nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advances in Onion Routing: Description and backtracing/investigation problems
|
Forte, Dario |
|
2006 |
|
2 |
p. 85-88 4 p. |
artikel |
2 |
A hierarchical, objectives-based framework for the digital investigations process
|
Beebe, Nicole Lang |
|
2005 |
|
2 |
p. 147-167 21 p. |
artikel |
3 |
A Machine Learning-based Triage methodology for automated categorization of digital media
|
Marturana, Fabio |
|
2013 |
|
2 |
p. 193-204 12 p. |
artikel |
4 |
Ambiguities in US law for investigators
|
Howell, Beryl A. |
|
2004 |
|
2 |
p. 106-111 6 p. |
artikel |
5 |
A MCEA based passive forensics scheme for detecting frame-based video tampering
|
Dong, Qiong |
|
2012 |
|
2 |
p. 151-159 9 p. |
artikel |
6 |
An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines
|
Owen, Paul |
|
2011 |
|
2 |
p. 135-140 6 p. |
artikel |
7 |
A new triage model conforming to the needs of selective search and seizure of electronic evidence
|
Hong, Ilyoung |
|
2013 |
|
2 |
p. 175-192 18 p. |
artikel |
8 |
An examination into MSN Messenger 7.5 contact identification
|
Dickson, Mike |
|
2006 |
|
2 |
p. 79-83 5 p. |
artikel |
9 |
An integrated conceptual digital forensic framework for cloud computing
|
Martini, Ben |
|
2012 |
|
2 |
p. 71-80 10 p. |
artikel |
10 |
An introduction to investigating IPv6 networks
|
Nikkel, Bruce J. |
|
2007 |
|
2 |
p. 59-67 9 p. |
artikel |
11 |
An overview and analysis of PDA forensic tools
|
Jansen, W. |
|
2005 |
|
2 |
p. 120-132 13 p. |
artikel |
12 |
A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis
|
Lin, Cheng-Shian |
|
2014 |
|
2 |
p. 120-140 21 p. |
artikel |
13 |
Applications of Research
|
Casey, E. |
|
2006 |
|
2 |
p. 84- 1 p. |
artikel |
14 |
A practical and robust approach to coping with large volumes of data submitted for digital forensic examination
|
Shaw, Adrian |
|
2013 |
|
2 |
p. 116-128 13 p. |
artikel |
15 |
A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview
|
James, Joshua I. |
|
2013 |
|
2 |
p. 148-157 10 p. |
artikel |
16 |
A two-dimensional circumplex approach to the development of a hacker taxonomy
|
Rogers, Marcus K. |
|
2006 |
|
2 |
p. 97-102 6 p. |
artikel |
17 |
A unified voice: The need for an international digital forensic convention
|
Casey, Eoghan |
|
2011 |
|
2 |
p. 89-91 3 p. |
artikel |
18 |
Automated network triage
|
Koopmans, Martin B. |
|
2013 |
|
2 |
p. 129-137 9 p. |
artikel |
19 |
Book review
|
Wolfe, Henry B. |
|
2006 |
|
2 |
p. 103-104 2 p. |
artikel |
20 |
Certification, registration and assessment of digital forensic experts: The UK experience
|
Sommer, Peter |
|
2011 |
|
2 |
p. 98-105 8 p. |
artikel |
21 |
Cloud computing and digital forensics
|
Casey, Eoghan |
|
2012 |
|
2 |
p. 69-70 2 p. |
artikel |
22 |
Consortium of Digital Forensic Specialists: Shape the future of your profession
|
|
|
2011 |
|
2 |
p. 92-93 2 p. |
artikel |
23 |
Contents List
|
|
|
2013 |
|
2 |
p. iv- 1 p. |
artikel |
24 |
Contents List
|
|
|
2012 |
|
2 |
p. iii- 1 p. |
artikel |
25 |
Contents List
|
|
|
2014 |
|
2 |
p. iii- 1 p. |
artikel |
26 |
Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition
|
Vömel, Stefan |
|
2012 |
|
2 |
p. 125-137 13 p. |
artikel |
27 |
Correctness proof for database reconstruction algorithm
|
Fasan, Oluwasola Mary |
|
2012 |
|
2 |
p. 138-150 13 p. |
artikel |
28 |
Criminalising hacking tools
|
Sommer, Peter |
|
2006 |
|
2 |
p. 68-72 5 p. |
artikel |
29 |
Cross-border co-operation and education in digital investigations: A European perspective
|
Allegra, Elisabetta |
|
2011 |
|
2 |
p. 106-113 8 p. |
artikel |
30 |
Digital evidence accreditation in the corporate and business environment
|
Barbara, John J. |
|
2005 |
|
2 |
p. 137-146 10 p. |
artikel |
31 |
Digital forensic investigation of cloud storage services
|
Chung, Hyunji |
|
2012 |
|
2 |
p. 81-95 15 p. |
artikel |
32 |
Digital Investigation and the International Federation for Information Processing (IFIP)
|
|
|
2006 |
|
2 |
p. 63-64 2 p. |
artikel |
33 |
Digital logs—proof matters
|
Kenneally, Erin E. |
|
2004 |
|
2 |
p. 94-101 8 p. |
artikel |
34 |
Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU
|
Peng, Fei |
|
2014 |
|
2 |
p. 111-119 9 p. |
artikel |
35 |
Editorial Board
|
|
|
2011 |
|
2 |
p. i- 1 p. |
artikel |
36 |
Editorial Board
|
|
|
2013 |
|
2 |
p. i- 1 p. |
artikel |
37 |
Editorial Board
|
|
|
2012 |
|
2 |
p. i- 1 p. |
artikel |
38 |
Editorial Board
|
|
|
2014 |
|
2 |
p. i- 1 p. |
artikel |
39 |
Emerging paper standards in computer forensics
|
Ballou, Susan |
|
2011 |
|
2 |
p. 96-97 2 p. |
artikel |
40 |
ENFSI Forensic IT Working group
|
Geradts, Zeno |
|
2011 |
|
2 |
p. 94-95 2 p. |
artikel |
41 |
Engineering an online computer forensic service
|
Bhoedjang, R.A.F. |
|
2012 |
|
2 |
p. 96-108 13 p. |
artikel |
42 |
Evaluating detection error trade-offs for bytewise approximate matching algorithms
|
Breitinger, Frank |
|
2014 |
|
2 |
p. 81-89 9 p. |
artikel |
43 |
Events
|
|
|
2006 |
|
2 |
p. 105- 1 p. |
artikel |
44 |
Events
|
Hilley, S. |
|
2004 |
|
2 |
p. 129- 1 p. |
artikel |
45 |
File classification using byte sub-stream kernels
|
de Vel, Olivier |
|
2004 |
|
2 |
p. 150-157 8 p. |
artikel |
46 |
Finite state machine approach to digital event reconstruction
|
Gladyshev, Pavel |
|
2004 |
|
2 |
p. 130-149 20 p. |
artikel |
47 |
Forensic analysis techniques for fragmented flash memory pages in smartphones
|
Park, Jungheum |
|
2012 |
|
2 |
p. 109-118 10 p. |
artikel |
48 |
Forensic artefacts left by Windows Live Messenger 8.0
|
van Dongen, Wouter S. |
|
2007 |
|
2 |
p. 73-87 15 p. |
artikel |
49 |
Forensic discovery auditing of digital evidence containers
|
Richard III, Golden G. |
|
2007 |
|
2 |
p. 88-97 10 p. |
artikel |
50 |
Future issues in forensic computing and an introduction to ENSFI
|
Freyssinet, Eric |
|
2004 |
|
2 |
p. 112-113 2 p. |
artikel |
51 |
Growing pains
|
Casey, Eoghan |
|
2005 |
|
2 |
p. 71-73 3 p. |
artikel |
52 |
Hashing and data integrity: Reliability of hashing and granularity size reduction
|
Malinowski, Christopher |
|
2007 |
|
2 |
p. 98-104 7 p. |
artikel |
53 |
Honing digital forensic processes
|
Casey, Eoghan |
|
2013 |
|
2 |
p. 138-147 10 p. |
artikel |
54 |
Hunting in the enterprise: Forensic triage and incident response
|
Moser, Andreas |
|
2013 |
|
2 |
p. 89-98 10 p. |
artikel |
55 |
Improving evidence acquisition from live network sources
|
Nikkel, Bruce J. |
|
2006 |
|
2 |
p. 89-96 8 p. |
artikel |
56 |
Investigating around mainframes and other high-end systems: the revenge of big iron
|
Pemble, Matthew |
|
2004 |
|
2 |
p. 90-93 4 p. |
artikel |
57 |
Locating payload embedded by group-parity steganography
|
Quach, Tu-Thach |
|
2012 |
|
2 |
p. 160-166 7 p. |
artikel |
58 |
Modelling and refinement of forensic data acquisition specifications
|
Aziz, Benjamin |
|
2014 |
|
2 |
p. 90-101 12 p. |
artikel |
59 |
News
|
|
|
2005 |
|
2 |
p. 74-76 3 p. |
artikel |
60 |
News
|
|
|
2006 |
|
2 |
p. 59-62 4 p. |
artikel |
61 |
News
|
|
|
2007 |
|
2 |
p. 51-53 3 p. |
artikel |
62 |
News announcements
|
Hilley, Sarah |
|
2004 |
|
2 |
p. 86-88 3 p. |
artikel |
63 |
Newsgroups reborn – The binary posting renaissance
|
Fellows, G. |
|
2006 |
|
2 |
p. 73-78 6 p. |
artikel |
64 |
[No title]
|
Nikkel, Bruce |
|
2005 |
|
2 |
p. 77- 1 p. |
artikel |
65 |
[No title]
|
Sommer, Peter |
|
2006 |
|
2 |
p. 103- 1 p. |
artikel |
66 |
On-scene triage open source forensic tool chests: Are they effective?
|
Shiaeles, Stavros |
|
2013 |
|
2 |
p. 99-115 17 p. |
artikel |
67 |
Peer review
|
Bradbury, D. |
|
2006 |
|
2 |
p. 65-67 3 p. |
artikel |
68 |
Penetrating encrypted evidence
|
Wolfe, Hank |
|
2004 |
|
2 |
p. 102-105 4 p. |
artikel |
69 |
Real-time digital forensics and triage
|
Roussev, Vassil |
|
2013 |
|
2 |
p. 158-167 10 p. |
artikel |
70 |
Risk sensitive digital evidence collection
|
Kenneally, Erin E. |
|
2005 |
|
2 |
p. 101-119 19 p. |
artikel |
71 |
Scientific underpinnings and background to standards and accreditation in digital forensics
|
Beckett, Jason |
|
2011 |
|
2 |
p. 114-121 8 p. |
artikel |
72 |
Standards, regulation & quality in digital investigations: The state we are in
|
Marshall, Angus M. |
|
2011 |
|
2 |
p. 141-144 4 p. |
artikel |
73 |
Storage and exchange formats for digital evidence
|
Flaglien, Anders O. |
|
2011 |
|
2 |
p. 122-128 7 p. |
artikel |
74 |
Structure and application of IconCache.db files for digital forensics
|
Lee, Chan-Youn |
|
2014 |
|
2 |
p. 102-110 9 p. |
artikel |
75 |
The growing impact of full disk encryption on digital forensics
|
Casey, Eoghan |
|
2011 |
|
2 |
p. 129-134 6 p. |
artikel |
76 |
The joys of complexity and the deleted file
|
Fellows, Geoff H. |
|
2005 |
|
2 |
p. 89-93 5 p. |
artikel |
77 |
The need for objective case review
|
Casey, Eoghan |
|
2004 |
|
2 |
p. 83-85 3 p. |
artikel |
78 |
The value of behavioral analysis in digital investigations
|
Casey, Eoghan |
|
2006 |
|
2 |
p. 57-58 2 p. |
artikel |
79 |
Tool review—WinHex
|
Casey, Eoghan |
|
2004 |
|
2 |
p. 114-128 15 p. |
artikel |
80 |
Tracking USB storage: Analysis of windows artifacts generated by USB storage devices
|
Carvey, Harlan |
|
2005 |
|
2 |
p. 94-100 7 p. |
artikel |
81 |
Triage: A practical solution or admission of failure
|
Pollitt, Mark M. |
|
2013 |
|
2 |
p. 87-88 2 p. |
artikel |
82 |
Triage in digital forensics
|
Casey, Eoghan |
|
2013 |
|
2 |
p. 85-86 2 p. |
artikel |
83 |
Triage template pipelines in digital forensic investigations
|
Overill, Richard E. |
|
2013 |
|
2 |
p. 168-174 7 p. |
artikel |
84 |
Trojan defence: A forensic view part II
|
Ghavalas, Byrne |
|
2005 |
|
2 |
p. 133-136 4 p. |
artikel |
85 |
Trojan horse powers for the police
|
|
|
2007 |
|
2 |
p. 56-58 3 p. |
artikel |
86 |
UK Computer Misuse Act—the Trojan virus defence
|
George, Esther |
|
2004 |
|
2 |
p. 89- 1 p. |
artikel |
87 |
US cybercrime statistics: FBI hotline gets more than 200,000 complaints
|
|
|
2007 |
|
2 |
p. 54-55 2 p. |
artikel |
88 |
User data persistence in physical memory
|
Solomon, Jason |
|
2007 |
|
2 |
p. 68-72 5 p. |
artikel |
89 |
Utilizing data lifetime of TCP buffers in digital forensics: Empirical study
|
Al-Saleh, Mohammed I. |
|
2012 |
|
2 |
p. 119-124 6 p. |
artikel |
90 |
Volume analysis of disk spanning logical volumes
|
Carrier, Brian D. |
|
2005 |
|
2 |
p. 78-88 11 p. |
artikel |
91 |
What constitutes a proper education?
|
Casey, Eoghan |
|
2014 |
|
2 |
p. 79-80 2 p. |
artikel |
92 |
What does “forensically sound” really mean?
|
Casey, Eoghan |
|
2007 |
|
2 |
p. 49-50 2 p. |
artikel |