Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             92 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Advances in Onion Routing: Description and backtracing/investigation problems Forte, Dario
2006
2 p. 85-88
4 p.
artikel
2 A hierarchical, objectives-based framework for the digital investigations process Beebe, Nicole Lang
2005
2 p. 147-167
21 p.
artikel
3 A Machine Learning-based Triage methodology for automated categorization of digital media Marturana, Fabio
2013
2 p. 193-204
12 p.
artikel
4 Ambiguities in US law for investigators Howell, Beryl A.
2004
2 p. 106-111
6 p.
artikel
5 A MCEA based passive forensics scheme for detecting frame-based video tampering Dong, Qiong
2012
2 p. 151-159
9 p.
artikel
6 An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines Owen, Paul
2011
2 p. 135-140
6 p.
artikel
7 A new triage model conforming to the needs of selective search and seizure of electronic evidence Hong, Ilyoung
2013
2 p. 175-192
18 p.
artikel
8 An examination into MSN Messenger 7.5 contact identification Dickson, Mike
2006
2 p. 79-83
5 p.
artikel
9 An integrated conceptual digital forensic framework for cloud computing Martini, Ben
2012
2 p. 71-80
10 p.
artikel
10 An introduction to investigating IPv6 networks Nikkel, Bruce J.
2007
2 p. 59-67
9 p.
artikel
11 An overview and analysis of PDA forensic tools Jansen, W.
2005
2 p. 120-132
13 p.
artikel
12 A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis Lin, Cheng-Shian
2014
2 p. 120-140
21 p.
artikel
13 Applications of Research Casey, E.
2006
2 p. 84-
1 p.
artikel
14 A practical and robust approach to coping with large volumes of data submitted for digital forensic examination Shaw, Adrian
2013
2 p. 116-128
13 p.
artikel
15 A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview James, Joshua I.
2013
2 p. 148-157
10 p.
artikel
16 A two-dimensional circumplex approach to the development of a hacker taxonomy Rogers, Marcus K.
2006
2 p. 97-102
6 p.
artikel
17 A unified voice: The need for an international digital forensic convention Casey, Eoghan
2011
2 p. 89-91
3 p.
artikel
18 Automated network triage Koopmans, Martin B.
2013
2 p. 129-137
9 p.
artikel
19 Book review Wolfe, Henry B.
2006
2 p. 103-104
2 p.
artikel
20 Certification, registration and assessment of digital forensic experts: The UK experience Sommer, Peter
2011
2 p. 98-105
8 p.
artikel
21 Cloud computing and digital forensics Casey, Eoghan
2012
2 p. 69-70
2 p.
artikel
22 Consortium of Digital Forensic Specialists: Shape the future of your profession 2011
2 p. 92-93
2 p.
artikel
23 Contents List 2013
2 p. iv-
1 p.
artikel
24 Contents List 2012
2 p. iii-
1 p.
artikel
25 Contents List 2014
2 p. iii-
1 p.
artikel
26 Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition Vömel, Stefan
2012
2 p. 125-137
13 p.
artikel
27 Correctness proof for database reconstruction algorithm Fasan, Oluwasola Mary
2012
2 p. 138-150
13 p.
artikel
28 Criminalising hacking tools Sommer, Peter
2006
2 p. 68-72
5 p.
artikel
29 Cross-border co-operation and education in digital investigations: A European perspective Allegra, Elisabetta
2011
2 p. 106-113
8 p.
artikel
30 Digital evidence accreditation in the corporate and business environment Barbara, John J.
2005
2 p. 137-146
10 p.
artikel
31 Digital forensic investigation of cloud storage services Chung, Hyunji
2012
2 p. 81-95
15 p.
artikel
32 Digital Investigation and the International Federation for Information Processing (IFIP) 2006
2 p. 63-64
2 p.
artikel
33 Digital logs—proof matters Kenneally, Erin E.
2004
2 p. 94-101
8 p.
artikel
34 Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU Peng, Fei
2014
2 p. 111-119
9 p.
artikel
35 Editorial Board 2011
2 p. i-
1 p.
artikel
36 Editorial Board 2013
2 p. i-
1 p.
artikel
37 Editorial Board 2012
2 p. i-
1 p.
artikel
38 Editorial Board 2014
2 p. i-
1 p.
artikel
39 Emerging paper standards in computer forensics Ballou, Susan
2011
2 p. 96-97
2 p.
artikel
40 ENFSI Forensic IT Working group Geradts, Zeno
2011
2 p. 94-95
2 p.
artikel
41 Engineering an online computer forensic service Bhoedjang, R.A.F.
2012
2 p. 96-108
13 p.
artikel
42 Evaluating detection error trade-offs for bytewise approximate matching algorithms Breitinger, Frank
2014
2 p. 81-89
9 p.
artikel
43 Events 2006
2 p. 105-
1 p.
artikel
44 Events Hilley, S.
2004
2 p. 129-
1 p.
artikel
45 File classification using byte sub-stream kernels de Vel, Olivier
2004
2 p. 150-157
8 p.
artikel
46 Finite state machine approach to digital event reconstruction Gladyshev, Pavel
2004
2 p. 130-149
20 p.
artikel
47 Forensic analysis techniques for fragmented flash memory pages in smartphones Park, Jungheum
2012
2 p. 109-118
10 p.
artikel
48 Forensic artefacts left by Windows Live Messenger 8.0 van Dongen, Wouter S.
2007
2 p. 73-87
15 p.
artikel
49 Forensic discovery auditing of digital evidence containers Richard III, Golden G.
2007
2 p. 88-97
10 p.
artikel
50 Future issues in forensic computing and an introduction to ENSFI Freyssinet, Eric
2004
2 p. 112-113
2 p.
artikel
51 Growing pains Casey, Eoghan
2005
2 p. 71-73
3 p.
artikel
52 Hashing and data integrity: Reliability of hashing and granularity size reduction Malinowski, Christopher
2007
2 p. 98-104
7 p.
artikel
53 Honing digital forensic processes Casey, Eoghan
2013
2 p. 138-147
10 p.
artikel
54 Hunting in the enterprise: Forensic triage and incident response Moser, Andreas
2013
2 p. 89-98
10 p.
artikel
55 Improving evidence acquisition from live network sources Nikkel, Bruce J.
2006
2 p. 89-96
8 p.
artikel
56 Investigating around mainframes and other high-end systems: the revenge of big iron Pemble, Matthew
2004
2 p. 90-93
4 p.
artikel
57 Locating payload embedded by group-parity steganography Quach, Tu-Thach
2012
2 p. 160-166
7 p.
artikel
58 Modelling and refinement of forensic data acquisition specifications Aziz, Benjamin
2014
2 p. 90-101
12 p.
artikel
59 News 2005
2 p. 74-76
3 p.
artikel
60 News 2006
2 p. 59-62
4 p.
artikel
61 News 2007
2 p. 51-53
3 p.
artikel
62 News announcements Hilley, Sarah
2004
2 p. 86-88
3 p.
artikel
63 Newsgroups reborn – The binary posting renaissance Fellows, G.
2006
2 p. 73-78
6 p.
artikel
64 [No title] Nikkel, Bruce
2005
2 p. 77-
1 p.
artikel
65 [No title] Sommer, Peter
2006
2 p. 103-
1 p.
artikel
66 On-scene triage open source forensic tool chests: Are they effective? Shiaeles, Stavros
2013
2 p. 99-115
17 p.
artikel
67 Peer review Bradbury, D.
2006
2 p. 65-67
3 p.
artikel
68 Penetrating encrypted evidence Wolfe, Hank
2004
2 p. 102-105
4 p.
artikel
69 Real-time digital forensics and triage Roussev, Vassil
2013
2 p. 158-167
10 p.
artikel
70 Risk sensitive digital evidence collection Kenneally, Erin E.
2005
2 p. 101-119
19 p.
artikel
71 Scientific underpinnings and background to standards and accreditation in digital forensics Beckett, Jason
2011
2 p. 114-121
8 p.
artikel
72 Standards, regulation & quality in digital investigations: The state we are in Marshall, Angus M.
2011
2 p. 141-144
4 p.
artikel
73 Storage and exchange formats for digital evidence Flaglien, Anders O.
2011
2 p. 122-128
7 p.
artikel
74 Structure and application of IconCache.db files for digital forensics Lee, Chan-Youn
2014
2 p. 102-110
9 p.
artikel
75 The growing impact of full disk encryption on digital forensics Casey, Eoghan
2011
2 p. 129-134
6 p.
artikel
76 The joys of complexity and the deleted file Fellows, Geoff H.
2005
2 p. 89-93
5 p.
artikel
77 The need for objective case review Casey, Eoghan
2004
2 p. 83-85
3 p.
artikel
78 The value of behavioral analysis in digital investigations Casey, Eoghan
2006
2 p. 57-58
2 p.
artikel
79 Tool review—WinHex Casey, Eoghan
2004
2 p. 114-128
15 p.
artikel
80 Tracking USB storage: Analysis of windows artifacts generated by USB storage devices Carvey, Harlan
2005
2 p. 94-100
7 p.
artikel
81 Triage: A practical solution or admission of failure Pollitt, Mark M.
2013
2 p. 87-88
2 p.
artikel
82 Triage in digital forensics Casey, Eoghan
2013
2 p. 85-86
2 p.
artikel
83 Triage template pipelines in digital forensic investigations Overill, Richard E.
2013
2 p. 168-174
7 p.
artikel
84 Trojan defence: A forensic view part II Ghavalas, Byrne
2005
2 p. 133-136
4 p.
artikel
85 Trojan horse powers for the police 2007
2 p. 56-58
3 p.
artikel
86 UK Computer Misuse Act—the Trojan virus defence George, Esther
2004
2 p. 89-
1 p.
artikel
87 US cybercrime statistics: FBI hotline gets more than 200,000 complaints 2007
2 p. 54-55
2 p.
artikel
88 User data persistence in physical memory Solomon, Jason
2007
2 p. 68-72
5 p.
artikel
89 Utilizing data lifetime of TCP buffers in digital forensics: Empirical study Al-Saleh, Mohammed I.
2012
2 p. 119-124
6 p.
artikel
90 Volume analysis of disk spanning logical volumes Carrier, Brian D.
2005
2 p. 78-88
11 p.
artikel
91 What constitutes a proper education? Casey, Eoghan
2014
2 p. 79-80
2 p.
artikel
92 What does “forensically sound” really mean? Casey, Eoghan
2007
2 p. 49-50
2 p.
artikel
                             92 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland