nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An analysis of optical contributions to a photo-sensor's ballistic fingerprints
|
Matthews, R. |
|
2019 |
28 |
C |
p. 139-145 |
artikel |
2 |
Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic
|
Gřivna, Tomáš |
|
2019 |
28 |
C |
p. 1-13 |
artikel |
3 |
A universal taxonomy and survey of forensic memory acquisition techniques
|
Latzo, Tobias |
|
2019 |
28 |
C |
p. 56-69 |
artikel |
4 |
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes
|
Al Mutawa, Noora |
|
2019 |
28 |
C |
p. 70-82 |
artikel |
5 |
Corrigendum to ‘Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language’ [Digital Investigation 22C (2017) 14–45]
|
Casey, Eoghan |
|
2019 |
28 |
C |
p. 183-187 |
artikel |
6 |
Decrypting password-based encrypted backup data for Huawei smartphones
|
Park, Myungseo |
|
2019 |
28 |
C |
p. 119-125 |
artikel |
7 |
Detecting bot-infected machines using DNS fingerprinting
|
Singh, Manmeet |
|
2019 |
28 |
C |
p. 14-33 |
artikel |
8 |
Developing a ‘router examination at scene’ standard operating procedure for crime scene investigators in the United Kingdom
|
Horsman, Graeme |
|
2019 |
28 |
C |
p. 152-162 |
artikel |
9 |
Evidence collection and forensics on social networks: Research challenges and directions
|
Arshad, Humaira |
|
2019 |
28 |
C |
p. 126-138 |
artikel |
10 |
Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer
|
Lone, Auqib Hamid |
|
2019 |
28 |
C |
p. 44-55 |
artikel |
11 |
Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework
|
Horsman, Graeme |
|
2019 |
28 |
C |
p. 146-151 |
artikel |
12 |
Geographic profiling for serial cybercrime investigation
|
Butkovic, Asmir |
|
2019 |
28 |
C |
p. 176-182 |
artikel |
13 |
Interrelations between digital investigation and forensic science
|
Casey, Eoghan |
|
2019 |
28 |
C |
p. A1-A2 |
artikel |
14 |
Investigating spotlight internals to extract metadata
|
Khatri, Yogesh |
|
2019 |
28 |
C |
p. 96-103 |
artikel |
15 |
Mal-Flux: Rendering hidden code of packed binary executable
|
Lim, Charles |
|
2019 |
28 |
C |
p. 83-95 |
artikel |
16 |
Prelim i - Editorial Board
|
|
|
2019 |
28 |
C |
p. i |
artikel |
17 |
Prelim iii - Contents List
|
|
|
2019 |
28 |
C |
p. iii |
artikel |
18 |
Sifting through the ashes: Amazon Fire TV stick acquisition and analysis
|
Hadgkiss, M. |
|
2019 |
28 |
C |
p. 112-118 |
artikel |
19 |
Timeline2GUI: A Log2Timeline CSV parser and training scenarios
|
Debinski, Mark |
|
2019 |
28 |
C |
p. 34-43 |
artikel |
20 |
Tool testing and reliability issues in the field of digital forensics
|
Horsman, Graeme |
|
2019 |
28 |
C |
p. 163-175 |
artikel |
21 |
Unauthorized access crime in Jordanian law (comparative study)
|
abu issa, Hamzeh |
|
2019 |
28 |
C |
p. 104-111 |
artikel |