Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             17 results found
no title author magazine year volume issue page(s) type
1 AFF4-L: A Scalable Open Logical Evidence Container Schatz, Bradley L.

29 S p. S143-S149
article
2 A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material (CSAM) Sanchez, Laura

29 S p. S124-S142
article
3 bring2lite: A Structural Concept and Tool for Forensic Data Analysis and Recovery of Deleted SQLite Records Meng, Christian

29 S p. S31-S41
article
4 DB3F & DF-Toolkit: The Database Forensic File Format and the Database Forensic Toolkit Wagner, James

29 S p. S42-S50
article
5 Digital Forensic Practices and Methodologies for AI Speaker Ecosystems Jo, Wooyeon

29 S p. S80-S93
article
6 FbHash: A New Similarity Hashing Scheme for Digital Forensics Chang, Donghoon

29 S p. S113-S123
article
7 Forensic Analysis of the Nintendo 3DS NAND Pessolano, Gus

29 S p. S61-S70
article
8 Forensic Analysis of Water Damaged Mobile Devices Fukami, Aya

29 S p. S71-S79
article
9 HookTracer: A System for Automated and Accessible API Hooks Analysis Case, Andrew

29 S p. S104-S112
article
10 Inception: Virtual Space in Memory Space in Real Space – Memory Forensics of Immersive Virtual Reality with the HTC Vive Casey, Peter

29 S p. S13-S21
article
11 Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices Sayakkara, Asanka

29 S p. S94-S103
article
12 Nineteenth Annual DFRWS Conference
29 S p. S1-S2
article
13 Prelim i - Editorial Board
29 S p. i
article
14 Prelim iii - Contents List
29 S p. iii
article
15 Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets Hilgert, Jan-Niclas

29 S p. S22-S30
article
16 Using NTFS Cluster Allocation Behavior to Find the Location of User Data Karresand, Martin

29 S p. S51-S60
article
17 Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries Block, Frank

29 S p. S3-S12
article
                             17 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands