no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An Empirical Study of the NTFS Cluster Allocation Behavior Over Time
|
Karresand, Martin |
|
|
33 |
S |
p. |
article |
2 |
Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem
|
Shin, Yeonghun |
|
|
33 |
S |
p. |
article |
3 |
Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems
|
Qasim, Syed Ali |
|
|
33 |
S |
p. |
article |
4 |
Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality
|
Hassenfeldt, Courtney |
|
|
33 |
S |
p. |
article |
5 |
Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework
|
Sayakkara, Asanka |
|
|
33 |
S |
p. |
article |
6 |
Generic Metadata Time Carving
|
Nordvik, Rune |
|
|
33 |
S |
p. |
article |
7 |
Hiding Process Memory Via Anti-Forensic Techniques
|
Palutke, Ralph |
|
|
33 |
S |
p. |
article |
8 |
Memory Analysis of macOS Page Queues
|
Case, Andrew |
|
|
33 |
S |
p. |
article |
9 |
Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework
|
Thomas, Tyler |
|
|
33 |
S |
p. |
article |
10 |
Prelim i - Editorial Board
|
|
|
|
33 |
S |
p. |
article |
11 |
Prelim iii - Contents List
|
|
|
|
33 |
S |
p. |
article |
12 |
Statistical Methods for the Forensic Analysis of Geolocated Event Data
|
Galbraith, Christopher |
|
|
33 |
S |
p. |
article |
13 |
Twentieth Annual DFRWS Conference
|
Nelson, Alex |
|
|
33 |
S |
p. |
article |
14 |
Unifying Metadata-Based Storage Reconstruction and Carving with LAYR
|
Schneider, Janine |
|
|
33 |
S |
p. |
article |
15 |
VIDE - Vault App Identification and Extraction System for iOS Devices
|
Dorai, Gokila |
|
|
33 |
S |
p. |
article |