nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response
|
Dunsin, Dipo |
|
|
48 |
C |
p. |
artikel |
2 |
Advanced forensic method to authenticate audio files from Tizen-based Samsung Galaxy Watches
|
Park, Nam In |
|
|
48 |
C |
p. |
artikel |
3 |
A forensic analysis of AnyDesk Remote Access application by using various forensic tools and techniques
|
Soni, Nishchal |
|
|
48 |
C |
p. |
artikel |
4 |
A novel method for real-time object-based copy-move tampering localization in videos using fine-tuned YOLO V8
|
Sandhya, |
|
|
48 |
C |
p. |
artikel |
5 |
Audio source recording device recognition based on representation learning of sequential Gaussian mean matrix
|
Zeng, Chunyan |
|
|
48 |
C |
p. |
artikel |
6 |
Case of study for in situ memory reading on damaged MultiMedia Card
|
Thomas-Brans, F. |
|
|
48 |
C |
p. |
artikel |
7 |
Digital forensics in healthcare: An analysis of data associated with a CPAP machine
|
Schmitt, Veronica |
|
|
48 |
C |
p. |
artikel |
8 |
Editorial Board
|
|
|
|
48 |
C |
p. |
artikel |
9 |
Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed
|
Grispos, George |
|
|
48 |
C |
p. |
artikel |
10 |
Sources of error in digital forensics
|
Horsman, Graeme |
|
|
48 |
C |
p. |
artikel |
11 |
Techniques and methods for obtaining access to data protected by linux-based encryption – A reference guide for practitioners
|
Findlay, Ben |
|
|
48 |
C |
p. |
artikel |
12 |
The effects of document's format, size, and storage media on memory forensics
|
Al-Sharif, Ziad A. |
|
|
48 |
C |
p. |
artikel |
13 |
The role of R&D in combating digital deception
|
|
|
|
48 |
C |
p. |
artikel |