nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advancing Mac OS X rootkit detection
|
Case, Andrew |
|
2015 |
14 |
S1 |
p. S25-S33 9 p. |
artikel |
2 |
Archival science, digital forensics, and new media art
|
Dietrich, Dianne |
|
2015 |
14 |
S1 |
p. S137-S145 9 p. |
artikel |
3 |
Automatic classification of object code using machine learning
|
Clemens, John |
|
2015 |
14 |
S1 |
p. S156-S162 7 p. |
artikel |
4 |
BinComp: A stratified approach to compiler provenance Attribution
|
Rahimian, Ashkan |
|
2015 |
14 |
S1 |
p. S146-S155 10 p. |
artikel |
5 |
Contents List
|
|
|
2015 |
14 |
S1 |
p. iii- 1 p. |
artikel |
6 |
Database forensic analysis through internal structure carving
|
Wagner, James |
|
2015 |
14 |
S1 |
p. S106-S115 10 p. |
artikel |
7 |
Detecting very large sets of referenced files at 40/100 GbE, especially MP4 files
|
Larbanet, A. |
|
2015 |
14 |
S1 |
p. S85-S94 10 p. |
artikel |
8 |
Editorial Board
|
|
|
2015 |
14 |
S1 |
p. i- 1 p. |
artikel |
9 |
E-mail authorship attribution using customized associative classification
|
Schmid, Michael R. |
|
2015 |
14 |
S1 |
p. S116-S126 11 p. |
artikel |
10 |
Fifteenth Annual DFRWS Conference
|
Schweinsberg, Elizabeth |
|
2015 |
14 |
S1 |
p. S1-S2 2 p. |
artikel |
11 |
Graph-theoretic characterization of cyber-threat infrastructures
|
Boukhtouta, Amine |
|
2015 |
14 |
S1 |
p. S3-S15 13 p. |
artikel |
12 |
Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb
|
Garfinkel, Simson L. |
|
2015 |
14 |
S1 |
p. S95-S105 11 p. |
artikel |
13 |
LINCS: Towards building a trustworthy litigation hold enabled cloud storage system
|
Zawoad, Shams |
|
2015 |
14 |
S1 |
p. S55-S67 13 p. |
artikel |
14 |
Network and device forensic analysis of Android social-messaging applications
|
Walnycky, Daniel |
|
2015 |
14 |
S1 |
p. S77-S84 8 p. |
artikel |
15 |
New acquisition method based on firmware update protocols for Android smartphones
|
Yang, Seung Jei |
|
2015 |
14 |
S1 |
p. S68-S76 9 p. |
artikel |
16 |
Privacy-preserving email forensics
|
Armknecht, Frederik |
|
2015 |
14 |
S1 |
p. S127-S136 10 p. |
artikel |
17 |
Rapid forensic imaging of large disks with sifting collectors
|
Grier, Jonathan |
|
2015 |
14 |
S1 |
p. S34-S44 11 p. |
artikel |
18 |
The impact of GPU-assisted malware on memory forensics: A case study
|
Balzarotti, Davide |
|
2015 |
14 |
S1 |
p. S16-S24 9 p. |
artikel |
19 |
Wirespeed: Extending the AFF4 forensic container format for scalable acquisition and live analysis
|
Schatz, Bradley L. |
|
2015 |
14 |
S1 |
p. S45-S54 10 p. |
artikel |