Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 A framework for attack patterns' discovery in honeynet data Thonnard, Olivier
2008
5 S p. S128-S139
12 p.
article
2 A novel approach of mining write-prints for authorship attribution in e-mail forensics Iqbal, Farkhund
2008
5 S p. S42-S51
10 p.
article
3 An overall assessment of Mobile Internal Acquisition Tool Distefano, Alessandro
2008
5 S p. S121-S127
7 p.
article
4 Automated computer forensics training in a virtualized environment Brueckner, Stephen
2008
5 S p. S105-S111
7 p.
article
5 Detecting file fragmentation point using sequential hypothesis testing Pal, Anandabrata
2008
5 S p. S2-S13
12 p.
article
6 Eighth Annual DFRWS Conference 2008
5 S p. S1-
1 p.
article
7 FACE: Automated digital evidence discovery and correlation Case, Andrew
2008
5 S p. S65-S75
11 p.
article
8 Forensic analysis of the Windows registry in memory Dolan-Gavitt, Brendan
2008
5 S p. S26-S32
7 p.
article
9 Forensic memory analysis: Files mapped in memory van Baar, R.B.
2008
5 S p. S52-S57
6 p.
article
10 High-speed search using Tarari content processor in digital forensics Lee, Jooyoung
2008
5 S p. S91-S95
5 p.
article
11 Limewire examinations Lewthwaite, Joseph
2008
5 S p. S96-S104
9 p.
article
12 MEGA: A tool for Mac OS X operating system and application forensics Joyce, Robert A.
2008
5 S p. S83-S90
8 p.
article
13 Predicting the types of file fragments Calhoun, William C.
2008
5 S p. S14-S20
7 p.
article
14 Prelim i - Editorial Board. 2008
5 S p. i-
1 p.
article
15 PyFlag – An advanced network forensic framework Cohen, M.I.
2008
5 S p. S112-S120
9 p.
article
16 Recovering deleted data from the Windows registry Morgan, Timothy D.
2008
5 S p. S33-S41
9 p.
article
17 The impact of Microsoft Windows pool allocation strategies on memory forensics Schuster, Andreas
2008
5 S p. S58-S64
7 p.
article
18 Using JPEG quantization tables to identify imagery processed by software Kornblum, Jesse D.
2008
5 S p. S21-S25
5 p.
article
19 Using the HFS+ journal for deleted file recovery Burghardt, Aaron
2008
5 S p. S76-S82
7 p.
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands