nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks
|
Karafili, Erisa |
|
|
32 |
S |
p. |
artikel |
2 |
Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability
|
Palmbach, David |
|
|
32 |
S |
p. |
artikel |
3 |
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities
|
Torabi, Sadegh |
|
|
32 |
S |
p. |
artikel |
4 |
Big Data Forensics: Hadoop 3.2.0 Reconstruction
|
Harshany, Edward |
|
|
32 |
S |
p. |
artikel |
5 |
BMCLeech: Introducing Stealthy Memory Forensics to BMC
|
Latzo, Tobias |
|
|
32 |
S |
p. |
artikel |
6 |
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection
|
Sayakkara, Asanka |
|
|
32 |
S |
p. |
artikel |
7 |
DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation
|
Anda, Felix |
|
|
32 |
S |
p. |
artikel |
8 |
Detecting Cyberbullying “Hotspots” on Twitter: A Predictive Analytics Approach
|
Ho, Shuyuan Mary |
|
|
32 |
S |
p. |
artikel |
9 |
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis
|
Sayakkara, Asanka |
|
|
32 |
S |
p. |
artikel |
10 |
Forensic Analysis of the Resilient File System (ReFS) Version 3.4
|
Prade, Paul |
|
|
32 |
S |
p. |
artikel |
11 |
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers
|
Zhang, Xiaolu |
|
|
32 |
S |
p. |
artikel |
12 |
IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic
|
Sokol, Pavol |
|
|
32 |
S |
p. |
artikel |
13 |
On Challenges in Verifying Trusted Executable Files in Memory Forensics
|
Uroz, Daniel |
|
|
32 |
S |
p. |
artikel |
14 |
PNG Data Detector for DECA
|
Odogwu, Kingson Chinedu |
|
|
32 |
S |
p. |
artikel |
15 |
Prelim i - Editorial Board
|
|
|
|
32 |
S |
p. |
artikel |
16 |
Prelim iii - Contents List
|
|
|
|
32 |
S |
p. |
artikel |
17 |
Structuring the Evaluation of Location-Related Mobile Device Evidence
|
Casey, Eoghan |
|
|
32 |
S |
p. |
artikel |
18 |
Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems
|
Billard, David |
|
|
32 |
S |
p. |
artikel |
19 |
Tampering with Digital Evidence is Hard: The Case of Main Memory Images
|
Schneider, Janine |
|
|
32 |
S |
p. |
artikel |
20 |
The Proceedings of the Seventh Annual DFRWS Europe Conference
|
|
|
|
32 |
S |
p. |
artikel |
21 |
Towards Open-Set Forensic Source Grouping on JPEG Header Information
|
Mullan, Patrick |
|
|
32 |
S |
p. |
artikel |
22 |
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice
|
Franqueira, Virginia N.L. |
|
|
32 |
S |
p. |
artikel |