Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             22 results found
no title author magazine year volume issue page(s) type
1 An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks Karafili, Erisa

32 S p.
article
2 Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability Palmbach, David

32 S p.
article
3 A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities Torabi, Sadegh

32 S p.
article
4 Big Data Forensics: Hadoop 3.2.0 Reconstruction Harshany, Edward

32 S p.
article
5 BMCLeech: Introducing Stealthy Memory Forensics to BMC Latzo, Tobias

32 S p.
article
6 Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection Sayakkara, Asanka

32 S p.
article
7 DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation Anda, Felix

32 S p.
article
8 Detecting Cyberbullying “Hotspots” on Twitter: A Predictive Analytics Approach Ho, Shuyuan Mary

32 S p.
article
9 EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis Sayakkara, Asanka

32 S p.
article
10 Forensic Analysis of the Resilient File System (ReFS) Version 3.4 Prade, Paul

32 S p.
article
11 IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers Zhang, Xiaolu

32 S p.
article
12 IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic Sokol, Pavol

32 S p.
article
13 On Challenges in Verifying Trusted Executable Files in Memory Forensics Uroz, Daniel

32 S p.
article
14 PNG Data Detector for DECA Odogwu, Kingson Chinedu

32 S p.
article
15 Prelim i - Editorial Board
32 S p.
article
16 Prelim iii - Contents List
32 S p.
article
17 Structuring the Evaluation of Location-Related Mobile Device Evidence Casey, Eoghan

32 S p.
article
18 Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems Billard, David

32 S p.
article
19 Tampering with Digital Evidence is Hard: The Case of Main Memory Images Schneider, Janine

32 S p.
article
20 The Proceedings of the Seventh Annual DFRWS Europe Conference
32 S p.
article
21 Towards Open-Set Forensic Source Grouping on JPEG Header Information Mullan, Patrick

32 S p.
article
22 Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice Franqueira, Virginia N.L.

32 S p.
article
                             22 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands