nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hierarchy of expert performance (HEP) applied to digital forensics: Reliability and biasability in digital forensics decision making
|
Sunde, Nina |
|
|
37 |
C |
p. |
artikel |
2 |
Change and diversity
|
Geradts, Zeno |
|
|
37 |
C |
p. |
artikel |
3 |
Contemporaneous notes for digital forensic examinations
|
Horsman, Graeme |
|
|
37 |
C |
p. |
artikel |
4 |
Corrigendum to “Data acquisition methods using backup data decryption of sony smartphones” [Foren. Sci. Int: Digital Investigation 31 (2019) 200890]
|
Hur, Uk |
|
|
37 |
C |
p. |
artikel |
5 |
Ethics in forensic science: Renewed commitments and a call for papers across the Forensic Science International family
|
|
|
|
37 |
C |
p. |
artikel |
6 |
Exploring digital evidence recognition among front-line law enforcement officers at fatal crash scenes
|
Holt, Thomas |
|
|
37 |
C |
p. |
artikel |
7 |
Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data
|
Kim, Giyoon |
|
|
37 |
C |
p. |
artikel |
8 |
Fuzzy-import hashing: A static analysis technique for malware detection
|
Naik, Nitin |
|
|
37 |
C |
p. |
artikel |
9 |
Hypervisor memory acquisition for ARM
|
Yehuda, Raz Ben |
|
|
37 |
C |
p. |
artikel |
10 |
Prelim i - Editorial Board
|
|
|
|
37 |
C |
p. |
artikel |
11 |
Prelim iii - Contents List
|
|
|
|
37 |
C |
p. |
artikel |
12 |
RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique
|
Sharma, Shweta |
|
|
37 |
C |
p. |
artikel |
13 |
Reliability validation for file system interpretation
|
Nordvik, Rune |
|
|
37 |
C |
p. |
artikel |
14 |
The phone reveals your motion: Digital traces of walking, driving and other movements on iPhones
|
van Zandwijk, Jan Peter |
|
|
37 |
C |
p. |
artikel |
15 |
Web scraping of ecstasy user reports as a novel tool for detecting drug market trends
|
Maybir, James |
|
|
37 |
C |
p. |
artikel |