Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 Advancing Mac OS X rootkit detection Case, Andrew
2015
14 S1 p. S25-S33
9 p.
article
2 Archival science, digital forensics, and new media art Dietrich, Dianne
2015
14 S1 p. S137-S145
9 p.
article
3 Automatic classification of object code using machine learning Clemens, John
2015
14 S1 p. S156-S162
7 p.
article
4 BinComp: A stratified approach to compiler provenance Attribution Rahimian, Ashkan
2015
14 S1 p. S146-S155
10 p.
article
5 Contents List 2015
14 S1 p. iii-
1 p.
article
6 Database forensic analysis through internal structure carving Wagner, James
2015
14 S1 p. S106-S115
10 p.
article
7 Detecting very large sets of referenced files at 40/100 GbE, especially MP4 files Larbanet, A.
2015
14 S1 p. S85-S94
10 p.
article
8 Editorial Board 2015
14 S1 p. i-
1 p.
article
9 E-mail authorship attribution using customized associative classification Schmid, Michael R.
2015
14 S1 p. S116-S126
11 p.
article
10 Fifteenth Annual DFRWS Conference Schweinsberg, Elizabeth
2015
14 S1 p. S1-S2
2 p.
article
11 Graph-theoretic characterization of cyber-threat infrastructures Boukhtouta, Amine
2015
14 S1 p. S3-S15
13 p.
article
12 Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb Garfinkel, Simson L.
2015
14 S1 p. S95-S105
11 p.
article
13 LINCS: Towards building a trustworthy litigation hold enabled cloud storage system Zawoad, Shams
2015
14 S1 p. S55-S67
13 p.
article
14 Network and device forensic analysis of Android social-messaging applications Walnycky, Daniel
2015
14 S1 p. S77-S84
8 p.
article
15 New acquisition method based on firmware update protocols for Android smartphones Yang, Seung Jei
2015
14 S1 p. S68-S76
9 p.
article
16 Privacy-preserving email forensics Armknecht, Frederik
2015
14 S1 p. S127-S136
10 p.
article
17 Rapid forensic imaging of large disks with sifting collectors Grier, Jonathan
2015
14 S1 p. S34-S44
11 p.
article
18 The impact of GPU-assisted malware on memory forensics: A case study Balzarotti, Davide
2015
14 S1 p. S16-S24
9 p.
article
19 Wirespeed: Extending the AFF4 forensic container format for scalable acquisition and live analysis Schatz, Bradley L.
2015
14 S1 p. S45-S54
10 p.
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands