nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A critical review of 7 years of Mobile Device Forensics
|
Barmpatsalou, Konstantia |
|
2013 |
|
4 |
p. 323-349 27 p. |
artikel |
2 |
An examination into AOL Instant Messenger 5.5 contact identification
|
Dickson, Mike |
|
2006 |
|
4 |
p. 227-237 11 p. |
artikel |
3 |
A novel classification model for data theft detection using advanced pattern mining
|
Patel, Pratik C. |
|
2013 |
|
4 |
p. 385-397 13 p. |
artikel |
4 |
Approaches to the classification of high entropy file fragments
|
Penrose, Philip |
|
2013 |
|
4 |
p. 372-384 13 p. |
artikel |
5 |
A social graph based text mining framework for chat log investigation
|
Anwar, Tarique |
|
2014 |
|
4 |
p. 349-362 14 p. |
artikel |
6 |
A tribute to Gordon Stevenson
|
|
|
2005 |
|
4 |
p. 235-236 2 p. |
artikel |
7 |
Case study: A failure in success' clothing
|
Kenneally, Erin E. |
|
2005 |
|
4 |
p. 247-253 7 p. |
artikel |
8 |
Case study: AOL instant messenger trace evidence
|
Reust, Jessica |
|
2006 |
|
4 |
p. 238-243 6 p. |
artikel |
9 |
Case study: Network intrusion investigation – lessons in forensic preparation
|
Casey, Eoghan |
|
2005 |
|
4 |
p. 254-260 7 p. |
artikel |
10 |
Cloud storage forensics: ownCloud as a case study
|
Martini, Ben |
|
2013 |
|
4 |
p. 287-299 13 p. |
artikel |
11 |
Clustering digital forensic string search output
|
Beebe, Nicole L. |
|
2014 |
|
4 |
p. 314-322 9 p. |
artikel |
12 |
Contents List
|
|
|
2014 |
|
4 |
p. iii- 1 p. |
artikel |
13 |
Contents List
|
|
|
2013 |
|
4 |
p. iii- 1 p. |
artikel |
14 |
Criminal profiling and insider cyber crime
|
Nykodym, Nick |
|
2005 |
|
4 |
p. 261-267 7 p. |
artikel |
15 |
Cutting corners: Trading justice for cost savings
|
Casey, Eoghan |
|
2006 |
|
4 |
p. 185-186 2 p. |
artikel |
16 |
Data hiding in the NTFS file system
|
Huebner, Ewa |
|
2006 |
|
4 |
p. 211-226 16 p. |
artikel |
17 |
Detection of frame deletion for digital video forensics
|
Shanableh, Tamer |
|
2013 |
|
4 |
p. 350-360 11 p. |
artikel |
18 |
Determining removal of forensic artefacts using the USN change journal
|
Lees, Christopher |
|
2013 |
|
4 |
p. 300-310 11 p. |
artikel |
19 |
Differential malware forensics
|
Provataki, Athina |
|
2013 |
|
4 |
p. 311-322 12 p. |
artikel |
20 |
Digital arms race – The need for speed
|
Casey, Eoghan |
|
2005 |
|
4 |
p. 229-230 2 p. |
artikel |
21 |
Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings
|
Seigfried-Spellar, Kathryn C. |
|
2014 |
|
4 |
p. 252-260 9 p. |
artikel |
22 |
Distributed filesystem forensics: XtreemFS as a case study
|
Martini, Ben |
|
2014 |
|
4 |
p. 295-313 19 p. |
artikel |
23 |
Domain name forensics: a systematic approach to investigating an internet presence
|
Nikkel, Bruce J. |
|
2004 |
|
4 |
p. 247-255 9 p. |
artikel |
24 |
Editorial Board
|
|
|
2014 |
|
4 |
p. i- 1 p. |
artikel |
25 |
Editorial Board
|
|
|
2013 |
|
4 |
p. i- 1 p. |
artikel |
26 |
Enhancing forensic science through basic and applied research
|
Casey, Eoghan |
|
2013 |
|
4 |
p. 279-280 2 p. |
artikel |
27 |
Erratum to “Evaluating detection error trade-offs for bytewise approximate matching algorithms” [Digit Invest 11 (2) 81–89]
|
Breitinger, Frank |
|
2014 |
|
4 |
p. 363- 1 p. |
artikel |
28 |
Events Calendar
|
|
|
2006 |
|
4 |
p. I- 1 p. |
artikel |
29 |
Examining the state of preparedness of Information Technology management in New Zealand for events that may require forensic analysis
|
Quinn, Spike |
|
2005 |
|
4 |
p. 276-280 5 p. |
artikel |
30 |
FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory
|
Petroni Jr., Nick L. |
|
2006 |
|
4 |
p. 197-210 14 p. |
artikel |
31 |
Forensic examination of mobile phones
|
Mellars, Barrie |
|
2004 |
|
4 |
p. 266-272 7 p. |
artikel |
32 |
Forensics - cred or crud?
|
|
|
2005 |
|
4 |
p. 237-238 2 p. |
artikel |
33 |
Fostering incident response and digital forensics research
|
Nikkel, Bruce J. |
|
2014 |
|
4 |
p. 249-251 3 p. |
artikel |
34 |
F2S2: Fast forensic similarity search through indexing piecewise hash signatures
|
Winter, Christian |
|
2013 |
|
4 |
p. 361-371 11 p. |
artikel |
35 |
Impacts of increasing volume of digital forensic data: A survey and future research challenges
|
Quick, Darren |
|
2014 |
|
4 |
p. 273-294 22 p. |
artikel |
36 |
Instant messaging investigations on a live Windows XP system
|
Carvey, Harlan |
|
2004 |
|
4 |
p. 256-260 5 p. |
artikel |
37 |
I shop online – recreationally! Internet anonymity and Silk Road enabling drug use in Australia
|
Phelps, Amy |
|
2014 |
|
4 |
p. 261-272 12 p. |
artikel |
38 |
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering
|
Kang, BooJoong |
|
2014 |
|
4 |
p. 323-335 13 p. |
artikel |
39 |
Manipulation of hard drive firmware to conceal entire partitions
|
Read, Huw |
|
2013 |
|
4 |
p. 281-286 6 p. |
artikel |
40 |
Mass image classification
|
Sanderson, Paul |
|
2006 |
|
4 |
p. 190-195 6 p. |
artikel |
41 |
Methods of discovery and exploitation of Host Protected Areas on IDE storage devices that conform to ATAPI-4
|
Bedford, Mark |
|
2005 |
|
4 |
p. 268-275 8 p. |
artikel |
42 |
NEWS
|
|
|
2005 |
|
4 |
p. 233-234 2 p. |
artikel |
43 |
News
|
|
|
2005 |
|
4 |
p. 231-233 3 p. |
artikel |
44 |
News
|
|
|
2006 |
|
4 |
p. 187-189 3 p. |
artikel |
45 |
News announcements
|
|
|
2004 |
|
4 |
p. 243-246 4 p. |
artikel |
46 |
No place to hide
|
Bradbury, Danny |
|
2005 |
|
4 |
p. 244-246 3 p. |
artikel |
47 |
[No title]
|
Lim, Nena |
|
2006 |
|
4 |
p. 245-246 2 p. |
artikel |
48 |
[No title]
|
Sommer, Peter |
|
2006 |
|
4 |
p. 244-245 2 p. |
artikel |
49 |
[No title]
|
Sommer, Peter |
|
2006 |
|
4 |
p. 244- 1 p. |
artikel |
50 |
On the role of file system metadata in digital forensics
|
Buchholz, Florian |
|
2004 |
|
4 |
p. 298-309 12 p. |
artikel |
51 |
Preparing evidence for court
|
Solon, Mark |
|
2004 |
|
4 |
p. 279-283 5 p. |
artikel |
52 |
Remote forensics
|
Sealey, Philip |
|
2004 |
|
4 |
p. 261-265 5 p. |
artikel |
53 |
Research summary issue 3–4
|
Casey, Eoghan |
|
2006 |
|
4 |
p. 196- 1 p. |
artikel |
54 |
State of the field: growth, growth, growth
|
Casey, Eoghan |
|
2004 |
|
4 |
p. 241-242 2 p. |
artikel |
55 |
The unique challenges of collecting corporate evidence
|
Kent, Jim |
|
2005 |
|
4 |
p. 239-243 5 p. |
artikel |
56 |
Tool review – remote forensic preservation and examination tools
|
Casey, Eoghan |
|
2004 |
|
4 |
p. 284-297 14 p. |
artikel |
57 |
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
|
Frühwirt, Peter |
|
2014 |
|
4 |
p. 336-348 13 p. |
artikel |
58 |
Your day in court – the rôle of the expert witness
|
Jones, Robert |
|
2004 |
|
4 |
p. 273-278 6 p. |
artikel |