Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             21 results found
no title author magazine year volume issue page(s) type
1 An analysis of optical contributions to a photo-sensor's ballistic fingerprints Matthews, R.
2019
28 C p. 139-145
article
2 Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic Gřivna, Tomáš
2019
28 C p. 1-13
article
3 A universal taxonomy and survey of forensic memory acquisition techniques Latzo, Tobias
2019
28 C p. 56-69
article
4 Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes Al Mutawa, Noora
2019
28 C p. 70-82
article
5 Corrigendum to ‘Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language’ [Digital Investigation 22C (2017) 14–45] Casey, Eoghan
2019
28 C p. 183-187
article
6 Decrypting password-based encrypted backup data for Huawei smartphones Park, Myungseo
2019
28 C p. 119-125
article
7 Detecting bot-infected machines using DNS fingerprinting Singh, Manmeet
2019
28 C p. 14-33
article
8 Developing a ‘router examination at scene’ standard operating procedure for crime scene investigators in the United Kingdom Horsman, Graeme
2019
28 C p. 152-162
article
9 Evidence collection and forensics on social networks: Research challenges and directions Arshad, Humaira
2019
28 C p. 126-138
article
10 Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer Lone, Auqib Hamid
2019
28 C p. 44-55
article
11 Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework Horsman, Graeme
2019
28 C p. 146-151
article
12 Geographic profiling for serial cybercrime investigation Butkovic, Asmir
2019
28 C p. 176-182
article
13 Interrelations between digital investigation and forensic science Casey, Eoghan
2019
28 C p. A1-A2
article
14 Investigating spotlight internals to extract metadata Khatri, Yogesh
2019
28 C p. 96-103
article
15 Mal-Flux: Rendering hidden code of packed binary executable Lim, Charles
2019
28 C p. 83-95
article
16 Prelim i - Editorial Board 2019
28 C p. i
article
17 Prelim iii - Contents List 2019
28 C p. iii
article
18 Sifting through the ashes: Amazon Fire TV stick acquisition and analysis Hadgkiss, M.
2019
28 C p. 112-118
article
19 Timeline2GUI: A Log2Timeline CSV parser and training scenarios Debinski, Mark
2019
28 C p. 34-43
article
20 Tool testing and reliability issues in the field of digital forensics Horsman, Graeme
2019
28 C p. 163-175
article
21 Unauthorized access crime in Jordanian law (comparative study) abu issa, Hamzeh
2019
28 C p. 104-111
article
                             21 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands