Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             27 results found
no title author magazine year volume issue page(s) type
1 A data recovery technique for Redis using internal dictionary structure Chopade, Rupali

38 C p.
article
2 A machine learning-based forensic tool for image classification - A design science approach Del Mar-Raave, Joanna Rose

38 C p.
article
3 A memory-based game-theoretic defensive approach for digital forensic investigators Shafiee Hasanabadi, Saeed

38 C p.
article
4 An android-based field investigation tool to estimate the potential trajectories of perforated AK bullets in 1 mm sheet metal surfaces Nishshanka, Lt Col Bandula

38 C p.
article
5 An easy-to-explain decision support framework for forensic analysis of dynamic signatures Mazzolini, Daniela

38 C p.
article
6 A new model for forensic data extraction from encrypted mobile devices Fukami, Aya

38 C p.
article
7 BLADE: Robust malware detection against obfuscation in android Sihag, Vikas

38 C p.
article
8 Camera Obscura: Exploiting in-camera processing for image counter forensics Baracchi, Daniele

38 C p.
article
9 Cell site analysis; use and reliability of survey methods Tart, Matt

38 C p.
article
10 Dataset construction challenges for digital forensics Horsman, Graeme

38 C p.
article
11 Decision support for first responders and digital device prioritisation Horsman, Graeme

38 C p.
article
12 Defining ‘service levels’ for digital forensic science organisations Horsman, Graeme

38 C p.
article
13 Digital forensic tool verification: An evaluation of options for establishing trustworthiness Marshall, Angus M.

38 C p.
article
14 Drone GPS data analysis for flight path reconstruction: A study on DJI, Parrot & Yuneec make drones Kumar, Ravin

38 C p.
article
15 Establishing forensics capabilities in the presence of superuser insider threats Manral, Bharat

38 C p.
article
16 Generic signature development for IoT Botnet families Abbas, Syed Ghazanfar

38 C p.
article
17 Journal roles and responsibilities: Simplification and optimization Nikkel, Bruce

38 C p.
article
18 Microsoft's Your Phone environment from a digital forensic perspective Domingues, Patricio

38 C p.
article
19 Modern macOS userland runtime analysis Manna, Modhuparna

38 C p.
article
20 On the need for AI to triage encrypted data containers in U.S. law enforcement applications Lanagan, Sean

38 C p.
article
21 Prelim i - Editorial Board
38 C p.
article
22 Prelim iii - Contents List
38 C p.
article
23 SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics Negrão, Miguel

38 C p.
article
24 The complexity of internet of things forensics: A state-of-the-art review Lutta, Pantaleon

38 C p.
article
25 Timestamp prefix carving for filesystem metadata extraction Porter, Kyle

38 C p.
article
26 Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios Botacin, Marcus

38 C p.
article
27 User profiles’ image clustering for digital investigations Rouhi, Rahimeh

38 C p.
article
                             27 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands