no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy
|
Conlan, Kevin |
|
2016 |
18 |
S |
p. S66-S75 10 p. |
article |
2 |
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
|
Alrabaee, Saed |
|
2016 |
18 |
S |
p. S11-S22 12 p. |
article |
3 |
Contents List
|
|
|
2016 |
18 |
S |
p. iii- 1 p. |
article |
4 |
CuFA: A more formal definition for digital forensic artifacts
|
Harichandran, Vikram S. |
|
2016 |
18 |
S |
p. S125-S137 13 p. |
article |
5 |
Database image content explorer: Carving data that does not officially exist
|
Wagner, James |
|
2016 |
18 |
S |
p. S97-S107 11 p. |
article |
6 |
dbling: Identifying extensions installed on encrypted web thin clients
|
Mabey, Mike |
|
2016 |
18 |
S |
p. S55-S65 11 p. |
article |
7 |
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker
|
Meffert, Christopher S. |
|
2016 |
18 |
S |
p. S87-S96 10 p. |
article |
8 |
Detecting objective-C malware through memory forensics
|
Case, Andrew |
|
2016 |
18 |
S |
p. S3-S10 8 p. |
article |
9 |
Editorial Board
|
|
|
2016 |
18 |
S |
p. i-ii nvt p. |
article |
10 |
Fingerprinting Android packaging: Generating DNAs for malware detection
|
Karbab, ElMouatez Billah |
|
2016 |
18 |
S |
p. S33-S45 13 p. |
article |
11 |
Forensically extracting file encrypted contents on OS X using HFS+ journal file
|
McGrath, Niall |
|
2016 |
18 |
S |
p. S157- 1 p. |
article |
12 |
InVEST: Intelligent visual email search and triage
|
Koven, Jay |
|
2016 |
18 |
S |
p. S138-S148 11 p. |
article |
13 |
PeekaTorrent: Leveraging P2P hash values for digital forensics
|
Neuner, Sebastian |
|
2016 |
18 |
S |
p. S149-S156 8 p. |
article |
14 |
Rapid differential forensic imaging of mobile devices
|
Guido, M. |
|
2016 |
18 |
S |
p. S46-S54 9 p. |
article |
15 |
Recovery method of deleted records and tables from ESE database
|
Kim, Jeonghyeon |
|
2016 |
18 |
S |
p. S118-S124 7 p. |
article |
16 |
Recovery of heavily fragmented JPEG files
|
Tang, Yanbin |
|
2016 |
18 |
S |
p. S108-S117 10 p. |
article |
17 |
Robust bootstrapping memory analysis against anti-forensics
|
Lee, Kyoungho |
|
2016 |
18 |
S |
p. S23-S32 10 p. |
article |
18 |
Sixteenth Annual DFRWS Conference
|
|
|
2016 |
18 |
S |
p. S1-S2 2 p. |
article |
19 |
Time is on my side: Steganography in filesystem metadata
|
Neuner, Sebastian |
|
2016 |
18 |
S |
p. S76-S86 11 p. |
article |