. A Decision Theory Based Tool for Detection of Encrypted WebRTC Traffic

81. Revealing Encrypted WebRTC Traffic via Machine Learning Tools

82. Secure SMS Communication Using Encryption Gateway and Digital Signature

83. CluClas: Hybrid clustering-classification approach for accurate and efficient network classification

84. Indonesia: the controversy over the Bill concerning lawful interception

85. A Bloom Filter-Based Monitoring Station for a Lawful Interception Platform

86. Skype Traffic Classification Using Cost Sensitive Algorithms

87. Meeting lawful interception requirements for selected IP traffic offload and local IP access traffic

88. Copra: Conditional pseudonym resolution algorithm in VANETs

89. För din och andras säkerhet : Konstitutionella proportionalitetskrav och Säkerhetspolisens preventiva tvångsmedel

90. For Security Reasons : Constitutional Proportionality and the Electronic Intelligence Gathering Mandate of the Swedish Security Service

91. OPINIOWANIE PRZEZ BIEGŁEGO Z ZAKRESU SLANGU NARKOTYKOWEGO I PRZESTĘPCZOŚCI NARKOTYKOWEJ NA PODSTAWIE MATERIAŁÓW NIEJAWNYCH UZYSKANYCH W WYNIKU PODSŁUCHU TELEFONICZNEGO

92. Packet Inspection — Shifting the Paradigm of Fundamental Rights

93. Experimental Analysis of the Femtocell Location Verification Techniques

94. Law Enforcement 2.0: Regulating the Lawful Interception of Social Media

95. A security analysis of smartphone data flow and feasible solutions for lawful interception

96. Speaker Spotting: Automatic Telephony Surveillance for Homeland Security

97. Lawful interception data retention regulation recommendation: Recommendations for countries that do not have relevant regulations of this field

98. An Integrative System for Deep Packet Inspection and Network Anomaly Detection & Defense

99. ETSI security standardization

100. Secure application access to IMS via 4G GAA architecture

Catalog

Books, media, physical & digital resources