Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             248 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs Neshenko, Nataliia

42-43 S p.
artikel
2 A comparative study of support vector machine and neural networks for file type identification using n-gram analysis Sester, Joachim

42-43 S p.
artikel
3 A contemporary investigation of NTFS file fragmentation van der Meer, Vincent

42-43 S p.
artikel
4 Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses Rathore, Hemant

42-43 S p.
artikel
5 A forensic analysis of micromobility solutions Hilgert, Jan-Niclas

42-43 S p.
artikel
6 A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage Breitinger, Frank

42-43 S p.
artikel
7 A generalized approach to automotive forensics Gomez Buquerin, Kevin Klaus

42-43 S p.
artikel
8 A likelihood ratio approach for the evaluation of single point device locations Spichiger, Hannes

42-43 S p.
artikel
9 A live digital forensics approach for quantum mechanical computers Closser, Dayton

42-43 S p.
artikel
10 Alt-tech social forensics: Forensic analysis of alternative social networking applications Johnson, Hailey

42-43 S p.
artikel
11 Ambiguous file system partitions Schneider, Janine

42-43 S p.
artikel
12 An abstract model for digital forensic analysis tools - A foundation for systematic error mitigation analysis Hargreaves, Christopher

42-43 S p.
artikel
13 Analysis of real-time operating systems’ file systems: Built-in cameras from vehicles Lee, Jung-Hwan

42-43 S p.
artikel
14 An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks Karafili, Erisa

42-43 S p.
artikel
15 An Empirical Study of the NTFS Cluster Allocation Behavior Over Time Karresand, Martin

42-43 S p.
artikel
16 An extensible and scalable system for hash lookup and approximate similarity search with similarity digest algorithms Huici, Daniel

42-43 S p.
artikel
17 ANOC: Automated NoSQL database carver Nissan, Mahfuzul I.

42-43 S p.
artikel
18 Another brick in the wall: An exploratory analysis of digital forensics programs in the United States McCullough, Syria

42-43 S p.
artikel
19 A novel adversarial example detection method for malicious PDFs using multiple mutated classifiers Liu, Chao

42-43 S p.
artikel
20 APAC2022-Print-Ad-Hybrid-Web (3)
42-43 S p.
artikel
21 Applying digital stratigraphy to the problem of recycled storage media Schneider, Janine

42-43 S p.
artikel
22 Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability Palmbach, David

42-43 S p.
artikel
23 A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities Torabi, Sadegh

42-43 S p.
artikel
24 A step in a new direction: NVIDIA GPU kernel driver memory forensics Bowen, Christopher J.

42-43 S p.
artikel
25 A study on cloud data access through browser credential migration in Windows environment Hur, Uk

42-43 S p.
artikel
26 A systematic approach to understanding MACB timestamps on Unix-like systems Thierry, Aurélien

42-43 S p.
artikel
27 Avoiding Burnout at the Digital Forensics Coalface: Targeted strategies for forensic agencies in the management of job-related stress Kelty, Sally F.

42-43 S p.
artikel
28 Beyond timestamps: Integrating implicit timing information into digital forensic timelines Dreier, Lisa Marie

42-43 S p.
artikel
29 Big Data Forensics: Hadoop 3.2.0 Reconstruction Harshany, Edward

42-43 S p.
artikel
30 BlackFeather: A framework for background noise forensics Li, Qi

42-43 S p.
artikel
31 BlockQuery: Toward forensically sound cryptocurrency investigation Thomas, Tyler

42-43 S p.
artikel
32 BMCLeech: Introducing Stealthy Memory Forensics to BMC Latzo, Tobias

42-43 S p.
artikel
33 Bridging knowledge gaps in digital forensics using unsupervised explainable AI Khalid, Zainab

42-43 S p.
artikel
34 Bringing order to approximate matching: Classification and attacks on similarity digest algorithms Martín-Pérez, Miguel

42-43 S p.
artikel
35 Bytewise approximate matching: Evaluating common scenarios for executable files Jakobs, Carlo

42-43 S p.
artikel
36 CATCH: Cloud Data Acquisition through Comprehensive and Hybrid Approaches Yang, Jihyeok

42-43 S p.
artikel
37 Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem Shin, Yeonghun

42-43 S p.
artikel
38 ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models Michelet, Gaëtan

42-43 S p.
artikel
39 Chip chop — smashing the mobile phone secure chip for fun and digital forensics Alendal, Gunnar

42-43 S p.
artikel
40 ChunkedHCs algorithm for authorship verification problems: Reddit case study Le, Anh Duc

42-43 S p.
artikel
41 CNN based zero-day malware detection using small binary segments Wen, Qiaokun

42-43 S p.
artikel
42 Coffee forensics — Reconstructing data in IoT devices running Contiki OS Sandvik, Jens-Petter

42-43 S p.
artikel
43 Combining AI and AM – Improving approximate matching through transformer networks Uhlig, Frieder

42-43 S p.
artikel
44 Compiler-provenance identification in obfuscated binaries using vision transformers Khan, Wasif

42-43 S p.
artikel
45 Contamination of digital evidence: Understanding an underexposed risk Gruber, Jan

42-43 S p.
artikel
46 Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems Qasim, Syed Ali

42-43 S p.
artikel
47 cRGB_Mem: At the intersection of memory forensics and machine learning Ali-Gombe, Aisha

42-43 S p.
artikel
48 Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection Sayakkara, Asanka

42-43 S p.
artikel
49 Dashcam forensic investigation guidelines Lallie, Harjinder Singh

42-43 S p.
artikel
50 Database memory forensics: A machine learning approach to reverse-engineer query activity Nissan, Mahfuzul I.

42-43 S p.
artikel
51 Database memory forensics: Identifying cache patterns for log verification Wagner, James

42-43 S p.
artikel
52 Dead Man's Switch: Forensic Autopsy of the Nintendo Switch Barr-Smith, Frederick

42-43 S p.
artikel
53 Decrypting IndexedDB in private mode of Gecko-based browsers Kim, Dohun

42-43 S p.
artikel
54 Deepfake noise investigation and detection Wang, Tianyi

42-43 S p.
artikel
55 DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation Anda, Felix

42-43 S p.
artikel
56 Detecting Cyberbullying “Hotspots” on Twitter: A Predictive Analytics Approach Ho, Shuyuan Mary

42-43 S p.
artikel
57 Detecting hidden kernel modules in memory snapshots Nagy, Roland

42-43 S p.
artikel
58 Developing an IoT forensic methodology. A concept proposal Castelo Gómez, Juan Manuel

42-43 S p.
artikel
59 DFRWS APAC 2024 Brisbane
42-43 S p.
artikel
60 DFRWS APAC 2024 Brisbane
42-43 S p.
artikel
61 DFRWS APAC 2025 Seoul
42-43 S p.
artikel
62 10-13-DFRWS-Baltimore-2023 (2)
42-43 S p.
artikel
63 DFRWS-Baltimore-2021
42-43 S p.
artikel
64 DFRWS Euro 2025 BRNO
42-43 S p.
artikel
65 DFRWS EURO 2025 Brno
42-43 S p.
artikel
66 DFRWS EU 2026 Sweden
42-43 S p.
artikel
67 DFRWS EU 10-year review and future directions in Digital Forensic Research Breitinger, Frank

42-43 S p.
artikel
68 DFRWS 2024 EU Zaragoza
42-43 S p.
artikel
69 DFRWS 2024 USA Baton Rouge
42-43 S p.
artikel
70 DFRWS USA 2024 Baton Rouge
42-43 S p.
artikel
71 DFRWS USA 2025 Chicago
42-43 S p.
artikel
72 DFRWS-Zaragoza-EU-2023-new
42-43 S p.
artikel
73 DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs Park, Sungha

42-43 S p.
artikel
74 Digital forensic analysis of mobile automotive maintenance applications Sumaila, Faisal

42-43 S p.
artikel
75 Discovering spoliation of evidence through identifying traces on deleted files in macOS Joun, Jihun

42-43 S p.
artikel
76 Do You “Relay” Want to Give Me Away? – Forensic Cues of Smart Relays and Their IoT Companion Apps Eichhorn, Maximilian

42-43 S p.
artikel
77 Duck Hunt: Memory forensics of USB attack platforms Thomas, Tyler

42-43 S p.
artikel
78 Editorial Board
42-43 S p.
artikel
79 Editorial Board
42-43 S p.
artikel
80 Editorial Board
42-43 S p.
artikel
81 Editorial Board
42-43 S p.
artikel
82 Eighth Annual DFRWS Europe Conference Habibnia, Babak

42-43 S p.
artikel
83 EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis Sayakkara, Asanka

42-43 S p.
artikel
84 Enhancing DFIR in orchestration Environments: Real-time forensic framework with eBPF for windows Jin, Philgeun

42-43 S p.
artikel
85 Enhancing speaker identification in criminal investigations through clusterization and rank-based scoring Moura, Antonio Artur

42-43 S p.
artikel
86 Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics Navanesan, Lojenaa

42-43 S p.
artikel
87 EU_2023_Ad
42-43 S p.
artikel
88 Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application Pace, Lauren R.

42-43 S p.
artikel
89 Evidence in the fog – Triage in fog computing systems Sandvik, Jens-Petter

42-43 S p.
artikel
90 Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project Grajeda, Cinthya

42-43 S p.
artikel
91 Explainable digital forensics AI: Towards mitigating distrust in AI-based digital forensics analysis using interpretable models Solanke, Abiodun A.

42-43 S p.
artikel
92 Exploiting database storage for data exfiltration Wagner, James

42-43 S p.
artikel
93 Exploiting RPMB authentication in a closed source TEE implementation Fukami, Aya

42-43 S p.
artikel
94 Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality Hassenfeldt, Courtney

42-43 S p.
artikel
95 Exploring the potential of large language models for author profiling tasks in digital text forensics Cho, Sang-Hyun

42-43 S p.
artikel
96 Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application Fernández-Álvarez, Pedro

42-43 S p.
artikel
97 Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework Sayakkara, Asanka

42-43 S p.
artikel
98 Factorizing 2FA: Forensic analysis of two-factor authentication applications Berrios, Jessica

42-43 S p.
artikel
99 FAIRness in digital forensics datasets’ metadata – and how to improve it Mombelli, Samuele

42-43 S p.
artikel
100 First Annual DFRWS APAC Conference Marrington, Andrew

42-43 S p.
artikel
101 Forensic analysis for AI speaker with display Echo Show 2 n d generation as a case study Youn, Min-A

42-43 S p.
artikel
102 Forensic analysis of Matrix protocol and Riot.im application Schipper, Guido Cornelis

42-43 S p.
artikel
103 Forensic analysis of ReFS journaling Lee, Seonho

42-43 S p.
artikel
104 Forensic Analysis of the Resilient File System (ReFS) Version 3.4 Prade, Paul

42-43 S p.
artikel
105 Forensic implications of stacked file systems Hilgert, Jan-Niclas

42-43 S p.
artikel
106 Forensic investigation of Google Meet for memory and browser artifacts Iqbal, Farkhund

42-43 S p.
artikel
107 Forensic investigation of instant messaging services on linux OS: Discord and Slack as case studies Davis, Megan

42-43 S p.
artikel
108 Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI Bichara de Assumpção, Matheus

42-43 S p.
artikel
109 Forensic recovery via chip-transplantation in samsung smartphones Song, Sunbum

42-43 S p.
artikel
110 ForTrace - A holistic forensic data set synthesis framework Göbel, Thomas

42-43 S p.
artikel
111 Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations Gruber, Jan

42-43 S p.
artikel
112 FRASHER – A framework for automated evaluation of similarity hashing Göbel, Thomas

42-43 S p.
artikel
113 FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process Rais, Muhammad Haris

42-43 S p.
artikel
114 GBKPA and AuxShield: Addressing adversarial robustness and transferability in android malware detection Valeti, Kumarakrishna

42-43 S p.
artikel
115 Generic Metadata Time Carving Nordvik, Rune

42-43 S p.
artikel
116 Geotagging accuracy in smartphone photography Ryser, Elénore

42-43 S p.
artikel
117 Ghost protocol – Snapchat as a method of surveillance Matthews, Richard

42-43 S p.
artikel
118 Grand theft API: A forensic analysis of vehicle cloud data Ebbers, Simon

42-43 S p.
artikel
119 GreenForensics: Deep hybrid edge-cloud detection and forensics system for battery-performance-balance conscious devices Sewak, Mohit

42-43 S p.
artikel
120 Hamming distributions of popular perceptual hashing techniques McKeown, Sean

42-43 S p.
artikel
121 Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries Kanta, Aikaterini

42-43 S p.
artikel
122 Hiding Process Memory Via Anti-Forensic Techniques Palutke, Ralph

42-43 S p.
artikel
123 Hit and run: Forensic vehicle event reconstruction through driver-based cloud data from Progressive's snapshot application Onik, Abdur Rahman

42-43 S p.
artikel
124 How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts Kanta, Aikaterini

42-43 S p.
artikel
125 Hypervisor-based data synthesis: On its potential to tackle the curse of client-side agent remnants in forensic image generation Wolf, Dennis

42-43 S p.
artikel
126 Identifying interception possibilities for WhatsApp communication Wijnberg, Dennis

42-43 S p.
artikel
127 If at first you don't succeed, trie, trie again: Correcting TLSH scalability claims for large-dataset malware forensics Gonzalez, Jordi

42-43 S p.
artikel
128 Improved Bitcoin simulation model and address heuristic method Gong, Yanan

42-43 S p.
artikel
129 Improving trace synthesis by utilizing computer vision for user action emulation Schmidt, Lukas

42-43 S p.
artikel
130 Insider threat prediction based on unsupervised anomaly detection scheme for proactive forensic investigation Wei, Yichen

42-43 S p.
artikel
131 Interpreting the location data extracted from the Apple Health database Jennings, Luke

42-43 S p.
artikel
132 In the time loop: Data remanence in main memory of virtual machines Savchenko, Ella

42-43 S p.
artikel
133 IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers Zhang, Xiaolu

42-43 S p.
artikel
134 IoT forensics: Analysis of a HIKVISION's mobile app Dragonas, Evangelos

42-43 S p.
artikel
135 IoT network traffic analysis: Opportunities and challenges for forensic investigators? Wu, Tina

42-43 S p.
artikel
136 IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic Sokol, Pavol

42-43 S p.
artikel
137 JTAG-based PLC memory acquisition framework for industrial control systems Rais, Muhammad Haris

42-43 S p.
artikel
138 Juicing V8: A primary account for the memory forensics of the V8 JavaScript engine Wang, Enoch

42-43 S p.
artikel
139 Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover Lamshöft, Kevin

42-43 S p.
artikel
140 KVMIveggur: Flexible, secure, and efficient support for self-service virtual machine introspection Sentanoe, Stewart

42-43 S p.
artikel
141 Law enforcement educational challenges for mobile forensics Humphries, Georgina

42-43 S p.
artikel
142 Leveraging memory forensics to investigate and detect illegal 3D printing activities Ali, Hala

42-43 S p.
artikel
143 LibDroid: Summarizing information flow of android native libraries via static analysis Shi, Chen

42-43 S p.
artikel
144 Live system call trace reconstruction on Linux Nguyen, Thanh

42-43 S p.
artikel
145 LogExtractor: Extracting digital evidence from android log messages via string and taint analysis Cheng, Chris Chao-Chun

42-43 S p.
artikel
146 Machine learning based approach to analyze file meta data for smart phone file triage Serhal, Cezar

42-43 S p.
artikel
147 Malware family classification via efficient Huffman features O’Shaughnessy, Stephen

42-43 S p.
artikel
148 MARS: The first line of defense for IoT incident response Waguespack, Karley M.

42-43 S p.
artikel
149 Memory Analysis of macOS Page Queues Case, Andrew

42-43 S p.
artikel
150 Memory analysis of .NET and .Net Core applications Manna, Modhuparna

42-43 S p.
artikel
151 Memory Analysis of the Python Runtime Environment Ali, Hala

42-43 S p.
artikel
152 Memory forensic analysis of a programmable logic controller in industrial control systems Rais, Muhammad Haris

42-43 S p.
artikel
153 Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets – A Tool and Visualization Framework Thomas, Tyler

42-43 S p.
artikel
154 MIC: Memory analysis of IndexedDB data on Chromium-based applications Jeong, Byeongchan

42-43 S p.
artikel
155 Module extraction and DLL hijacking detection via single or multiple memory dumps Fernández-Álvarez, Pedro

42-43 S p.
artikel
156 Monitoring an anonymity network: Toward the deanonymization of hidden services Simioni, Marco

42-43 S p.
artikel
157 Mount SMB.pcap: Reconstructing file systems and file operations from network traffic Hilgert, Jan-Niclas

42-43 S p.
artikel
158 Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for malware detection and forensics Sewak, Mohit

42-43 S p.
artikel
159 Nintendo 3DS forensics: A secondhand case study Read, Huw O.L.

42-43 S p.
artikel
160 On Challenges in Verifying Trusted Executable Files in Memory Forensics Uroz, Daniel

42-43 S p.
artikel
161 One key to rule them all: Recovering the master key from RAM to break Android's file-based encryption Groß, Tobias

42-43 S p.
artikel
162 On enhancing memory forensics with FAME: Framework for advanced monitoring and execution Gharaibeh, Taha

42-43 S p.
artikel
163 On the prevalence of software supply chain attacks: Empirical study and investigative framework Andreoli, Anthony

42-43 S p.
artikel
164 Out of Control: Igniting SCADA investigations with an HMI forensics framework and the ignition forensics artifact carving tool (IFACT) Salmon, LaSean

42-43 S p.
artikel
165 PEM: Remote forensic acquisition of PLC memory in industrial control systems Zubair, Nauman

42-43 S p.
artikel
166 PHASER: Perceptual hashing algorithms evaluation and results - An open source forensic framework McKeown, Sean

42-43 S p.
artikel
167 Phishing detection on tor hidden services Steinebach, Martin

42-43 S p.
artikel
168 PNG Data Detector for DECA Odogwu, Kingson Chinedu

42-43 S p.
artikel
169 PREE: Heuristic builder for reverse engineering of network protocols in industrial control systems Qasim, Syed Ali

42-43 S p.
artikel
170 Prelim i - Editorial Board
42-43 S p.
artikel
171 Prelim i - Editorial Board
42-43 S p.
artikel
172 Prelim i - Editorial Board
42-43 S p.
artikel
173 Prelim i - Editorial Board
42-43 S p.
artikel
174 Prelim i - Editorial Board
42-43 S p.
artikel
175 Prelim i - Editorial Board
42-43 S p.
artikel
176 Prelim i - Editorial Board
42-43 S p.
artikel
177 Prelim i - Editorial Board
42-43 S p.
artikel
178 Prelim i - Editorial Board
42-43 S p.
artikel
179 Prelim i - Editorial Board
42-43 S p.
artikel
180 Prelim iii - Contents List
42-43 S p.
artikel
181 Prelim iii - Contents List
42-43 S p.
artikel
182 Prelim iii - Contents List
42-43 S p.
artikel
183 Prelim iii - Contents List
42-43 S p.
artikel
184 Prelim iii - Contents List
42-43 S p.
artikel
185 Prelim iii - Contents List
42-43 S p.
artikel
186 Prelim iii - Contents List
42-43 S p.
artikel
187 Prelim iii - Contents List
42-43 S p.
artikel
188 Prelim iii - Contents List
42-43 S p.
artikel
189 Prelim iii - Contents List
42-43 S p.
artikel
190 Problem solved: A reliable, deterministic method for JPEG fragmentation point detection van der Meer, Vincent

42-43 S p.
artikel
191 ProvNet-IoT: Provenance based network layer forensics in Internet of Things Sadineni, Lakshminarayana

42-43 S p.
artikel
192 Prudent design principles for digital tampering experiments Schneider, Janine

42-43 S p.
artikel
193 Quantifying data volatility for IoT forensics with examples from Contiki OS Sandvik, Jens-Petter

42-43 S p.
artikel
194 Re-imagen: Generating coherent background activity in synthetic scenario-based forensic datasets using large language models Voigt, Lena L.

42-43 S p.
artikel
195 Retrieving deleted records from Telegram Vasilaras, Alexandros

42-43 S p.
artikel
196 Revisiting logical image formats for future digital forensics: A comprehensive analysis on L01 and AFF4-L Im, Sorin

42-43 S p.
artikel
197 Revisiting the dataset gap problem – On availability, assessment and perspective of mobile forensic corpora Gonçalves, Patrik

42-43 S p.
artikel
198 Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses Rathore, Hemant

42-43 S p.
artikel
199 Seance: Divination of tool-breaking changes in forensically important binaries Maggio, Ryan D.

42-43 S p.
artikel
200 Second Annual DFRWS APAC Conference
42-43 S p.
artikel
201 Selective Imaging of File System Data on Live Systems Faust, Fabian

42-43 S p.
artikel
202 Sensitivity analysis for a Bitcoin simulation model Gong, Yanan

42-43 S p.
artikel
203 Sharing datasets for digital forensic: A novel taxonomy and legal concerns Breitinger, Frank

42-43 S p.
artikel
204 So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum Onik, Abdur Rahman

42-43 S p.
artikel
205 SoK: Timeline based event reconstruction for digital forensics: Terminology, methodology, and current challenges Breitinger, Frank

42-43 S p.
artikel
206 ssdeeper: Evaluating and improving ssdeep Jakobs, Carlo

42-43 S p.
artikel
207 SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic Sentanoe, Stewart

42-43 S p.
artikel
208 Statistical Methods for the Forensic Analysis of Geolocated Event Data Galbraith, Christopher

42-43 S p.
artikel
209 Structuring the Evaluation of Location-Related Mobile Device Evidence Casey, Eoghan

42-43 S p.
artikel
210 TAENet: Two-branch Autoencoder Network for Interpretable Deepfake Detection Du, Fuqiang

42-43 S p.
artikel
211 Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems Billard, David

42-43 S p.
artikel
212 Tampering with Digital Evidence is Hard: The Case of Main Memory Images Schneider, Janine

42-43 S p.
artikel
213 25th DFRWS USA 2025
42-43 S p.
artikel
214 The Proceedings of the Seventh Annual DFRWS Europe Conference
42-43 S p.
artikel
215 The provenance of Apple Health data: A timeline of update history Jennings, Luke

42-43 S p.
artikel
216 TLS key material identification and extraction in memory: Current state and future challenges Baier, Daniel

42-43 S p.
artikel
217 Towards a unified XAI-based framework for digital forensic investigations Khalid, Zainab

42-43 S p.
artikel
218 Towards generic memory forensic framework for programmable logic controllers Awad, Rima Asmar

42-43 S p.
artikel
219 Towards Open-Set Forensic Source Grouping on JPEG Header Information Mullan, Patrick

42-43 S p.
artikel
220 Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice Franqueira, Virginia N.L.

42-43 S p.
artikel
221 TraceGen: User activity emulation for digital forensic test image generation Du, Xiaoyu

42-43 S p.
artikel
222 Twentieth Annual DFRWS Conference Nelson, Alex

42-43 S p.
artikel
223 Twenty first Annual DFRWS Conference Sparling, Aaron

42-43 S p.
artikel
224 Twenty-Fourth DFRWS USA 2024
42-43 S p.
artikel
225 Twenty Second Annual DFRWS Conference
42-43 S p.
artikel
226 Twenty third annual DFRWS conference
42-43 S p.
artikel
227 Ubi est indicium? On forensic analysis of the UBI file system Deutschmann, Matthias

42-43 S p.
artikel
228 Uncovering linux desktop espionage Schmidt, Lukas

42-43 S p.
artikel
229 Unifying Metadata-Based Storage Reconstruction and Carving with LAYR Schneider, Janine

42-43 S p.
artikel
230 Using deep learning to detect social media ‘trolls’ MacDermott, Áine

42-43 S p.
artikel
231 Using micro-services and artificial intelligence to analyze images in criminal evidences Silva, Iaslan

42-43 S p.
artikel
232 Using relational graphs for exploratory analysis of network traffic data Cermak, Milan

42-43 S p.
artikel
233 US2022-Print-Ad
42-43 S p.
artikel
234 Vec2UAge: Enhancing underage age estimation performance through facial embeddings Anda, Felix

42-43 S p.
artikel
235 Video source identification using machine learning: A case study of 16 instant messaging applications Yang, Hyomin

42-43 S p.
artikel
236 VIDE - Vault App Identification and Extraction System for iOS Devices Dorai, Gokila

42-43 S p.
artikel
237 volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model Oh, Dong Bin

42-43 S p.
artikel
238 WARNE: A stalkerware evidence collection tool Mangeard, Philippe

42-43 S p.
artikel
239 Was the clock correct? Exploring timestamp interpretation through time anchors for digital forensic event reconstruction Vanini, Céline

42-43 S p.
artikel
240 Welcome to the proceedings of the Fourth Annual DFRWS APAC Conference 2024! Chan, Raymond

42-43 S p.
artikel
241 Welcome to the 9th annual DFRWS Europe conference!
42-43 S p.
artikel
242 Welcome to the 10th annual DFRWS Europe conference!
42-43 S p.
artikel
243 Welcome to the 11th annual DFRWS Europe conference!
42-43 S p.
artikel
244 Well Played, Suspect! – Forensic examination of the handheld gaming console “Steam Deck” Eichhorn, Maximilian

42-43 S p.
artikel
245 What do incident response practitioners need to know? A skillmap for the years ahead Hranický, Radek

42-43 S p.
artikel
246 Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files Block, Frank

42-43 S p.
artikel
247 Your car is recording: Metadata-driven dashcam analysis system Lee, Kukheon

42-43 S p.
artikel
248 Your forensic AI-assistant, SERENA: Systematic extraction and reconstruction for enhanced A2P message forensics Kim, Jieon

42-43 S p.
artikel
                             248 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland