nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling
|
Porter, Kyle |
|
|
26 |
S |
p. S87-S97 |
artikel |
2 |
Automated forensic analysis of mobile applications on Android devices
|
Lin, Xiaodong |
|
|
26 |
S |
p. S59-S66 |
artikel |
3 |
Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge
|
Thompson, Michael F. |
|
|
26 |
S |
p. S127-S135 |
artikel |
4 |
Deep learning at the shallow end: Malware classification for non-domain experts
|
Le, Quan |
|
|
26 |
S |
p. S118-S126 |
artikel |
5 |
Digital forensic investigation of two-way radio communication equipment and services
|
Kouwen, Arie |
|
|
26 |
S |
p. S77-S86 |
artikel |
6 |
DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps
|
Taubmann, Benjamin |
|
|
26 |
S |
p. S67-S76 |
artikel |
7 |
Eighteenth Annual DFRWS Conference
|
|
|
|
26 |
S |
p. S1-S2 |
artikel |
8 |
Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time
|
Grajeda, Cinthya |
|
|
26 |
S |
p. S47-S58 |
artikel |
9 |
Facial-Forensic Analysis Tool
|
Al-Kawaz, Hiba |
|
|
26 |
S |
p. S136 |
artikel |
10 |
Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit
|
Hilgert, Jan-Niclas |
|
|
26 |
S |
p. S21-S29 |
artikel |
11 |
Leveraging relocations in ELF-binaries for Linux kernel version identification
|
Bhatt, Manish |
|
|
26 |
S |
p. S12-S20 |
artikel |
12 |
Memory forensics and the Windows Subsystem for Linux
|
Lewis, Nathan |
|
|
26 |
S |
p. S3-S11 |
artikel |
13 |
Multinomial malware classification via low-level features
|
Banin, Sergii |
|
|
26 |
S |
p. S107-S117 |
artikel |
14 |
On the viability of data collection using Google Rapid Response for enterprise-level malware research
|
Mosli, Rayan |
|
|
26 |
S |
p. S139 |
artikel |
15 |
Prelim i - Editorial Board
|
|
|
|
26 |
S |
p. i |
artikel |
16 |
Prelim iii - Contents List
|
|
|
|
26 |
S |
p. iii |
artikel |
17 |
Reconstructing ADS data hiding in windows NTFS: A temporal analysis
|
Kao, Da-Yu |
|
|
26 |
S |
p. S137 |
artikel |
18 |
Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache
|
Horsman, Graeme |
|
|
26 |
S |
p. S30-S37 |
artikel |
19 |
Resurrecting Portable Network Graphics using block generators
|
Lambertz, Martin |
|
|
26 |
S |
p. S138 |
artikel |
20 |
Welcome pwn: Almond smart home hub forensics
|
Awasthi, Akshay |
|
|
26 |
S |
p. S38-S46 |
artikel |
21 |
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests
|
Tuzel, Tomasz |
|
|
26 |
S |
p. S98-S106 |
artikel |