nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Blockchain-based forensic system for collection and preservation of network service evidences
|
Maciá-Fernández, G. |
|
2019 |
28 |
S |
p. S141 |
artikel |
2 |
Characteristics and detectability of Windows auto-start extensibility points in memory forensics
|
Uroz, Daniel |
|
2019 |
28 |
S |
p. S95-S104 |
artikel |
3 |
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns
|
Safaei Pour, Morteza |
|
2019 |
28 |
S |
p. S40-S49 |
artikel |
4 |
Deleted file fragment dating by analysis of allocated neighbors
|
Bahjat, Ahmed A. |
|
2019 |
28 |
S |
p. S60-S67 |
artikel |
5 |
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
|
Choi, Jusop |
|
2019 |
28 |
S |
p. S50-S59 |
artikel |
6 |
Forensic source identification using JPEG image headers: The case of smartphones
|
Mullan, Patrick |
|
2019 |
28 |
S |
p. S68-S76 |
artikel |
7 |
Improving file-level fuzzy hashes for malware variant classification
|
Shiel, Ian |
|
2019 |
28 |
S |
p. S88-S94 |
artikel |
8 |
Improving the accuracy of automated facial age estimation to aid CSEM investigations
|
Anda, Felix |
|
2019 |
28 |
S |
p. S142 |
artikel |
9 |
IoT forensic challenges and opportunities for digital traces
|
Servida, Francesco |
|
2019 |
28 |
S |
p. S22-S29 |
artikel |
10 |
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports
|
Karbab, ElMouatez Billah |
|
2019 |
28 |
S |
p. S77-S87 |
artikel |
11 |
On efficiency of artifact lookup strategies in digital forensics
|
Liebler, Lorenz |
|
2019 |
28 |
S |
p. S116-S125 |
artikel |
12 |
On the feasibility of binary authorship characterization
|
Alrabaee, Saed |
|
2019 |
28 |
S |
p. S3-S11 |
artikel |
13 |
Prelim i - Editorial Board
|
|
|
2019 |
28 |
S |
p. i |
artikel |
14 |
Prelim iii - Contents List
|
|
|
2019 |
28 |
S |
p. iii |
artikel |
15 |
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS
|
Atwal, Tajvinder Singh |
|
2019 |
28 |
S |
p. S105-S115 |
artikel |
16 |
SyncTriage: Using synchronisation artefacts to optimise acquisition order
|
Hargreaves, Christopher |
|
2019 |
28 |
S |
p. S134-S140 |
artikel |
17 |
The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence?
|
Zandwijk, Jan Peter van |
|
2019 |
28 |
S |
p. S126-S133 |
artikel |
18 |
The proceedings of the Sixth Annual DFRWS Europe Conference
|
Habibnia, Babak |
|
2019 |
28 |
S |
p. S1-S2 |
artikel |
19 |
The Research of Alcohol Drinking State Analyzing Based on Smart Watch Data
|
Zhao, Lu |
|
2019 |
28 |
S |
p. S143 |
artikel |
20 |
Towards exact and inexact approximate matching of executable binaries
|
Liebler, Lorenz |
|
2019 |
28 |
S |
p. S12-S21 |
artikel |
21 |
Using the object ID index as an investigative approach for NTFS file systems
|
Nordvik, Rune |
|
2019 |
28 |
S |
p. S30-S39 |
artikel |