nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Acquisition and analysis of compromised firmware using memory forensics
|
Stüttgen, Johannes |
|
2015 |
12 |
S1 |
p. S50-S60 11 p. |
artikel |
2 |
A scalable file based data store for forensic analysis
|
Cruz, Flavio |
|
2015 |
12 |
S1 |
p. S90-S101 12 p. |
artikel |
3 |
Characterization of the windows kernel version variability for accurate memory analysis
|
Cohen, Michael I. |
|
2015 |
12 |
S1 |
p. S38-S49 12 p. |
artikel |
4 |
Contents List
|
|
|
2015 |
12 |
S1 |
p. iii- 1 p. |
artikel |
5 |
Designing robustness and resilience in digital investigation laboratories
|
Amann, Philipp |
|
2015 |
12 |
S1 |
p. S111-S120 10 p. |
artikel |
6 |
Editorial Board
|
|
|
2015 |
12 |
S1 |
p. i- 1 p. |
artikel |
7 |
Fast contraband detection in large capacity disk drives
|
Penrose, Philip |
|
2015 |
12 |
S1 |
p. S22-S29 8 p. |
artikel |
8 |
Forensic analysis of a Sony PlayStation 4: A first look
|
Davies, Matthew |
|
2015 |
12 |
S1 |
p. S81-S89 9 p. |
artikel |
9 |
Hviz: HTTP(S) traffic aggregation and visualization for network forensics
|
Gugelmann, David |
|
2015 |
12 |
S1 |
p. S1-S11 11 p. |
artikel |
10 |
Investigating evidence of mobile phone usage by drivers in road traffic accidents
|
Horsman, Graeme |
|
2015 |
12 |
S1 |
p. S30-S37 8 p. |
artikel |
11 |
Leveraging CybOX™ to standardize representation and exchange of digital forensic information
|
Casey, Eoghan |
|
2015 |
12 |
S1 |
p. S102-S110 9 p. |
artikel |
12 |
SIGMA : A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code
|
Alrabaee, Saed |
|
2015 |
12 |
S1 |
p. S61-S71 11 p. |
artikel |
13 |
Smart TV forensics: Digital traces on televisions
|
Boztas, A. |
|
2015 |
12 |
S1 |
p. S72-S80 9 p. |
artikel |
14 |
Spam campaign detection, analysis, and investigation
|
Dinh, Son |
|
2015 |
12 |
S1 |
p. S12-S21 10 p. |
artikel |