Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 A study on cloud data access through browser credential migration in Windows environment Hur, Uk

45 S p.
article
2 Combining AI and AM – Improving approximate matching through transformer networks Uhlig, Frieder

45 S p.
article
3 cRGB_Mem: At the intersection of memory forensics and machine learning Ali-Gombe, Aisha

45 S p.
article
4 Dashcam forensic investigation guidelines Lallie, Harjinder Singh

45 S p.
article
5 Database memory forensics: Identifying cache patterns for log verification Wagner, James

45 S p.
article
6 DFRWS 2024 EU Zaragoza
45 S p.
article
7 DFRWS 2024 USA Baton Rouge
45 S p.
article
8 Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application Pace, Lauren R.

45 S p.
article
9 Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project Grajeda, Cinthya

45 S p.
article
10 Factorizing 2FA: Forensic analysis of two-factor authentication applications Berrios, Jessica

45 S p.
article
11 Improving trace synthesis by utilizing computer vision for user action emulation Schmidt, Lukas

45 S p.
article
12 IoT forensics: Analysis of a HIKVISION's mobile app Dragonas, Evangelos

45 S p.
article
13 PREE: Heuristic builder for reverse engineering of network protocols in industrial control systems Qasim, Syed Ali

45 S p.
article
14 Prelim i - Editorial Board
45 S p.
article
15 Prelim iii - Contents List
45 S p.
article
16 Sharing datasets for digital forensic: A novel taxonomy and legal concerns Breitinger, Frank

45 S p.
article
17 Twenty third annual DFRWS conference
45 S p.
article
18 Using relational graphs for exploratory analysis of network traffic data Cermak, Milan

45 S p.
article
19 Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files Block, Frank

45 S p.
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands