nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An adaptive method to identify disk cluster size based on block content
|
Xu, Ming |
|
2010 |
7 |
1-2 |
p. 48-55 8 p. |
artikel |
2 |
Analysis of Internet Download Manager for collection of digital forensic artefacts
|
Yasin, Muhammad |
|
2010 |
7 |
1-2 |
p. 90-94 5 p. |
artikel |
3 |
An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan
|
Cheng, Fa-Chang |
|
2010 |
7 |
1-2 |
p. 81-89 9 p. |
artikel |
4 |
Digital investigations, security and privacy
|
Casey, Eoghan |
|
2010 |
7 |
1-2 |
p. 1-2 2 p. |
artikel |
5 |
Locating ×86 paging structures in memory images
|
Saur, Karla |
|
2010 |
7 |
1-2 |
p. 28-37 10 p. |
artikel |
6 |
Mining writeprints from anonymous e-mails for forensic investigation
|
Iqbal, Farkhund |
|
2010 |
7 |
1-2 |
p. 56-64 9 p. |
artikel |
7 |
Network forensic frameworks: Survey and research challenges
|
Pilli, Emmanuel S. |
|
2010 |
7 |
1-2 |
p. 14-27 14 p. |
artikel |
8 |
Prelim i - Editorial Board
|
|
|
2010 |
7 |
1-2 |
p. i- 1 p. |
artikel |
9 |
Sequenced release of privacy-accurate information in a forensic investigation
|
Croft, N.J. |
|
2010 |
7 |
1-2 |
p. 95-101 7 p. |
artikel |
10 |
Speaker recognition from encrypted VoIP communications
|
Khan, L.A. |
|
2010 |
7 |
1-2 |
p. 65-73 9 p. |
artikel |
11 |
Speaker verification from partially encrypted compressed speech for forensic investigation
|
Khan, L.A. |
|
2010 |
7 |
1-2 |
p. 74-80 7 p. |
artikel |
12 |
The Digital Crime Tsunami
|
Gogolin, Greg |
|
2010 |
7 |
1-2 |
p. 3-8 6 p. |
artikel |
13 |
Windows mobile advanced forensics: An alternative to existing tools
|
Rehault, Frederick |
|
2010 |
7 |
1-2 |
p. 38-47 10 p. |
artikel |
14 |
WinRAR temporary folder artefacts
|
Fellows, Geoffrey |
|
2010 |
7 |
1-2 |
p. 9-13 5 p. |
artikel |