Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comparative methodology for the reconstruction of digital events using windows restore points Zhu, Yuandong
2009
1-2 p. 8-15
8 p.
artikel
2 An adaptive method to identify disk cluster size based on block content Xu, Ming
2010
1-2 p. 48-55
8 p.
artikel
3 Analysis of Internet Download Manager for collection of digital forensic artefacts Yasin, Muhammad
2010
1-2 p. 90-94
5 p.
artikel
4 An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan Cheng, Fa-Chang
2010
1-2 p. 81-89
9 p.
artikel
5 A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1 Byers, David
2009
1-2 p. 61-70
10 p.
artikel
6 Case study: Forensic analysis of a Samsung digital video recorder van Dongen, Wouter S.
2008
1-2 p. 19-28
10 p.
artikel
7 Classification of digital camera-models based on demosaicing artifacts Bayram, Sevinc
2008
1-2 p. 49-59
11 p.
artikel
8 Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors Byers, David
2008
1-2 p. 29-33
5 p.
artikel
9 Digital forensics: Coming of age Casey, Eoghan
2009
1-2 p. 1-2
2 p.
artikel
10 Digital Investigation as a distinct discipline: A pedagogic perspective Irons, A.D.
2009
1-2 p. 82-90
9 p.
artikel
11 Digital investigations, security and privacy Casey, Eoghan
2010
1-2 p. 1-2
2 p.
artikel
12 FAUST: Forensic artifacts of uninstalled steganography tools Zax, Rachel
2009
1-2 p. 25-38
14 p.
artikel
13 Forensic analysis of GPT disks and GUID partition tables Nikkel, Bruce J.
2009
1-2 p. 39-47
9 p.
artikel
14 Forensic investigation of Microsoft PowerPoint files Park, Jungheum
2009
1-2 p. 16-24
9 p.
artikel
15 Impersonator identification through dynamic fingerprinting Steel, Chad M.S.
2008
1-2 p. 60-70
11 p.
artikel
16 Lessons not learned on data disposal Jones, Andy
2009
1-2 p. 3-7
5 p.
artikel
17 Locating ×86 paging structures in memory images Saur, Karla
2010
1-2 p. 28-37
10 p.
artikel
18 Mining writeprints from anonymous e-mails for forensic investigation Iqbal, Farkhund
2010
1-2 p. 56-64
9 p.
artikel
19 Network forensic frameworks: Survey and research challenges Pilli, Emmanuel S.
2010
1-2 p. 14-27
14 p.
artikel
20 [No title] Hilley, S.
2008
1-2 p. 3-5
3 p.
artikel
21 Photoshop CS3 for forensics professionals Forster, Peter F.R.
2009
1-2 p. 91-
1 p.
artikel
22 Pinpointing TomTom location records: A forensic analysis Nutter, Beverley
2008
1-2 p. 10-18
9 p.
artikel
23 Prelim i - Editorial Board 2009
1-2 p. i-
1 p.
artikel
24 Prelim i - Editorial Board 2010
1-2 p. i-
1 p.
artikel
25 Prelim i - Editorial Board 2008
1-2 p. i-
1 p.
artikel
26 Recovering erased digital evidence from CD-RW discs in a child exploitation investigation Wardwell, James
2008
1-2 p. 6-9
4 p.
artikel
27 Robust performance testing for digital forensic tools Pan, Lei
2009
1-2 p. 71-81
11 p.
artikel
28 Sequenced release of privacy-accurate information in a forensic investigation Croft, N.J.
2010
1-2 p. 95-101
7 p.
artikel
29 Source video camera identification for multiply compressed videos originating from YouTube van Houten, Wiger
2009
1-2 p. 48-60
13 p.
artikel
30 Speaker recognition from encrypted VoIP communications Khan, L.A.
2010
1-2 p. 65-73
9 p.
artikel
31 Speaker verification from partially encrypted compressed speech for forensic investigation Khan, L.A.
2010
1-2 p. 74-80
7 p.
artikel
32 State of the Journal Casey, Eoghan
2008
1-2 p. 1-2
2 p.
artikel
33 The Digital Crime Tsunami Gogolin, Greg
2010
1-2 p. 3-8
6 p.
artikel
34 Why computer forensic professionals shouldn't be required to have private investigator licenses Schwerha IV, Joseph J.
2008
1-2 p. 71-72
2 p.
artikel
35 Windows mobile advanced forensics: An alternative to existing tools Rehault, Frederick
2010
1-2 p. 38-47
10 p.
artikel
36 Windows Vista and digital investigations Hargreaves, Christopher
2008
1-2 p. 34-48
15 p.
artikel
37 WinRAR temporary folder artefacts Fellows, Geoffrey
2010
1-2 p. 9-13
5 p.
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland