nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis
|
Saleem, Shahzad |
|
2016 |
16 |
S |
p. S55-S64 10 p. |
artikel |
2 |
Authorship verification for different languages, genres and topics
|
Halvani, Oren |
|
2016 |
16 |
S |
p. S33-S43 11 p. |
artikel |
3 |
Automatic profile generation for live Linux Memory analysis
|
Socała, Arkadiusz |
|
2016 |
16 |
S |
p. S11-S24 14 p. |
artikel |
4 |
Digital evidence, ‘absence’ of data and ambiguous patterns of reasoning
|
Biedermann, Alex |
|
2016 |
16 |
S |
p. S86-S95 10 p. |
artikel |
5 |
Evaluating atomicity, and integrity of correct memory acquisition methods
|
Gruhn, Michael |
|
2016 |
16 |
S |
p. S1-S10 10 p. |
artikel |
6 |
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history
|
Gresty, David W. |
|
2016 |
16 |
S |
p. S124-S133 10 p. |
artikel |
7 |
Forensic analysis of cloud-native artifacts
|
Roussev, Vassil |
|
2016 |
16 |
S |
p. S104-S113 10 p. |
artikel |
8 |
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis
|
Al Mutawa, Noora |
|
2016 |
16 |
S |
p. S96-S103 8 p. |
artikel |
9 |
Generic RAID reassembly using block-level entropy
|
Zoubek, Christian |
|
2016 |
16 |
S |
p. S44-S54 11 p. |
artikel |
10 |
Lest we forget: Cold-boot attacks on scrambled DDR3 memory
|
Bauer, Johannes |
|
2016 |
16 |
S |
p. S65-S74 10 p. |
artikel |
11 |
Pool tag quick scanning for windows memory analysis
|
Sylve, Joe T. |
|
2016 |
16 |
S |
p. S25-S32 8 p. |
artikel |
12 |
Prelim i - Editorial Board
|
|
|
2016 |
16 |
S |
p. i- 1 p. |
artikel |
13 |
Prelim iii - Contents List
|
|
|
2016 |
16 |
S |
p. iii- 1 p. |
artikel |
14 |
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists
|
Hitchcock, Ben |
|
2016 |
16 |
S |
p. S75-S85 11 p. |
artikel |
15 |
TLSkex: Harnessing virtual machine introspection for decrypting TLS communication
|
Taubmann, Benjamin |
|
2016 |
16 |
S |
p. S114-S123 10 p. |
artikel |