Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             49 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Acquisition and analysis of compromised firmware using memory forensics Stüttgen, Johannes
2015
S1 p. S50-S60
11 p.
artikel
2 Advancing Mac OS X rootkit detection Case, Andrew
2015
S1 p. S25-S33
9 p.
artikel
3 Archival science, digital forensics, and new media art Dietrich, Dianne
2015
S1 p. S137-S145
9 p.
artikel
4 A scalable file based data store for forensic analysis Cruz, Flavio
2015
S1 p. S90-S101
12 p.
artikel
5 Automated evaluation of approximate matching algorithms on real data Breitinger, Frank
2014
S1 p. S10-S17
8 p.
artikel
6 Automatic classification of object code using machine learning Clemens, John
2015
S1 p. S156-S162
7 p.
artikel
7 BinComp: A stratified approach to compiler provenance Attribution Rahimian, Ashkan
2015
S1 p. S146-S155
10 p.
artikel
8 BitTorrent Sync: First Impressions and Digital Forensic Implications Farina, Jason
2014
S1 p. S77-S86
10 p.
artikel
9 Characterization of the windows kernel version variability for accurate memory analysis Cohen, Michael I.
2015
S1 p. S38-S49
12 p.
artikel
10 Contents List 2015
S1 p. iii-
1 p.
artikel
11 Contents List 2015
S1 p. iii-
1 p.
artikel
12 Database forensic analysis through internal structure carving Wagner, James
2015
S1 p. S106-S115
10 p.
artikel
13 Designing robustness and resilience in digital investigation laboratories Amann, Philipp
2015
S1 p. S111-S120
10 p.
artikel
14 Detecting very large sets of referenced files at 40/100 GbE, especially MP4 files Larbanet, A.
2015
S1 p. S85-S94
10 p.
artikel
15 Digital Forensics as a Service: A game changer van Baar, R.B.
2014
S1 p. S54-S62
9 p.
artikel
16 Editorial Board 2015
S1 p. i-
1 p.
artikel
17 Editorial Board 2015
S1 p. i-
1 p.
artikel
18 E-mail authorship attribution using customized associative classification Schmid, Michael R.
2015
S1 p. S116-S126
11 p.
artikel
19 Fast contraband detection in large capacity disk drives Penrose, Philip
2015
S1 p. S22-S29
8 p.
artikel
20 Fast indexing strategies for robust image hashes Winter, Christian
2014
S1 p. S27-S35
9 p.
artikel
21 Fifteenth Annual DFRWS Conference Schweinsberg, Elizabeth
2015
S1 p. S1-S2
2 p.
artikel
22 Forensic analysis of a Sony PlayStation 4: A first look Davies, Matthew
2015
S1 p. S81-S89
9 p.
artikel
23 Forensic analysis of video file formats Gloe, Thomas
2014
S1 p. S68-S76
9 p.
artikel
24 Graph-theoretic characterization of cyber-threat infrastructures Boukhtouta, Amine
2015
S1 p. S3-S15
13 p.
artikel
25 Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb Garfinkel, Simson L.
2015
S1 p. S95-S105
11 p.
artikel
26 Hviz: HTTP(S) traffic aggregation and visualization for network forensics Gugelmann, David
2015
S1 p. S1-S11
11 p.
artikel
27 Information assurance in a distributed forensic cluster Pringle, Nick
2014
S1 p. S36-S44
9 p.
artikel
28 Investigating evidence of mobile phone usage by drivers in road traffic accidents Horsman, Graeme
2015
S1 p. S30-S37
8 p.
artikel
29 Key-hiding on the ARM platform Nilsson, Alexander
2014
S1 p. S63-S67
5 p.
artikel
30 Leveraging CybOX™ to standardize representation and exchange of digital forensic information Casey, Eoghan
2015
S1 p. S102-S110
9 p.
artikel
31 LINCS: Towards building a trustworthy litigation hold enabled cloud storage system Zawoad, Shams
2015
S1 p. S55-S67
13 p.
artikel
32 Network and device forensic analysis of Android social-messaging applications Walnycky, Daniel
2015
S1 p. S77-S84
8 p.
artikel
33 New acquisition method based on firmware update protocols for Android smartphones Yang, Seung Jei
2015
S1 p. S68-S76
9 p.
artikel
34 OBA2: An Onion approach to Binary code Authorship Attribution Alrabaee, Saed
2014
S1 p. S94-S103
10 p.
artikel
35 On the database lookup problem of approximate matching Breitinger, Frank
2014
S1 p. S1-S9
9 p.
artikel
36 OpenLV: Empowering investigators and first-responders in the digital forensics process Vidas, Timothy
2014
S1 p. S45-S53
9 p.
artikel
37 Out of sight, but not out of mind: Traces of nearby devices' wireless transmissions in volatile memory Minnaard, Wicher
2014
S1 p. S104-S111
8 p.
artikel
38 Practical use of Approximate Hash Based Matching in digital investigations Bjelland, Petter Christian
2014
S1 p. S18-S26
9 p.
artikel
39 Prelim i - Editorial Board 2014
S1 p. i-
1 p.
artikel
40 Prelim iii - Contents List 2014
S1 p. iii-
1 p.
artikel
41 Privacy-preserving email forensics Armknecht, Frederik
2015
S1 p. S127-S136
10 p.
artikel
42 Rapid forensic imaging of large disks with sifting collectors Grier, Jonathan
2015
S1 p. S34-S44
11 p.
artikel
43 Robust Linux memory acquisition with minimal target impact Stüttgen, Johannes
2014
S1 p. S112-S119
8 p.
artikel
44 SIGMA : A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code Alrabaee, Saed
2015
S1 p. S61-S71
11 p.
artikel
45 Smart TV forensics: Digital traces on televisions Boztas, A.
2015
S1 p. S72-S80
9 p.
artikel
46 Spam campaign detection, analysis, and investigation Dinh, Son
2015
S1 p. S12-S21
10 p.
artikel
47 The impact of GPU-assisted malware on memory forensics: A case study Balzarotti, Davide
2015
S1 p. S16-S24
9 p.
artikel
48 Windows Surface RT tablet forensics Iqbal, Asif
2014
S1 p. S87-S93
7 p.
artikel
49 Wirespeed: Extending the AFF4 forensic container format for scalable acquisition and live analysis Schatz, Bradley L.
2015
S1 p. S45-S54
10 p.
artikel
                             49 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland