no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A study on cloud data access through browser credential migration in Windows environment
|
Hur, Uk |
|
|
45 |
S |
p. |
article |
2 |
Combining AI and AM – Improving approximate matching through transformer networks
|
Uhlig, Frieder |
|
|
45 |
S |
p. |
article |
3 |
cRGB_Mem: At the intersection of memory forensics and machine learning
|
Ali-Gombe, Aisha |
|
|
45 |
S |
p. |
article |
4 |
Dashcam forensic investigation guidelines
|
Lallie, Harjinder Singh |
|
|
45 |
S |
p. |
article |
5 |
Database memory forensics: Identifying cache patterns for log verification
|
Wagner, James |
|
|
45 |
S |
p. |
article |
6 |
DFRWS 2024 EU Zaragoza
|
|
|
|
45 |
S |
p. |
article |
7 |
DFRWS 2024 USA Baton Rouge
|
|
|
|
45 |
S |
p. |
article |
8 |
Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application
|
Pace, Lauren R. |
|
|
45 |
S |
p. |
article |
9 |
Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project
|
Grajeda, Cinthya |
|
|
45 |
S |
p. |
article |
10 |
Factorizing 2FA: Forensic analysis of two-factor authentication applications
|
Berrios, Jessica |
|
|
45 |
S |
p. |
article |
11 |
Improving trace synthesis by utilizing computer vision for user action emulation
|
Schmidt, Lukas |
|
|
45 |
S |
p. |
article |
12 |
IoT forensics: Analysis of a HIKVISION's mobile app
|
Dragonas, Evangelos |
|
|
45 |
S |
p. |
article |
13 |
PREE: Heuristic builder for reverse engineering of network protocols in industrial control systems
|
Qasim, Syed Ali |
|
|
45 |
S |
p. |
article |
14 |
Prelim i - Editorial Board
|
|
|
|
45 |
S |
p. |
article |
15 |
Prelim iii - Contents List
|
|
|
|
45 |
S |
p. |
article |
16 |
Sharing datasets for digital forensic: A novel taxonomy and legal concerns
|
Breitinger, Frank |
|
|
45 |
S |
p. |
article |
17 |
Twenty third annual DFRWS conference
|
|
|
|
45 |
S |
p. |
article |
18 |
Using relational graphs for exploratory analysis of network traffic data
|
Cermak, Milan |
|
|
45 |
S |
p. |
article |
19 |
Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files
|
Block, Frank |
|
|
45 |
S |
p. |
article |