Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses Rathore, Hemant

44 S p.
article
2 A likelihood ratio approach for the evaluation of single point device locations Spichiger, Hannes

44 S p.
article
3 Analysis of real-time operating systems’ file systems: Built-in cameras from vehicles Lee, Jung-Hwan

44 S p.
article
4 Contamination of digital evidence: Understanding an underexposed risk Gruber, Jan

44 S p.
article
5 Database memory forensics: A machine learning approach to reverse-engineer query activity Nissan, Mahfuzul I.

44 S p.
article
6 DFRWS-Baltimore-2021
44 S p.
article
7 DFRWS-Zaragoza-EU-2023-new
44 S p.
article
8 Discovering spoliation of evidence through identifying traces on deleted files in macOS Joun, Jihun

44 S p.
article
9 Evidence in the fog – Triage in fog computing systems Sandvik, Jens-Petter

44 S p.
article
10 Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI Bichara de Assumpção, Matheus

44 S p.
article
11 FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process Rais, Muhammad Haris

44 S p.
article
12 Hamming distributions of popular perceptual hashing techniques McKeown, Sean

44 S p.
article
13 Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries Kanta, Aikaterini

44 S p.
article
14 Interpreting the location data extracted from the Apple Health database Jennings, Luke

44 S p.
article
15 Module extraction and DLL hijacking detection via single or multiple memory dumps Fernández-Álvarez, Pedro

44 S p.
article
16 On the prevalence of software supply chain attacks: Empirical study and investigative framework Andreoli, Anthony

44 S p.
article
17 Prelim i - Editorial Board
44 S p.
article
18 Prelim iii - Contents List
44 S p.
article
19 Towards generic memory forensic framework for programmable logic controllers Awad, Rima Asmar

44 S p.
article
20 Welcome to the 10th annual DFRWS Europe conference!
44 S p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands