nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative methodology for the reconstruction of digital events using windows restore points
|
Zhu, Yuandong |
|
2009 |
|
1-2 |
p. 8-15 8 p. |
artikel |
2 |
An adaptive method to identify disk cluster size based on block content
|
Xu, Ming |
|
2010 |
|
1-2 |
p. 48-55 8 p. |
artikel |
3 |
Analysis of Internet Download Manager for collection of digital forensic artefacts
|
Yasin, Muhammad |
|
2010 |
|
1-2 |
p. 90-94 5 p. |
artikel |
4 |
An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan
|
Cheng, Fa-Chang |
|
2010 |
|
1-2 |
p. 81-89 9 p. |
artikel |
5 |
A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1
|
Byers, David |
|
2009 |
|
1-2 |
p. 61-70 10 p. |
artikel |
6 |
Case study: Forensic analysis of a Samsung digital video recorder
|
van Dongen, Wouter S. |
|
2008 |
|
1-2 |
p. 19-28 10 p. |
artikel |
7 |
Classification of digital camera-models based on demosaicing artifacts
|
Bayram, Sevinc |
|
2008 |
|
1-2 |
p. 49-59 11 p. |
artikel |
8 |
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors
|
Byers, David |
|
2008 |
|
1-2 |
p. 29-33 5 p. |
artikel |
9 |
Digital forensics: Coming of age
|
Casey, Eoghan |
|
2009 |
|
1-2 |
p. 1-2 2 p. |
artikel |
10 |
Digital Investigation as a distinct discipline: A pedagogic perspective
|
Irons, A.D. |
|
2009 |
|
1-2 |
p. 82-90 9 p. |
artikel |
11 |
Digital investigations, security and privacy
|
Casey, Eoghan |
|
2010 |
|
1-2 |
p. 1-2 2 p. |
artikel |
12 |
FAUST: Forensic artifacts of uninstalled steganography tools
|
Zax, Rachel |
|
2009 |
|
1-2 |
p. 25-38 14 p. |
artikel |
13 |
Forensic analysis of GPT disks and GUID partition tables
|
Nikkel, Bruce J. |
|
2009 |
|
1-2 |
p. 39-47 9 p. |
artikel |
14 |
Forensic investigation of Microsoft PowerPoint files
|
Park, Jungheum |
|
2009 |
|
1-2 |
p. 16-24 9 p. |
artikel |
15 |
Impersonator identification through dynamic fingerprinting
|
Steel, Chad M.S. |
|
2008 |
|
1-2 |
p. 60-70 11 p. |
artikel |
16 |
Lessons not learned on data disposal
|
Jones, Andy |
|
2009 |
|
1-2 |
p. 3-7 5 p. |
artikel |
17 |
Locating ×86 paging structures in memory images
|
Saur, Karla |
|
2010 |
|
1-2 |
p. 28-37 10 p. |
artikel |
18 |
Mining writeprints from anonymous e-mails for forensic investigation
|
Iqbal, Farkhund |
|
2010 |
|
1-2 |
p. 56-64 9 p. |
artikel |
19 |
Network forensic frameworks: Survey and research challenges
|
Pilli, Emmanuel S. |
|
2010 |
|
1-2 |
p. 14-27 14 p. |
artikel |
20 |
[No title]
|
Hilley, S. |
|
2008 |
|
1-2 |
p. 3-5 3 p. |
artikel |
21 |
Photoshop CS3 for forensics professionals
|
Forster, Peter F.R. |
|
2009 |
|
1-2 |
p. 91- 1 p. |
artikel |
22 |
Pinpointing TomTom location records: A forensic analysis
|
Nutter, Beverley |
|
2008 |
|
1-2 |
p. 10-18 9 p. |
artikel |
23 |
Prelim i - Editorial Board
|
|
|
2009 |
|
1-2 |
p. i- 1 p. |
artikel |
24 |
Prelim i - Editorial Board
|
|
|
2010 |
|
1-2 |
p. i- 1 p. |
artikel |
25 |
Prelim i - Editorial Board
|
|
|
2008 |
|
1-2 |
p. i- 1 p. |
artikel |
26 |
Recovering erased digital evidence from CD-RW discs in a child exploitation investigation
|
Wardwell, James |
|
2008 |
|
1-2 |
p. 6-9 4 p. |
artikel |
27 |
Robust performance testing for digital forensic tools
|
Pan, Lei |
|
2009 |
|
1-2 |
p. 71-81 11 p. |
artikel |
28 |
Sequenced release of privacy-accurate information in a forensic investigation
|
Croft, N.J. |
|
2010 |
|
1-2 |
p. 95-101 7 p. |
artikel |
29 |
Source video camera identification for multiply compressed videos originating from YouTube
|
van Houten, Wiger |
|
2009 |
|
1-2 |
p. 48-60 13 p. |
artikel |
30 |
Speaker recognition from encrypted VoIP communications
|
Khan, L.A. |
|
2010 |
|
1-2 |
p. 65-73 9 p. |
artikel |
31 |
Speaker verification from partially encrypted compressed speech for forensic investigation
|
Khan, L.A. |
|
2010 |
|
1-2 |
p. 74-80 7 p. |
artikel |
32 |
State of the Journal
|
Casey, Eoghan |
|
2008 |
|
1-2 |
p. 1-2 2 p. |
artikel |
33 |
The Digital Crime Tsunami
|
Gogolin, Greg |
|
2010 |
|
1-2 |
p. 3-8 6 p. |
artikel |
34 |
Why computer forensic professionals shouldn't be required to have private investigator licenses
|
Schwerha IV, Joseph J. |
|
2008 |
|
1-2 |
p. 71-72 2 p. |
artikel |
35 |
Windows mobile advanced forensics: An alternative to existing tools
|
Rehault, Frederick |
|
2010 |
|
1-2 |
p. 38-47 10 p. |
artikel |
36 |
Windows Vista and digital investigations
|
Hargreaves, Christopher |
|
2008 |
|
1-2 |
p. 34-48 15 p. |
artikel |
37 |
WinRAR temporary folder artefacts
|
Fellows, Geoffrey |
|
2010 |
|
1-2 |
p. 9-13 5 p. |
artikel |