nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A live digital forensics approach for quantum mechanical computers
|
Closser, Dayton |
|
|
40 |
S |
p. |
artikel |
2 |
A systematic approach to understanding MACB timestamps on Unix-like systems
|
Thierry, Aurélien |
|
|
40 |
S |
p. |
artikel |
3 |
BlockQuery: Toward forensically sound cryptocurrency investigation
|
Thomas, Tyler |
|
|
40 |
S |
p. |
artikel |
4 |
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application
|
Fernández-Álvarez, Pedro |
|
|
40 |
S |
p. |
artikel |
5 |
ForTrace - A holistic forensic data set synthesis framework
|
Göbel, Thomas |
|
|
40 |
S |
p. |
artikel |
6 |
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover
|
Lamshöft, Kevin |
|
|
40 |
S |
p. |
artikel |
7 |
Memory forensic analysis of a programmable logic controller in industrial control systems
|
Rais, Muhammad Haris |
|
|
40 |
S |
p. |
artikel |
8 |
PEM: Remote forensic acquisition of PLC memory in industrial control systems
|
Zubair, Nauman |
|
|
40 |
S |
p. |
artikel |
9 |
Prelim i - Editorial Board
|
|
|
|
40 |
S |
p. |
artikel |
10 |
Prelim iii - Contents List
|
|
|
|
40 |
S |
p. |
artikel |
11 |
Prudent design principles for digital tampering experiments
|
Schneider, Janine |
|
|
40 |
S |
p. |
artikel |
12 |
Quantifying data volatility for IoT forensics with examples from Contiki OS
|
Sandvik, Jens-Petter |
|
|
40 |
S |
p. |
artikel |
13 |
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic
|
Sentanoe, Stewart |
|
|
40 |
S |
p. |
artikel |
14 |
Welcome to the 9th annual DFRWS Europe conference!
|
|
|
|
40 |
S |
p. |
artikel |