nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advanced carving techniques
|
Cohen, M.I. |
|
2007 |
4 |
3-4 |
p. 119-128 10 p. |
artikel |
2 |
A framework for post-event timeline reconstruction using neural networks
|
Khan, M.N.A. |
|
2007 |
4 |
3-4 |
p. 146-157 12 p. |
artikel |
3 |
Attacks against forensic analysis
|
Casey, Eoghan |
|
2007 |
4 |
3-4 |
p. 105-106 2 p. |
artikel |
4 |
Corrigendum to “Forensic analysis of System Restore points in Microsoft Windows XP” [Digit Investig 3 (3) (2006) 151–158]
|
Harms, Kris |
|
2007 |
4 |
3-4 |
p. 165- 1 p. |
artikel |
5 |
Forensic artefacts left by Pidgin Messenger 2.0
|
van Dongen, Wouter S. |
|
2007 |
4 |
3-4 |
p. 138-145 8 p. |
artikel |
6 |
[No title]
|
Hilley, S. |
|
2007 |
4 |
3-4 |
p. 107-110 4 p. |
artikel |
7 |
[No title]
|
Hilley, S. |
|
2007 |
4 |
3-4 |
p. 110-112 3 p. |
artikel |
8 |
NTFS volume mounts, directory junctions and $Reparse
|
Fellows, Geoff |
|
2007 |
4 |
3-4 |
p. 116-118 3 p. |
artikel |
9 |
Persistent systems techniques in forensic acquisition of memory
|
Huebner, Ewa |
|
2007 |
4 |
3-4 |
p. 129-137 9 p. |
artikel |
10 |
RIPA part III – The intricacies of decryption
|
van Someren, Nicko |
|
2007 |
4 |
3-4 |
p. 113-115 3 p. |
artikel |
11 |
Using Author Topic to detect insider threats from email traffic
|
Okolica, James S. |
|
2007 |
4 |
3-4 |
p. 158-164 7 p. |
artikel |