no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A live digital forensics approach for quantum mechanical computers
|
Closser, Dayton |
|
|
40 |
S |
p. |
article |
2 |
A systematic approach to understanding MACB timestamps on Unix-like systems
|
Thierry, Aurélien |
|
|
40 |
S |
p. |
article |
3 |
BlockQuery: Toward forensically sound cryptocurrency investigation
|
Thomas, Tyler |
|
|
40 |
S |
p. |
article |
4 |
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application
|
Fernández-Álvarez, Pedro |
|
|
40 |
S |
p. |
article |
5 |
ForTrace - A holistic forensic data set synthesis framework
|
Göbel, Thomas |
|
|
40 |
S |
p. |
article |
6 |
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover
|
Lamshöft, Kevin |
|
|
40 |
S |
p. |
article |
7 |
Memory forensic analysis of a programmable logic controller in industrial control systems
|
Rais, Muhammad Haris |
|
|
40 |
S |
p. |
article |
8 |
PEM: Remote forensic acquisition of PLC memory in industrial control systems
|
Zubair, Nauman |
|
|
40 |
S |
p. |
article |
9 |
Prelim i - Editorial Board
|
|
|
|
40 |
S |
p. |
article |
10 |
Prelim iii - Contents List
|
|
|
|
40 |
S |
p. |
article |
11 |
Prudent design principles for digital tampering experiments
|
Schneider, Janine |
|
|
40 |
S |
p. |
article |
12 |
Quantifying data volatility for IoT forensics with examples from Contiki OS
|
Sandvik, Jens-Petter |
|
|
40 |
S |
p. |
article |
13 |
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic
|
Sentanoe, Stewart |
|
|
40 |
S |
p. |
article |
14 |
Welcome to the 9th annual DFRWS Europe conference!
|
|
|
|
40 |
S |
p. |
article |