Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             18 results found
no title author magazine year volume issue page(s) type
1 A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs Neshenko, Nataliia

37 S p.
article
2 Another brick in the wall: An exploratory analysis of digital forensics programs in the United States McCullough, Syria

37 S p.
article
3 Chip chop — smashing the mobile phone secure chip for fun and digital forensics Alendal, Gunnar

37 S p.
article
4 ChunkedHCs algorithm for authorship verification problems: Reddit case study Le, Anh Duc

37 S p.
article
5 Coffee forensics — Reconstructing data in IoT devices running Contiki OS Sandvik, Jens-Petter

37 S p.
article
6 Duck Hunt: Memory forensics of USB attack platforms Thomas, Tyler

37 S p.
article
7 How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts Kanta, Aikaterini

37 S p.
article
8 JTAG-based PLC memory acquisition framework for industrial control systems Rais, Muhammad Haris

37 S p.
article
9 LogExtractor: Extracting digital evidence from android log messages via string and taint analysis Cheng, Chris Chao-Chun

37 S p.
article
10 Machine learning based approach to analyze file meta data for smart phone file triage Serhal, Cezar

37 S p.
article
11 Malware family classification via efficient Huffman features O’Shaughnessy, Stephen

37 S p.
article
12 Prelim i - Editorial Board
37 S p.
article
13 Prelim iii - Contents List
37 S p.
article
14 Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses Rathore, Hemant

37 S p.
article
15 Seance: Divination of tool-breaking changes in forensically important binaries Maggio, Ryan D.

37 S p.
article
16 Twenty first Annual DFRWS Conference Sparling, Aaron

37 S p.
article
17 Using micro-services and artificial intelligence to analyze images in criminal evidences Silva, Iaslan

37 S p.
article
18 What do incident response practitioners need to know? A skillmap for the years ahead Hranický, Radek

37 S p.
article
                             18 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands