nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A framework for attack patterns' discovery in honeynet data
|
Thonnard, Olivier |
|
2008 |
5 |
S |
p. S128-S139 12 p. |
artikel |
2 |
A novel approach of mining write-prints for authorship attribution in e-mail forensics
|
Iqbal, Farkhund |
|
2008 |
5 |
S |
p. S42-S51 10 p. |
artikel |
3 |
An overall assessment of Mobile Internal Acquisition Tool
|
Distefano, Alessandro |
|
2008 |
5 |
S |
p. S121-S127 7 p. |
artikel |
4 |
Automated computer forensics training in a virtualized environment
|
Brueckner, Stephen |
|
2008 |
5 |
S |
p. S105-S111 7 p. |
artikel |
5 |
Detecting file fragmentation point using sequential hypothesis testing
|
Pal, Anandabrata |
|
2008 |
5 |
S |
p. S2-S13 12 p. |
artikel |
6 |
Eighth Annual DFRWS Conference
|
|
|
2008 |
5 |
S |
p. S1- 1 p. |
artikel |
7 |
FACE: Automated digital evidence discovery and correlation
|
Case, Andrew |
|
2008 |
5 |
S |
p. S65-S75 11 p. |
artikel |
8 |
Forensic analysis of the Windows registry in memory
|
Dolan-Gavitt, Brendan |
|
2008 |
5 |
S |
p. S26-S32 7 p. |
artikel |
9 |
Forensic memory analysis: Files mapped in memory
|
van Baar, R.B. |
|
2008 |
5 |
S |
p. S52-S57 6 p. |
artikel |
10 |
High-speed search using Tarari content processor in digital forensics
|
Lee, Jooyoung |
|
2008 |
5 |
S |
p. S91-S95 5 p. |
artikel |
11 |
Limewire examinations
|
Lewthwaite, Joseph |
|
2008 |
5 |
S |
p. S96-S104 9 p. |
artikel |
12 |
MEGA: A tool for Mac OS X operating system and application forensics
|
Joyce, Robert A. |
|
2008 |
5 |
S |
p. S83-S90 8 p. |
artikel |
13 |
Predicting the types of file fragments
|
Calhoun, William C. |
|
2008 |
5 |
S |
p. S14-S20 7 p. |
artikel |
14 |
Prelim i - Editorial Board.
|
|
|
2008 |
5 |
S |
p. i- 1 p. |
artikel |
15 |
PyFlag – An advanced network forensic framework
|
Cohen, M.I. |
|
2008 |
5 |
S |
p. S112-S120 9 p. |
artikel |
16 |
Recovering deleted data from the Windows registry
|
Morgan, Timothy D. |
|
2008 |
5 |
S |
p. S33-S41 9 p. |
artikel |
17 |
The impact of Microsoft Windows pool allocation strategies on memory forensics
|
Schuster, Andreas |
|
2008 |
5 |
S |
p. S58-S64 7 p. |
artikel |
18 |
Using JPEG quantization tables to identify imagery processed by software
|
Kornblum, Jesse D. |
|
2008 |
5 |
S |
p. S21-S25 5 p. |
artikel |
19 |
Using the HFS+ journal for deleted file recovery
|
Burghardt, Aaron |
|
2008 |
5 |
S |
p. S76-S82 7 p. |
artikel |