nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses
|
Rathore, Hemant |
|
|
44 |
S |
p. |
artikel |
2 |
A likelihood ratio approach for the evaluation of single point device locations
|
Spichiger, Hannes |
|
|
44 |
S |
p. |
artikel |
3 |
Analysis of real-time operating systems’ file systems: Built-in cameras from vehicles
|
Lee, Jung-Hwan |
|
|
44 |
S |
p. |
artikel |
4 |
Contamination of digital evidence: Understanding an underexposed risk
|
Gruber, Jan |
|
|
44 |
S |
p. |
artikel |
5 |
Database memory forensics: A machine learning approach to reverse-engineer query activity
|
Nissan, Mahfuzul I. |
|
|
44 |
S |
p. |
artikel |
6 |
DFRWS-Baltimore-2021
|
|
|
|
44 |
S |
p. |
artikel |
7 |
DFRWS-Zaragoza-EU-2023-new
|
|
|
|
44 |
S |
p. |
artikel |
8 |
Discovering spoliation of evidence through identifying traces on deleted files in macOS
|
Joun, Jihun |
|
|
44 |
S |
p. |
artikel |
9 |
Evidence in the fog – Triage in fog computing systems
|
Sandvik, Jens-Petter |
|
|
44 |
S |
p. |
artikel |
10 |
Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI
|
Bichara de Assumpção, Matheus |
|
|
44 |
S |
p. |
artikel |
11 |
FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process
|
Rais, Muhammad Haris |
|
|
44 |
S |
p. |
artikel |
12 |
Hamming distributions of popular perceptual hashing techniques
|
McKeown, Sean |
|
|
44 |
S |
p. |
artikel |
13 |
Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries
|
Kanta, Aikaterini |
|
|
44 |
S |
p. |
artikel |
14 |
Interpreting the location data extracted from the Apple Health database
|
Jennings, Luke |
|
|
44 |
S |
p. |
artikel |
15 |
Module extraction and DLL hijacking detection via single or multiple memory dumps
|
Fernández-Álvarez, Pedro |
|
|
44 |
S |
p. |
artikel |
16 |
On the prevalence of software supply chain attacks: Empirical study and investigative framework
|
Andreoli, Anthony |
|
|
44 |
S |
p. |
artikel |
17 |
Prelim i - Editorial Board
|
|
|
|
44 |
S |
p. |
artikel |
18 |
Prelim iii - Contents List
|
|
|
|
44 |
S |
p. |
artikel |
19 |
Towards generic memory forensic framework for programmable logic controllers
|
Awad, Rima Asmar |
|
|
44 |
S |
p. |
artikel |
20 |
Welcome to the 10th annual DFRWS Europe conference!
|
|
|
|
44 |
S |
p. |
artikel |