nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An extended digital forensic readiness and maturity model
|
Bankole Prof, Felix |
|
|
40 |
C |
p. |
artikel |
2 |
An improved forensic-by-design framework for cloud computing with systems engineering standard compliance
|
Akilal, Abdellah |
|
|
40 |
C |
p. |
artikel |
3 |
A semi-supervised deep learning based video anomaly detection framework using RGB-D for surveillance of real-world critical environments
|
Khaire, Pushpajit |
|
|
40 |
C |
p. |
artikel |
4 |
A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system
|
Shin, Jiho |
|
|
40 |
C |
p. |
artikel |
5 |
Conducting a ‘manual examination’ of a device as part of a digital investigation
|
Horsman, Graeme |
|
|
40 |
C |
p. |
artikel |
6 |
Corrigendum to “Tamperproof timestamped provenance ledger using blockchain technology∗” [Forens. Sci. Int.: Digit. Invest. 33 (2020) 300977]
|
Jaquet-Chiffelle, David-Olivier |
|
|
40 |
C |
p. |
artikel |
7 |
Deepfake forensics: Cross-manipulation robustness of feedforward- and recurrent convolutional forgery detection methods
|
Chamot, Frederic |
|
|
40 |
C |
p. |
artikel |
8 |
Defining principles for preserving privacy in digital forensic examinations
|
Horsman, Graeme |
|
|
40 |
C |
p. |
artikel |
9 |
Editorial
|
Nikkel, Bruce |
|
|
40 |
C |
p. |
artikel |
10 |
Evidence from hacking: A few tiresome problems
|
Sommer, Peter |
|
|
40 |
C |
p. |
artikel |
11 |
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema
|
Son, Jihun |
|
|
40 |
C |
p. |
artikel |
12 |
Forensic analysis of note and journal applications
|
Shin, Sumin |
|
|
40 |
C |
p. |
artikel |
13 |
Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber
|
Kim, Soram |
|
|
40 |
C |
p. |
artikel |
14 |
NapierOne: A modern mixed file data set alternative to Govdocs1
|
Davies, Simon R. |
|
|
40 |
C |
p. |
artikel |
15 |
Prelim i - Editorial Board
|
|
|
|
40 |
C |
p. |
artikel |
16 |
Prelim iii - Contents List
|
|
|
|
40 |
C |
p. |
artikel |
17 |
RanSAP: An open dataset of ransomware storage access patterns for training machine learning models
|
Hirano, Manabu |
|
|
40 |
C |
p. |
artikel |
18 |
Reliability assessment of digital forensic investigations in the Norwegian police
|
Stoykova, Radina |
|
|
40 |
C |
p. |
artikel |
19 |
Strategies for safeguarding examiner objectivity and evidence reliability during digital forensic investigations
|
Sunde, Nina |
|
|
40 |
C |
p. |
artikel |
20 |
The case for Zero Trust Digital Forensics
|
Neale, Christopher |
|
|
40 |
C |
p. |
artikel |
21 |
The impact of face image compression in future generation electronic identity documents
|
Calderoni, Luca |
|
|
40 |
C |
p. |
artikel |
22 |
The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence
|
Bahamazava, Katsiaryna |
|
|
40 |
C |
p. |
artikel |
23 |
The unwanted effects of imprecise language in forensic science standards
|
Marshall, Angus M. |
|
|
40 |
C |
p. |
artikel |
24 |
Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations
|
Bang, Jewan |
|
|
40 |
C |
p. |
artikel |