Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             17 results found
no title author magazine year volume issue page(s) type
1 A novel time-memory trade-off method for password recovery Thing, Vrizlynn L.L.
2009
6 S p. S114-S120
7 p.
article
2 A second generation computer forensic analysis system Ayers, Daniel
2009
6 S p. S34-S42
9 p.
article
3 Bringing science to digital forensics with standardized forensic corpora Garfinkel, Simson
2009
6 S p. S2-S11
10 p.
article
4 Computer forensic timeline visualization tool Olsson, Jens
2009
6 S p. S78-S87
10 p.
article
5 DEX: Digital evidence provenance supporting reproducibility and comparison Levine, Brian Neil
2009
6 S p. S48-S56
9 p.
article
6 DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge Kahvedžić, Damir
2009
6 S p. S23-S33
11 p.
article
7 Digital forensic implications of ZFS Beebe, Nicole Lang
2009
6 S p. S99-S107
9 p.
article
8 Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow Cohen, Michael
2009
6 S p. S57-S68
12 p.
article
9 Extraction of forensically sensitive information from windows physical memory Hejazi, S.M.
2009
6 S p. S121-S131
11 p.
article
10 Identification and recovery of JPEG files with missing fragments Sencar, Husrev T.
2009
6 S p. S88-S98
11 p.
article
11 Lessons learned from the construction of a Korean software reference data set for digital forensics Kim, Kibom
2009
6 S p. S108-S113
6 p.
article
12 Ninth Annual DFRWS Conference 2009
6 S p. S1-
1 p.
article
13 Prelim i - Editorial Board 2009
6 S p. i-
1 p.
article
14 Teleporter: An analytically and forensically sound duplicate transfer system Watkins, Kathryn
2009
6 S p. S43-S47
5 p.
article
15 The persistence of memory: Forensic identification and extraction of cryptographic keys Maartmann-Moe, Carsten
2009
6 S p. S132-S140
9 p.
article
16 Using shellbag information to reconstruct user activities Zhu, Yuandong
2009
6 S p. S69-S77
9 p.
article
17 Validation and verification of computer forensic software tools—Searching Function Guo, Yinghua
2009
6 S p. S12-S22
11 p.
article
                             17 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands