nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A study on cloud data access through browser credential migration in Windows environment
|
Hur, Uk |
|
|
45 |
S |
p. |
artikel |
2 |
Combining AI and AM – Improving approximate matching through transformer networks
|
Uhlig, Frieder |
|
|
45 |
S |
p. |
artikel |
3 |
cRGB_Mem: At the intersection of memory forensics and machine learning
|
Ali-Gombe, Aisha |
|
|
45 |
S |
p. |
artikel |
4 |
Dashcam forensic investigation guidelines
|
Lallie, Harjinder Singh |
|
|
45 |
S |
p. |
artikel |
5 |
Database memory forensics: Identifying cache patterns for log verification
|
Wagner, James |
|
|
45 |
S |
p. |
artikel |
6 |
DFRWS 2024 EU Zaragoza
|
|
|
|
45 |
S |
p. |
artikel |
7 |
DFRWS 2024 USA Baton Rouge
|
|
|
|
45 |
S |
p. |
artikel |
8 |
Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application
|
Pace, Lauren R. |
|
|
45 |
S |
p. |
artikel |
9 |
Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project
|
Grajeda, Cinthya |
|
|
45 |
S |
p. |
artikel |
10 |
Factorizing 2FA: Forensic analysis of two-factor authentication applications
|
Berrios, Jessica |
|
|
45 |
S |
p. |
artikel |
11 |
Improving trace synthesis by utilizing computer vision for user action emulation
|
Schmidt, Lukas |
|
|
45 |
S |
p. |
artikel |
12 |
IoT forensics: Analysis of a HIKVISION's mobile app
|
Dragonas, Evangelos |
|
|
45 |
S |
p. |
artikel |
13 |
PREE: Heuristic builder for reverse engineering of network protocols in industrial control systems
|
Qasim, Syed Ali |
|
|
45 |
S |
p. |
artikel |
14 |
Prelim i - Editorial Board
|
|
|
|
45 |
S |
p. |
artikel |
15 |
Prelim iii - Contents List
|
|
|
|
45 |
S |
p. |
artikel |
16 |
Sharing datasets for digital forensic: A novel taxonomy and legal concerns
|
Breitinger, Frank |
|
|
45 |
S |
p. |
artikel |
17 |
Twenty third annual DFRWS conference
|
|
|
|
45 |
S |
p. |
artikel |
18 |
Using relational graphs for exploratory analysis of network traffic data
|
Cermak, Milan |
|
|
45 |
S |
p. |
artikel |
19 |
Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files
|
Block, Frank |
|
|
45 |
S |
p. |
artikel |