nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs
|
Neshenko, Nataliia |
|
|
42-43 |
S |
p. |
artikel |
2 |
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis
|
Sester, Joachim |
|
|
42-43 |
S |
p. |
artikel |
3 |
A contemporary investigation of NTFS file fragmentation
|
van der Meer, Vincent |
|
|
42-43 |
S |
p. |
artikel |
4 |
Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses
|
Rathore, Hemant |
|
|
42-43 |
S |
p. |
artikel |
5 |
A forensic analysis of micromobility solutions
|
Hilgert, Jan-Niclas |
|
|
42-43 |
S |
p. |
artikel |
6 |
A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage
|
Breitinger, Frank |
|
|
42-43 |
S |
p. |
artikel |
7 |
A generalized approach to automotive forensics
|
Gomez Buquerin, Kevin Klaus |
|
|
42-43 |
S |
p. |
artikel |
8 |
A likelihood ratio approach for the evaluation of single point device locations
|
Spichiger, Hannes |
|
|
42-43 |
S |
p. |
artikel |
9 |
A live digital forensics approach for quantum mechanical computers
|
Closser, Dayton |
|
|
42-43 |
S |
p. |
artikel |
10 |
Alt-tech social forensics: Forensic analysis of alternative social networking applications
|
Johnson, Hailey |
|
|
42-43 |
S |
p. |
artikel |
11 |
Ambiguous file system partitions
|
Schneider, Janine |
|
|
42-43 |
S |
p. |
artikel |
12 |
An abstract model for digital forensic analysis tools - A foundation for systematic error mitigation analysis
|
Hargreaves, Christopher |
|
|
42-43 |
S |
p. |
artikel |
13 |
Analysis of real-time operating systems’ file systems: Built-in cameras from vehicles
|
Lee, Jung-Hwan |
|
|
42-43 |
S |
p. |
artikel |
14 |
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks
|
Karafili, Erisa |
|
|
42-43 |
S |
p. |
artikel |
15 |
An Empirical Study of the NTFS Cluster Allocation Behavior Over Time
|
Karresand, Martin |
|
|
42-43 |
S |
p. |
artikel |
16 |
An extensible and scalable system for hash lookup and approximate similarity search with similarity digest algorithms
|
Huici, Daniel |
|
|
42-43 |
S |
p. |
artikel |
17 |
ANOC: Automated NoSQL database carver
|
Nissan, Mahfuzul I. |
|
|
42-43 |
S |
p. |
artikel |
18 |
Another brick in the wall: An exploratory analysis of digital forensics programs in the United States
|
McCullough, Syria |
|
|
42-43 |
S |
p. |
artikel |
19 |
A novel adversarial example detection method for malicious PDFs using multiple mutated classifiers
|
Liu, Chao |
|
|
42-43 |
S |
p. |
artikel |
20 |
APAC2022-Print-Ad-Hybrid-Web (3)
|
|
|
|
42-43 |
S |
p. |
artikel |
21 |
Applying digital stratigraphy to the problem of recycled storage media
|
Schneider, Janine |
|
|
42-43 |
S |
p. |
artikel |
22 |
Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability
|
Palmbach, David |
|
|
42-43 |
S |
p. |
artikel |
23 |
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities
|
Torabi, Sadegh |
|
|
42-43 |
S |
p. |
artikel |
24 |
A step in a new direction: NVIDIA GPU kernel driver memory forensics
|
Bowen, Christopher J. |
|
|
42-43 |
S |
p. |
artikel |
25 |
A study on cloud data access through browser credential migration in Windows environment
|
Hur, Uk |
|
|
42-43 |
S |
p. |
artikel |
26 |
A systematic approach to understanding MACB timestamps on Unix-like systems
|
Thierry, Aurélien |
|
|
42-43 |
S |
p. |
artikel |
27 |
Avoiding Burnout at the Digital Forensics Coalface: Targeted strategies for forensic agencies in the management of job-related stress
|
Kelty, Sally F. |
|
|
42-43 |
S |
p. |
artikel |
28 |
Beyond timestamps: Integrating implicit timing information into digital forensic timelines
|
Dreier, Lisa Marie |
|
|
42-43 |
S |
p. |
artikel |
29 |
Big Data Forensics: Hadoop 3.2.0 Reconstruction
|
Harshany, Edward |
|
|
42-43 |
S |
p. |
artikel |
30 |
BlackFeather: A framework for background noise forensics
|
Li, Qi |
|
|
42-43 |
S |
p. |
artikel |
31 |
BlockQuery: Toward forensically sound cryptocurrency investigation
|
Thomas, Tyler |
|
|
42-43 |
S |
p. |
artikel |
32 |
BMCLeech: Introducing Stealthy Memory Forensics to BMC
|
Latzo, Tobias |
|
|
42-43 |
S |
p. |
artikel |
33 |
Bridging knowledge gaps in digital forensics using unsupervised explainable AI
|
Khalid, Zainab |
|
|
42-43 |
S |
p. |
artikel |
34 |
Bringing order to approximate matching: Classification and attacks on similarity digest algorithms
|
Martín-Pérez, Miguel |
|
|
42-43 |
S |
p. |
artikel |
35 |
Bytewise approximate matching: Evaluating common scenarios for executable files
|
Jakobs, Carlo |
|
|
42-43 |
S |
p. |
artikel |
36 |
CATCH: Cloud Data Acquisition through Comprehensive and Hybrid Approaches
|
Yang, Jihyeok |
|
|
42-43 |
S |
p. |
artikel |
37 |
Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem
|
Shin, Yeonghun |
|
|
42-43 |
S |
p. |
artikel |
38 |
ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models
|
Michelet, Gaëtan |
|
|
42-43 |
S |
p. |
artikel |
39 |
Chip chop — smashing the mobile phone secure chip for fun and digital forensics
|
Alendal, Gunnar |
|
|
42-43 |
S |
p. |
artikel |
40 |
ChunkedHCs algorithm for authorship verification problems: Reddit case study
|
Le, Anh Duc |
|
|
42-43 |
S |
p. |
artikel |
41 |
CNN based zero-day malware detection using small binary segments
|
Wen, Qiaokun |
|
|
42-43 |
S |
p. |
artikel |
42 |
Coffee forensics — Reconstructing data in IoT devices running Contiki OS
|
Sandvik, Jens-Petter |
|
|
42-43 |
S |
p. |
artikel |
43 |
Combining AI and AM – Improving approximate matching through transformer networks
|
Uhlig, Frieder |
|
|
42-43 |
S |
p. |
artikel |
44 |
Compiler-provenance identification in obfuscated binaries using vision transformers
|
Khan, Wasif |
|
|
42-43 |
S |
p. |
artikel |
45 |
Contamination of digital evidence: Understanding an underexposed risk
|
Gruber, Jan |
|
|
42-43 |
S |
p. |
artikel |
46 |
Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems
|
Qasim, Syed Ali |
|
|
42-43 |
S |
p. |
artikel |
47 |
cRGB_Mem: At the intersection of memory forensics and machine learning
|
Ali-Gombe, Aisha |
|
|
42-43 |
S |
p. |
artikel |
48 |
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection
|
Sayakkara, Asanka |
|
|
42-43 |
S |
p. |
artikel |
49 |
Dashcam forensic investigation guidelines
|
Lallie, Harjinder Singh |
|
|
42-43 |
S |
p. |
artikel |
50 |
Database memory forensics: A machine learning approach to reverse-engineer query activity
|
Nissan, Mahfuzul I. |
|
|
42-43 |
S |
p. |
artikel |
51 |
Database memory forensics: Identifying cache patterns for log verification
|
Wagner, James |
|
|
42-43 |
S |
p. |
artikel |
52 |
Dead Man's Switch: Forensic Autopsy of the Nintendo Switch
|
Barr-Smith, Frederick |
|
|
42-43 |
S |
p. |
artikel |
53 |
Decrypting IndexedDB in private mode of Gecko-based browsers
|
Kim, Dohun |
|
|
42-43 |
S |
p. |
artikel |
54 |
Deepfake noise investigation and detection
|
Wang, Tianyi |
|
|
42-43 |
S |
p. |
artikel |
55 |
DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation
|
Anda, Felix |
|
|
42-43 |
S |
p. |
artikel |
56 |
Detecting Cyberbullying “Hotspots” on Twitter: A Predictive Analytics Approach
|
Ho, Shuyuan Mary |
|
|
42-43 |
S |
p. |
artikel |
57 |
Detecting hidden kernel modules in memory snapshots
|
Nagy, Roland |
|
|
42-43 |
S |
p. |
artikel |
58 |
Developing an IoT forensic methodology. A concept proposal
|
Castelo Gómez, Juan Manuel |
|
|
42-43 |
S |
p. |
artikel |
59 |
DFRWS APAC 2024 Brisbane
|
|
|
|
42-43 |
S |
p. |
artikel |
60 |
DFRWS APAC 2024 Brisbane
|
|
|
|
42-43 |
S |
p. |
artikel |
61 |
DFRWS APAC 2025 Seoul
|
|
|
|
42-43 |
S |
p. |
artikel |
62 |
10-13-DFRWS-Baltimore-2023 (2)
|
|
|
|
42-43 |
S |
p. |
artikel |
63 |
DFRWS-Baltimore-2021
|
|
|
|
42-43 |
S |
p. |
artikel |
64 |
DFRWS Euro 2025 BRNO
|
|
|
|
42-43 |
S |
p. |
artikel |
65 |
DFRWS EURO 2025 Brno
|
|
|
|
42-43 |
S |
p. |
artikel |
66 |
DFRWS EU 2026 Sweden
|
|
|
|
42-43 |
S |
p. |
artikel |
67 |
DFRWS EU 10-year review and future directions in Digital Forensic Research
|
Breitinger, Frank |
|
|
42-43 |
S |
p. |
artikel |
68 |
DFRWS 2024 EU Zaragoza
|
|
|
|
42-43 |
S |
p. |
artikel |
69 |
DFRWS 2024 USA Baton Rouge
|
|
|
|
42-43 |
S |
p. |
artikel |
70 |
DFRWS USA 2024 Baton Rouge
|
|
|
|
42-43 |
S |
p. |
artikel |
71 |
DFRWS USA 2025 Chicago
|
|
|
|
42-43 |
S |
p. |
artikel |
72 |
DFRWS-Zaragoza-EU-2023-new
|
|
|
|
42-43 |
S |
p. |
artikel |
73 |
DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs
|
Park, Sungha |
|
|
42-43 |
S |
p. |
artikel |
74 |
Digital forensic analysis of mobile automotive maintenance applications
|
Sumaila, Faisal |
|
|
42-43 |
S |
p. |
artikel |
75 |
Discovering spoliation of evidence through identifying traces on deleted files in macOS
|
Joun, Jihun |
|
|
42-43 |
S |
p. |
artikel |
76 |
Do You “Relay” Want to Give Me Away? – Forensic Cues of Smart Relays and Their IoT Companion Apps
|
Eichhorn, Maximilian |
|
|
42-43 |
S |
p. |
artikel |
77 |
Duck Hunt: Memory forensics of USB attack platforms
|
Thomas, Tyler |
|
|
42-43 |
S |
p. |
artikel |
78 |
Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
79 |
Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
80 |
Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
81 |
Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
82 |
Eighth Annual DFRWS Europe Conference
|
Habibnia, Babak |
|
|
42-43 |
S |
p. |
artikel |
83 |
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis
|
Sayakkara, Asanka |
|
|
42-43 |
S |
p. |
artikel |
84 |
Enhancing DFIR in orchestration Environments: Real-time forensic framework with eBPF for windows
|
Jin, Philgeun |
|
|
42-43 |
S |
p. |
artikel |
85 |
Enhancing speaker identification in criminal investigations through clusterization and rank-based scoring
|
Moura, Antonio Artur |
|
|
42-43 |
S |
p. |
artikel |
86 |
Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics
|
Navanesan, Lojenaa |
|
|
42-43 |
S |
p. |
artikel |
87 |
EU_2023_Ad
|
|
|
|
42-43 |
S |
p. |
artikel |
88 |
Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application
|
Pace, Lauren R. |
|
|
42-43 |
S |
p. |
artikel |
89 |
Evidence in the fog – Triage in fog computing systems
|
Sandvik, Jens-Petter |
|
|
42-43 |
S |
p. |
artikel |
90 |
Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project
|
Grajeda, Cinthya |
|
|
42-43 |
S |
p. |
artikel |
91 |
Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models
|
Solanke, Abiodun A. |
|
|
42-43 |
S |
p. |
artikel |
92 |
Exploiting database storage for data exfiltration
|
Wagner, James |
|
|
42-43 |
S |
p. |
artikel |
93 |
Exploiting RPMB authentication in a closed source TEE implementation
|
Fukami, Aya |
|
|
42-43 |
S |
p. |
artikel |
94 |
Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality
|
Hassenfeldt, Courtney |
|
|
42-43 |
S |
p. |
artikel |
95 |
Exploring the potential of large language models for author profiling tasks in digital text forensics
|
Cho, Sang-Hyun |
|
|
42-43 |
S |
p. |
artikel |
96 |
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application
|
Fernández-Álvarez, Pedro |
|
|
42-43 |
S |
p. |
artikel |
97 |
Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework
|
Sayakkara, Asanka |
|
|
42-43 |
S |
p. |
artikel |
98 |
Factorizing 2FA: Forensic analysis of two-factor authentication applications
|
Berrios, Jessica |
|
|
42-43 |
S |
p. |
artikel |
99 |
FAIRness in digital forensics datasets’ metadata – and how to improve it
|
Mombelli, Samuele |
|
|
42-43 |
S |
p. |
artikel |
100 |
First Annual DFRWS APAC Conference
|
Marrington, Andrew |
|
|
42-43 |
S |
p. |
artikel |
101 |
Forensic analysis for AI speaker with display Echo Show 2 n d generation as a case study
|
Youn, Min-A |
|
|
42-43 |
S |
p. |
artikel |
102 |
Forensic analysis of Matrix protocol and Riot.im application
|
Schipper, Guido Cornelis |
|
|
42-43 |
S |
p. |
artikel |
103 |
Forensic analysis of ReFS journaling
|
Lee, Seonho |
|
|
42-43 |
S |
p. |
artikel |
104 |
Forensic Analysis of the Resilient File System (ReFS) Version 3.4
|
Prade, Paul |
|
|
42-43 |
S |
p. |
artikel |
105 |
Forensic implications of stacked file systems
|
Hilgert, Jan-Niclas |
|
|
42-43 |
S |
p. |
artikel |
106 |
Forensic investigation of Google Meet for memory and browser artifacts
|
Iqbal, Farkhund |
|
|
42-43 |
S |
p. |
artikel |
107 |
Forensic investigation of instant messaging services on linux OS: Discord and Slack as case studies
|
Davis, Megan |
|
|
42-43 |
S |
p. |
artikel |
108 |
Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI
|
Bichara de Assumpção, Matheus |
|
|
42-43 |
S |
p. |
artikel |
109 |
Forensic recovery via chip-transplantation in samsung smartphones
|
Song, Sunbum |
|
|
42-43 |
S |
p. |
artikel |
110 |
ForTrace - A holistic forensic data set synthesis framework
|
Göbel, Thomas |
|
|
42-43 |
S |
p. |
artikel |
111 |
Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations
|
Gruber, Jan |
|
|
42-43 |
S |
p. |
artikel |
112 |
FRASHER – A framework for automated evaluation of similarity hashing
|
Göbel, Thomas |
|
|
42-43 |
S |
p. |
artikel |
113 |
FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process
|
Rais, Muhammad Haris |
|
|
42-43 |
S |
p. |
artikel |
114 |
GBKPA and AuxShield: Addressing adversarial robustness and transferability in android malware detection
|
Valeti, Kumarakrishna |
|
|
42-43 |
S |
p. |
artikel |
115 |
Generic Metadata Time Carving
|
Nordvik, Rune |
|
|
42-43 |
S |
p. |
artikel |
116 |
Geotagging accuracy in smartphone photography
|
Ryser, Elénore |
|
|
42-43 |
S |
p. |
artikel |
117 |
Ghost protocol – Snapchat as a method of surveillance
|
Matthews, Richard |
|
|
42-43 |
S |
p. |
artikel |
118 |
Grand theft API: A forensic analysis of vehicle cloud data
|
Ebbers, Simon |
|
|
42-43 |
S |
p. |
artikel |
119 |
GreenForensics: Deep hybrid edge-cloud detection and forensics system for battery-performance-balance conscious devices
|
Sewak, Mohit |
|
|
42-43 |
S |
p. |
artikel |
120 |
Hamming distributions of popular perceptual hashing techniques
|
McKeown, Sean |
|
|
42-43 |
S |
p. |
artikel |
121 |
Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries
|
Kanta, Aikaterini |
|
|
42-43 |
S |
p. |
artikel |
122 |
Hiding Process Memory Via Anti-Forensic Techniques
|
Palutke, Ralph |
|
|
42-43 |
S |
p. |
artikel |
123 |
Hit and run: Forensic vehicle event reconstruction through driver-based cloud data from Progressive's snapshot application
|
Onik, Abdur Rahman |
|
|
42-43 |
S |
p. |
artikel |
124 |
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts
|
Kanta, Aikaterini |
|
|
42-43 |
S |
p. |
artikel |
125 |
Hypervisor-based data synthesis: On its potential to tackle the curse of client-side agent remnants in forensic image generation
|
Wolf, Dennis |
|
|
42-43 |
S |
p. |
artikel |
126 |
Identifying interception possibilities for WhatsApp communication
|
Wijnberg, Dennis |
|
|
42-43 |
S |
p. |
artikel |
127 |
If at first you don't succeed, trie, trie again: Correcting TLSH scalability claims for large-dataset malware forensics
|
Gonzalez, Jordi |
|
|
42-43 |
S |
p. |
artikel |
128 |
Improved Bitcoin simulation model and address heuristic method
|
Gong, Yanan |
|
|
42-43 |
S |
p. |
artikel |
129 |
Improving trace synthesis by utilizing computer vision for user action emulation
|
Schmidt, Lukas |
|
|
42-43 |
S |
p. |
artikel |
130 |
Insider threat prediction based on unsupervised anomaly detection scheme for proactive forensic investigation
|
Wei, Yichen |
|
|
42-43 |
S |
p. |
artikel |
131 |
Interpreting the location data extracted from the Apple Health database
|
Jennings, Luke |
|
|
42-43 |
S |
p. |
artikel |
132 |
In the time loop: Data remanence in main memory of virtual machines
|
Savchenko, Ella |
|
|
42-43 |
S |
p. |
artikel |
133 |
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers
|
Zhang, Xiaolu |
|
|
42-43 |
S |
p. |
artikel |
134 |
IoT forensics: Analysis of a HIKVISION's mobile app
|
Dragonas, Evangelos |
|
|
42-43 |
S |
p. |
artikel |
135 |
IoT network traffic analysis: Opportunities and challenges for forensic investigators?
|
Wu, Tina |
|
|
42-43 |
S |
p. |
artikel |
136 |
IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic
|
Sokol, Pavol |
|
|
42-43 |
S |
p. |
artikel |
137 |
JTAG-based PLC memory acquisition framework for industrial control systems
|
Rais, Muhammad Haris |
|
|
42-43 |
S |
p. |
artikel |
138 |
Juicing V8: A primary account for the memory forensics of the V8 JavaScript engine
|
Wang, Enoch |
|
|
42-43 |
S |
p. |
artikel |
139 |
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover
|
Lamshöft, Kevin |
|
|
42-43 |
S |
p. |
artikel |
140 |
KVMIveggur: Flexible, secure, and efficient support for self-service virtual machine introspection
|
Sentanoe, Stewart |
|
|
42-43 |
S |
p. |
artikel |
141 |
Law enforcement educational challenges for mobile forensics
|
Humphries, Georgina |
|
|
42-43 |
S |
p. |
artikel |
142 |
Leveraging memory forensics to investigate and detect illegal 3D printing activities
|
Ali, Hala |
|
|
42-43 |
S |
p. |
artikel |
143 |
LibDroid: Summarizing information flow of android native libraries via static analysis
|
Shi, Chen |
|
|
42-43 |
S |
p. |
artikel |
144 |
Live system call trace reconstruction on Linux
|
Nguyen, Thanh |
|
|
42-43 |
S |
p. |
artikel |
145 |
LogExtractor: Extracting digital evidence from android log messages via string and taint analysis
|
Cheng, Chris Chao-Chun |
|
|
42-43 |
S |
p. |
artikel |
146 |
Machine learning based approach to analyze file meta data for smart phone file triage
|
Serhal, Cezar |
|
|
42-43 |
S |
p. |
artikel |
147 |
Malware family classification via efficient Huffman features
|
O’Shaughnessy, Stephen |
|
|
42-43 |
S |
p. |
artikel |
148 |
MARS: The first line of defense for IoT incident response
|
Waguespack, Karley M. |
|
|
42-43 |
S |
p. |
artikel |
149 |
Memory Analysis of macOS Page Queues
|
Case, Andrew |
|
|
42-43 |
S |
p. |
artikel |
150 |
Memory analysis of .NET and .Net Core applications
|
Manna, Modhuparna |
|
|
42-43 |
S |
p. |
artikel |
151 |
Memory Analysis of the Python Runtime Environment
|
Ali, Hala |
|
|
42-43 |
S |
p. |
artikel |
152 |
Memory forensic analysis of a programmable logic controller in industrial control systems
|
Rais, Muhammad Haris |
|
|
42-43 |
S |
p. |
artikel |
153 |
Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework
|
Thomas, Tyler |
|
|
42-43 |
S |
p. |
artikel |
154 |
MIC: Memory analysis of IndexedDB data on Chromium-based applications
|
Jeong, Byeongchan |
|
|
42-43 |
S |
p. |
artikel |
155 |
Module extraction and DLL hijacking detection via single or multiple memory dumps
|
Fernández-Álvarez, Pedro |
|
|
42-43 |
S |
p. |
artikel |
156 |
Monitoring an anonymity network: Toward the deanonymization of hidden services
|
Simioni, Marco |
|
|
42-43 |
S |
p. |
artikel |
157 |
Mount SMB.pcap: Reconstructing file systems and file operations from network traffic
|
Hilgert, Jan-Niclas |
|
|
42-43 |
S |
p. |
artikel |
158 |
Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for malware detection and forensics
|
Sewak, Mohit |
|
|
42-43 |
S |
p. |
artikel |
159 |
Nintendo 3DS forensics: A secondhand case study
|
Read, Huw O.L. |
|
|
42-43 |
S |
p. |
artikel |
160 |
On Challenges in Verifying Trusted Executable Files in Memory Forensics
|
Uroz, Daniel |
|
|
42-43 |
S |
p. |
artikel |
161 |
One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption
|
Groß, Tobias |
|
|
42-43 |
S |
p. |
artikel |
162 |
On enhancing memory forensics with FAME: Framework for advanced monitoring and execution
|
Gharaibeh, Taha |
|
|
42-43 |
S |
p. |
artikel |
163 |
On the prevalence of software supply chain attacks: Empirical study and investigative framework
|
Andreoli, Anthony |
|
|
42-43 |
S |
p. |
artikel |
164 |
Out of Control: Igniting SCADA investigations with an HMI forensics framework and the ignition forensics artifact carving tool (IFACT)
|
Salmon, LaSean |
|
|
42-43 |
S |
p. |
artikel |
165 |
PEM: Remote forensic acquisition of PLC memory in industrial control systems
|
Zubair, Nauman |
|
|
42-43 |
S |
p. |
artikel |
166 |
PHASER: Perceptual hashing algorithms evaluation and results - An open source forensic framework
|
McKeown, Sean |
|
|
42-43 |
S |
p. |
artikel |
167 |
Phishing detection on tor hidden services
|
Steinebach, Martin |
|
|
42-43 |
S |
p. |
artikel |
168 |
PNG Data Detector for DECA
|
Odogwu, Kingson Chinedu |
|
|
42-43 |
S |
p. |
artikel |
169 |
PREE: Heuristic builder for reverse engineering of network protocols in industrial control systems
|
Qasim, Syed Ali |
|
|
42-43 |
S |
p. |
artikel |
170 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
171 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
172 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
173 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
174 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
175 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
176 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
177 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
178 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
179 |
Prelim i - Editorial Board
|
|
|
|
42-43 |
S |
p. |
artikel |
180 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
181 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
182 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
183 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
184 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
185 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
186 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
187 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
188 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
189 |
Prelim iii - Contents List
|
|
|
|
42-43 |
S |
p. |
artikel |
190 |
Problem solved: A reliable, deterministic method for JPEG fragmentation point detection
|
van der Meer, Vincent |
|
|
42-43 |
S |
p. |
artikel |
191 |
ProvNet-IoT: Provenance based network layer forensics in Internet of Things
|
Sadineni, Lakshminarayana |
|
|
42-43 |
S |
p. |
artikel |
192 |
Prudent design principles for digital tampering experiments
|
Schneider, Janine |
|
|
42-43 |
S |
p. |
artikel |
193 |
Quantifying data volatility for IoT forensics with examples from Contiki OS
|
Sandvik, Jens-Petter |
|
|
42-43 |
S |
p. |
artikel |
194 |
Re-imagen: Generating coherent background activity in synthetic scenario-based forensic datasets using large language models
|
Voigt, Lena L. |
|
|
42-43 |
S |
p. |
artikel |
195 |
Retrieving deleted records from Telegram
|
Vasilaras, Alexandros |
|
|
42-43 |
S |
p. |
artikel |
196 |
Revisiting logical image formats for future digital forensics: A comprehensive analysis on L01 and AFF4-L
|
Im, Sorin |
|
|
42-43 |
S |
p. |
artikel |
197 |
Revisiting the dataset gap problem – On availability, assessment and perspective of mobile forensic corpora
|
Gonçalves, Patrik |
|
|
42-43 |
S |
p. |
artikel |
198 |
Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses
|
Rathore, Hemant |
|
|
42-43 |
S |
p. |
artikel |
199 |
Seance: Divination of tool-breaking changes in forensically important binaries
|
Maggio, Ryan D. |
|
|
42-43 |
S |
p. |
artikel |
200 |
Second Annual DFRWS APAC Conference
|
|
|
|
42-43 |
S |
p. |
artikel |
201 |
Selective Imaging of File System Data on Live Systems
|
Faust, Fabian |
|
|
42-43 |
S |
p. |
artikel |
202 |
Sensitivity analysis for a Bitcoin simulation model
|
Gong, Yanan |
|
|
42-43 |
S |
p. |
artikel |
203 |
Sharing datasets for digital forensic: A novel taxonomy and legal concerns
|
Breitinger, Frank |
|
|
42-43 |
S |
p. |
artikel |
204 |
So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum
|
Onik, Abdur Rahman |
|
|
42-43 |
S |
p. |
artikel |
205 |
SoK: Timeline based event reconstruction for digital forensics: Terminology, methodology, and current challenges
|
Breitinger, Frank |
|
|
42-43 |
S |
p. |
artikel |
206 |
ssdeeper: Evaluating and improving ssdeep
|
Jakobs, Carlo |
|
|
42-43 |
S |
p. |
artikel |
207 |
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic
|
Sentanoe, Stewart |
|
|
42-43 |
S |
p. |
artikel |
208 |
Statistical Methods for the Forensic Analysis of Geolocated Event Data
|
Galbraith, Christopher |
|
|
42-43 |
S |
p. |
artikel |
209 |
Structuring the Evaluation of Location-Related Mobile Device Evidence
|
Casey, Eoghan |
|
|
42-43 |
S |
p. |
artikel |
210 |
TAENet: Two-branch Autoencoder Network for Interpretable Deepfake Detection
|
Du, Fuqiang |
|
|
42-43 |
S |
p. |
artikel |
211 |
Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems
|
Billard, David |
|
|
42-43 |
S |
p. |
artikel |
212 |
Tampering with Digital Evidence is Hard: The Case of Main Memory Images
|
Schneider, Janine |
|
|
42-43 |
S |
p. |
artikel |
213 |
25th DFRWS USA 2025
|
|
|
|
42-43 |
S |
p. |
artikel |
214 |
The Proceedings of the Seventh Annual DFRWS Europe Conference
|
|
|
|
42-43 |
S |
p. |
artikel |
215 |
The provenance of Apple Health data: A timeline of update history
|
Jennings, Luke |
|
|
42-43 |
S |
p. |
artikel |
216 |
TLS key material identification and extraction in memory: Current state and future challenges
|
Baier, Daniel |
|
|
42-43 |
S |
p. |
artikel |
217 |
Towards a unified XAI-based framework for digital forensic investigations
|
Khalid, Zainab |
|
|
42-43 |
S |
p. |
artikel |
218 |
Towards generic memory forensic framework for programmable logic controllers
|
Awad, Rima Asmar |
|
|
42-43 |
S |
p. |
artikel |
219 |
Towards Open-Set Forensic Source Grouping on JPEG Header Information
|
Mullan, Patrick |
|
|
42-43 |
S |
p. |
artikel |
220 |
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice
|
Franqueira, Virginia N.L. |
|
|
42-43 |
S |
p. |
artikel |
221 |
TraceGen: User activity emulation for digital forensic test image generation
|
Du, Xiaoyu |
|
|
42-43 |
S |
p. |
artikel |
222 |
Twentieth Annual DFRWS Conference
|
Nelson, Alex |
|
|
42-43 |
S |
p. |
artikel |
223 |
Twenty first Annual DFRWS Conference
|
Sparling, Aaron |
|
|
42-43 |
S |
p. |
artikel |
224 |
Twenty-Fourth DFRWS USA 2024
|
|
|
|
42-43 |
S |
p. |
artikel |
225 |
Twenty Second Annual DFRWS Conference
|
|
|
|
42-43 |
S |
p. |
artikel |
226 |
Twenty third annual DFRWS conference
|
|
|
|
42-43 |
S |
p. |
artikel |
227 |
Ubi est indicium? On forensic analysis of the UBI file system
|
Deutschmann, Matthias |
|
|
42-43 |
S |
p. |
artikel |
228 |
Uncovering linux desktop espionage
|
Schmidt, Lukas |
|
|
42-43 |
S |
p. |
artikel |
229 |
Unifying Metadata-Based Storage Reconstruction and Carving with LAYR
|
Schneider, Janine |
|
|
42-43 |
S |
p. |
artikel |
230 |
Using deep learning to detect social media ‘trolls’
|
MacDermott, Áine |
|
|
42-43 |
S |
p. |
artikel |
231 |
Using micro-services and artificial intelligence to analyze images in criminal evidences
|
Silva, Iaslan |
|
|
42-43 |
S |
p. |
artikel |
232 |
Using relational graphs for exploratory analysis of network traffic data
|
Cermak, Milan |
|
|
42-43 |
S |
p. |
artikel |
233 |
US2022-Print-Ad
|
|
|
|
42-43 |
S |
p. |
artikel |
234 |
Vec2UAge: Enhancing underage age estimation performance through facial embeddings
|
Anda, Felix |
|
|
42-43 |
S |
p. |
artikel |
235 |
Video source identification using machine learning: A case study of 16 instant messaging applications
|
Yang, Hyomin |
|
|
42-43 |
S |
p. |
artikel |
236 |
VIDE - Vault App Identification and Extraction System for iOS Devices
|
Dorai, Gokila |
|
|
42-43 |
S |
p. |
artikel |
237 |
volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
|
Oh, Dong Bin |
|
|
42-43 |
S |
p. |
artikel |
238 |
WARNE: A stalkerware evidence collection tool
|
Mangeard, Philippe |
|
|
42-43 |
S |
p. |
artikel |
239 |
Was the clock correct? Exploring timestamp interpretation through time anchors for digital forensic event reconstruction
|
Vanini, Céline |
|
|
42-43 |
S |
p. |
artikel |
240 |
Welcome to the proceedings of the Fourth Annual DFRWS APAC Conference 2024!
|
Chan, Raymond |
|
|
42-43 |
S |
p. |
artikel |
241 |
Welcome to the 9th annual DFRWS Europe conference!
|
|
|
|
42-43 |
S |
p. |
artikel |
242 |
Welcome to the 10th annual DFRWS Europe conference!
|
|
|
|
42-43 |
S |
p. |
artikel |
243 |
Welcome to the 11th annual DFRWS Europe conference!
|
|
|
|
42-43 |
S |
p. |
artikel |
244 |
Well Played, Suspect! – Forensic examination of the handheld gaming console “Steam Deck”
|
Eichhorn, Maximilian |
|
|
42-43 |
S |
p. |
artikel |
245 |
What do incident response practitioners need to know? A skillmap for the years ahead
|
Hranický, Radek |
|
|
42-43 |
S |
p. |
artikel |
246 |
Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files
|
Block, Frank |
|
|
42-43 |
S |
p. |
artikel |
247 |
Your car is recording: Metadata-driven dashcam analysis system
|
Lee, Kukheon |
|
|
42-43 |
S |
p. |
artikel |
248 |
Your forensic AI-assistant, SERENA: Systematic extraction and reconstruction for enhanced A2P message forensics
|
Kim, Jieon |
|
|
42-43 |
S |
p. |
artikel |