nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A study on the false positive rate of Stegdetect
|
Khalind, Omed S. |
|
2013 |
9 |
3-4 |
p. 235-245 11 p. |
artikel |
2 |
Contents List
|
|
|
2013 |
9 |
3-4 |
p. iii- 1 p. |
artikel |
3 |
DigLA – A Digsby log analysis tool to identify forensic artifacts
|
Yasin, Muhammad |
|
2013 |
9 |
3-4 |
p. 222-234 13 p. |
artikel |
4 |
Editorial Board
|
|
|
2013 |
9 |
3-4 |
p. i- 1 p. |
artikel |
5 |
Experimental design challenges in digital forensics
|
Casey, Eoghan |
|
2013 |
9 |
3-4 |
p. 167-169 3 p. |
artikel |
6 |
Forensic access to Windows Mobile pim.vol and other Embedded Database (EDB) volumes
|
Kaart, M. |
|
2013 |
9 |
3-4 |
p. 170-192 23 p. |
artikel |
7 |
FrostWire P2P forensic examinations
|
Lewthwaite, Joseph |
|
2013 |
9 |
3-4 |
p. 211-221 11 p. |
artikel |
8 |
JPEG steganography detection with Benford's Law
|
Andriotis, Panagiotis |
|
2013 |
9 |
3-4 |
p. 246-257 12 p. |
artikel |
9 |
The windows IconCache.db: A resource for forensic artifacts from USB connectable devices
|
Collie, Jan |
|
2013 |
9 |
3-4 |
p. 200-210 11 p. |
artikel |
10 |
Using jump lists to identify fraudulent documents
|
Stevenson Smith, G. |
|
2013 |
9 |
3-4 |
p. 193-199 7 p. |
artikel |