nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive photo-response non-uniformity noise removal against image source attribution
|
Karaküçük, Ahmet |
|
2015 |
12 |
C |
p. 66-76 11 p. |
artikel |
2 |
A mathematical approach to NAND flash-memory descrambling and decoding
|
van Zandwijk, Jan Peter |
|
2015 |
12 |
C |
p. 41-52 12 p. |
artikel |
3 |
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix
|
Lu, Jicang |
|
2015 |
12 |
C |
p. 1-14 14 p. |
artikel |
4 |
Contents
|
|
|
2015 |
12 |
C |
p. iii- 1 p. |
artikel |
5 |
Descrambling data on solid-state disks by reverse-engineering the firmware
|
Zhang, Li |
|
2015 |
12 |
C |
p. 77-87 11 p. |
artikel |
6 |
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic
|
Sharifnya, Reza |
|
2015 |
12 |
C |
p. 15-26 12 p. |
artikel |
7 |
Editorial Board
|
|
|
2015 |
12 |
C |
p. i- 1 p. |
artikel |
8 |
Erratum to “Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary findings” [Digit. Invest 11 (4), 252–260]
|
Seigfried-Spellar, Kathryn C. |
|
2015 |
12 |
C |
p. 88- 1 p. |
artikel |
9 |
Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8
|
Khatri, Yogesh |
|
2015 |
12 |
C |
p. 53-65 13 p. |
artikel |
10 |
Ideal log setting for database forensics reconstruction
|
Adedayo, Oluwasola Mary |
|
2015 |
12 |
C |
p. 27-40 14 p. |
artikel |
11 |
Strengthening forensic science
|
Casey, Eoghan |
|
2015 |
12 |
C |
p. A1-A2 nvt p. |
artikel |