Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             21 results found
no title author magazine year volume issue page(s) type
1 Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling Porter, Kyle

26 S p. S87-S97
article
2 Automated forensic analysis of mobile applications on Android devices Lin, Xiaodong

26 S p. S59-S66
article
3 Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge Thompson, Michael F.

26 S p. S127-S135
article
4 Deep learning at the shallow end: Malware classification for non-domain experts Le, Quan

26 S p. S118-S126
article
5 Digital forensic investigation of two-way radio communication equipment and services Kouwen, Arie

26 S p. S77-S86
article
6 DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps Taubmann, Benjamin

26 S p. S67-S76
article
7 Eighteenth Annual DFRWS Conference
26 S p. S1-S2
article
8 Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time Grajeda, Cinthya

26 S p. S47-S58
article
9 Facial-Forensic Analysis Tool Al-Kawaz, Hiba

26 S p. S136
article
10 Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit Hilgert, Jan-Niclas

26 S p. S21-S29
article
11 Leveraging relocations in ELF-binaries for Linux kernel version identification Bhatt, Manish

26 S p. S12-S20
article
12 Memory forensics and the Windows Subsystem for Linux Lewis, Nathan

26 S p. S3-S11
article
13 Multinomial malware classification via low-level features Banin, Sergii

26 S p. S107-S117
article
14 On the viability of data collection using Google Rapid Response for enterprise-level malware research Mosli, Rayan

26 S p. S139
article
15 Prelim i - Editorial Board
26 S p. i
article
16 Prelim iii - Contents List
26 S p. iii
article
17 Reconstructing ADS data hiding in windows NTFS: A temporal analysis Kao, Da-Yu

26 S p. S137
article
18 Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache Horsman, Graeme

26 S p. S30-S37
article
19 Resurrecting Portable Network Graphics using block generators Lambertz, Martin

26 S p. S138
article
20 Welcome pwn: Almond smart home hub forensics Awasthi, Akshay

26 S p. S38-S46
article
21 Who watches the watcher? Detecting hypervisor introspection from unprivileged guests Tuzel, Tomasz

26 S p. S98-S106
article
                             21 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands