nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A novel time-memory trade-off method for password recovery
|
Thing, Vrizlynn L.L. |
|
2009 |
6 |
S |
p. S114-S120 7 p. |
artikel |
2 |
A second generation computer forensic analysis system
|
Ayers, Daniel |
|
2009 |
6 |
S |
p. S34-S42 9 p. |
artikel |
3 |
Bringing science to digital forensics with standardized forensic corpora
|
Garfinkel, Simson |
|
2009 |
6 |
S |
p. S2-S11 10 p. |
artikel |
4 |
Computer forensic timeline visualization tool
|
Olsson, Jens |
|
2009 |
6 |
S |
p. S78-S87 10 p. |
artikel |
5 |
DEX: Digital evidence provenance supporting reproducibility and comparison
|
Levine, Brian Neil |
|
2009 |
6 |
S |
p. S48-S56 9 p. |
artikel |
6 |
DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge
|
Kahvedžić, Damir |
|
2009 |
6 |
S |
p. S23-S33 11 p. |
artikel |
7 |
Digital forensic implications of ZFS
|
Beebe, Nicole Lang |
|
2009 |
6 |
S |
p. S99-S107 9 p. |
artikel |
8 |
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow
|
Cohen, Michael |
|
2009 |
6 |
S |
p. S57-S68 12 p. |
artikel |
9 |
Extraction of forensically sensitive information from windows physical memory
|
Hejazi, S.M. |
|
2009 |
6 |
S |
p. S121-S131 11 p. |
artikel |
10 |
Identification and recovery of JPEG files with missing fragments
|
Sencar, Husrev T. |
|
2009 |
6 |
S |
p. S88-S98 11 p. |
artikel |
11 |
Lessons learned from the construction of a Korean software reference data set for digital forensics
|
Kim, Kibom |
|
2009 |
6 |
S |
p. S108-S113 6 p. |
artikel |
12 |
Ninth Annual DFRWS Conference
|
|
|
2009 |
6 |
S |
p. S1- 1 p. |
artikel |
13 |
Prelim i - Editorial Board
|
|
|
2009 |
6 |
S |
p. i- 1 p. |
artikel |
14 |
Teleporter: An analytically and forensically sound duplicate transfer system
|
Watkins, Kathryn |
|
2009 |
6 |
S |
p. S43-S47 5 p. |
artikel |
15 |
The persistence of memory: Forensic identification and extraction of cryptographic keys
|
Maartmann-Moe, Carsten |
|
2009 |
6 |
S |
p. S132-S140 9 p. |
artikel |
16 |
Using shellbag information to reconstruct user activities
|
Zhu, Yuandong |
|
2009 |
6 |
S |
p. S69-S77 9 p. |
artikel |
17 |
Validation and verification of computer forensic software tools—Searching Function
|
Guo, Yinghua |
|
2009 |
6 |
S |
p. S12-S22 11 p. |
artikel |