Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             14 results found
no title author magazine year volume issue page(s) type
1 An adaptive method to identify disk cluster size based on block content Xu, Ming
2010
7 1-2 p. 48-55
8 p.
article
2 Analysis of Internet Download Manager for collection of digital forensic artefacts Yasin, Muhammad
2010
7 1-2 p. 90-94
5 p.
article
3 An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan Cheng, Fa-Chang
2010
7 1-2 p. 81-89
9 p.
article
4 Digital investigations, security and privacy Casey, Eoghan
2010
7 1-2 p. 1-2
2 p.
article
5 Locating ×86 paging structures in memory images Saur, Karla
2010
7 1-2 p. 28-37
10 p.
article
6 Mining writeprints from anonymous e-mails for forensic investigation Iqbal, Farkhund
2010
7 1-2 p. 56-64
9 p.
article
7 Network forensic frameworks: Survey and research challenges Pilli, Emmanuel S.
2010
7 1-2 p. 14-27
14 p.
article
8 Prelim i - Editorial Board 2010
7 1-2 p. i-
1 p.
article
9 Sequenced release of privacy-accurate information in a forensic investigation Croft, N.J.
2010
7 1-2 p. 95-101
7 p.
article
10 Speaker recognition from encrypted VoIP communications Khan, L.A.
2010
7 1-2 p. 65-73
9 p.
article
11 Speaker verification from partially encrypted compressed speech for forensic investigation Khan, L.A.
2010
7 1-2 p. 74-80
7 p.
article
12 The Digital Crime Tsunami Gogolin, Greg
2010
7 1-2 p. 3-8
6 p.
article
13 Windows mobile advanced forensics: An alternative to existing tools Rehault, Frederick
2010
7 1-2 p. 38-47
10 p.
article
14 WinRAR temporary folder artefacts Fellows, Geoffrey
2010
7 1-2 p. 9-13
5 p.
article
                             14 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands