nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A data recovery technique for Redis using internal dictionary structure
|
Chopade, Rupali |
|
|
38 |
C |
p. |
artikel |
2 |
A machine learning-based forensic tool for image classification - A design science approach
|
Del Mar-Raave, Joanna Rose |
|
|
38 |
C |
p. |
artikel |
3 |
A memory-based game-theoretic defensive approach for digital forensic investigators
|
Shafiee Hasanabadi, Saeed |
|
|
38 |
C |
p. |
artikel |
4 |
An android-based field investigation tool to estimate the potential trajectories of perforated AK bullets in 1 mm sheet metal surfaces
|
Nishshanka, Lt Col Bandula |
|
|
38 |
C |
p. |
artikel |
5 |
An easy-to-explain decision support framework for forensic analysis of dynamic signatures
|
Mazzolini, Daniela |
|
|
38 |
C |
p. |
artikel |
6 |
A new model for forensic data extraction from encrypted mobile devices
|
Fukami, Aya |
|
|
38 |
C |
p. |
artikel |
7 |
BLADE: Robust malware detection against obfuscation in android
|
Sihag, Vikas |
|
|
38 |
C |
p. |
artikel |
8 |
Camera Obscura: Exploiting in-camera processing for image counter forensics
|
Baracchi, Daniele |
|
|
38 |
C |
p. |
artikel |
9 |
Cell site analysis; use and reliability of survey methods
|
Tart, Matt |
|
|
38 |
C |
p. |
artikel |
10 |
Dataset construction challenges for digital forensics
|
Horsman, Graeme |
|
|
38 |
C |
p. |
artikel |
11 |
Decision support for first responders and digital device prioritisation
|
Horsman, Graeme |
|
|
38 |
C |
p. |
artikel |
12 |
Defining ‘service levels’ for digital forensic science organisations
|
Horsman, Graeme |
|
|
38 |
C |
p. |
artikel |
13 |
Digital forensic tool verification: An evaluation of options for establishing trustworthiness
|
Marshall, Angus M. |
|
|
38 |
C |
p. |
artikel |
14 |
Drone GPS data analysis for flight path reconstruction: A study on DJI, Parrot & Yuneec make drones
|
Kumar, Ravin |
|
|
38 |
C |
p. |
artikel |
15 |
Establishing forensics capabilities in the presence of superuser insider threats
|
Manral, Bharat |
|
|
38 |
C |
p. |
artikel |
16 |
Generic signature development for IoT Botnet families
|
Abbas, Syed Ghazanfar |
|
|
38 |
C |
p. |
artikel |
17 |
Journal roles and responsibilities: Simplification and optimization
|
Nikkel, Bruce |
|
|
38 |
C |
p. |
artikel |
18 |
Microsoft's Your Phone environment from a digital forensic perspective
|
Domingues, Patricio |
|
|
38 |
C |
p. |
artikel |
19 |
Modern macOS userland runtime analysis
|
Manna, Modhuparna |
|
|
38 |
C |
p. |
artikel |
20 |
On the need for AI to triage encrypted data containers in U.S. law enforcement applications
|
Lanagan, Sean |
|
|
38 |
C |
p. |
artikel |
21 |
Prelim i - Editorial Board
|
|
|
|
38 |
C |
p. |
artikel |
22 |
Prelim iii - Contents List
|
|
|
|
38 |
C |
p. |
artikel |
23 |
SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics
|
Negrão, Miguel |
|
|
38 |
C |
p. |
artikel |
24 |
The complexity of internet of things forensics: A state-of-the-art review
|
Lutta, Pantaleon |
|
|
38 |
C |
p. |
artikel |
25 |
Timestamp prefix carving for filesystem metadata extraction
|
Porter, Kyle |
|
|
38 |
C |
p. |
artikel |
26 |
Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios
|
Botacin, Marcus |
|
|
38 |
C |
p. |
artikel |
27 |
User profiles’ image clustering for digital investigations
|
Rouhi, Rahimeh |
|
|
38 |
C |
p. |
artikel |