nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Forensic Audit of the Tor Browser Bundle
|
Muir, Matt |
|
|
29 |
C |
p. 118-128 |
artikel |
2 |
A multilayered semantic framework for integrated forensic acquisition on social media
|
Arshad, Humaira |
|
|
29 |
C |
p. 147-158 |
artikel |
3 |
A review of digital video tampering: From simple editing to full synthesis
|
Johnston, Pamela |
|
|
29 |
C |
p. 67-81 |
artikel |
4 |
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
|
Sayakkara, Asanka |
|
|
29 |
C |
p. 43-54 |
artikel |
5 |
A survey on forensic investigation of operating system logs
|
Studiawan, Hudan |
|
|
29 |
C |
p. 1-20 |
artikel |
6 |
CaseNote: Mobile phone call data obfuscation & techniques for call correlation
|
Marshall, Angus M. |
|
|
29 |
C |
p. 82-90 |
artikel |
7 |
Cognitive and human factors in digital forensics: Problems, challenges, and the way forward
|
Sunde, Nina |
|
|
29 |
C |
p. 101-108 |
artikel |
8 |
Decrease of energy deposited during laser decapsulation attacks by dyeing and pigmenting the ECA: Application to the forensic micro-repair of wire bonding
|
Heckmann, Th. |
|
|
29 |
C |
p. 210-218 |
artikel |
9 |
Decrypting live SSH traffic in virtual environments
|
McLaren, Peter |
|
|
29 |
C |
p. 109-117 |
artikel |
10 |
Forensic analysis of Microsoft Skype for Business
|
Nicoletti, Marco |
|
|
29 |
C |
p. 159-179 |
artikel |
11 |
Forensic analysis of Nucleus RTOS on MTK smartwatches
|
Gregorio, J. |
|
|
29 |
C |
p. 55-66 |
artikel |
12 |
Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts
|
Jeong, Doowon |
|
|
29 |
C |
p. 21-27 |
artikel |
13 |
Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system
|
Zhang, Xiaolu |
|
|
29 |
C |
p. 28-42 |
artikel |
14 |
Maturation of digital forensics
|
Casey, Eoghan |
|
|
29 |
C |
p. A1-A2 |
artikel |
15 |
Prelim i - Editorial Board
|
|
|
|
29 |
C |
p. i |
artikel |
16 |
Prelim iii - Contents List
|
|
|
|
29 |
C |
p. iii |
artikel |
17 |
PRNU-based source device attribution for YouTube videos
|
Kouokam, Emmanuel Kiegaing |
|
|
29 |
C |
p. 91-100 |
artikel |
18 |
Removing epoxy underfill between neighbouring components using acid for component chip-off
|
Heckmann, Th |
|
|
29 |
C |
p. 198-209 |
artikel |
19 |
Source smartphone identification by exploiting encoding characteristics of recorded speech
|
Jin, Chao |
|
|
29 |
C |
p. 129-146 |
artikel |
20 |
Ten years of critical review on database forensics research
|
Chopade, Rupali |
|
|
29 |
C |
p. 180-197 |
artikel |