nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Formal Concept Analysis approach to hierarchical description of malware threats
|
Ojeda-Hernández, Manuel |
|
|
50 |
C |
p. |
artikel |
2 |
Editorial Board
|
|
|
|
50 |
C |
p. |
artikel |
3 |
Forensic analysis of OpenAI's ChatGPT mobile application
|
Dragonas, Evangelos |
|
|
50 |
C |
p. |
artikel |
4 |
GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions
|
Casu, Mirko |
|
|
50 |
C |
p. |
artikel |
5 |
Key extraction-based lawful access to encrypted data: Taxonomy and survey
|
Lindenmeier, Christian |
|
|
50 |
C |
p. |
artikel |
6 |
Letter to Editor regarding article, “Grand theft API: A forensic analysis of vehicle cloud data”
|
Soni, Nishchal |
|
|
50 |
C |
p. |
artikel |
7 |
Money laundering through video games, a criminals' playground
|
Cooke, Dan |
|
|
50 |
C |
p. |
artikel |
8 |
Navigating the digital labyrinth: Forensics in the age of AI
|
|
|
|
50 |
C |
p. |
artikel |
9 |
Response from author
|
Ebbers, Simon |
|
|
50 |
C |
p. |
artikel |
10 |
RETRACTED: Leveraging metadata in social media forensic investigations: Unravelling digital clues- A survey study
|
Suryal, Akarshan |
|
|
50 |
C |
p. |
artikel |
11 |
Towards a practical usage for the Sleuth Kit supporting file system add-ons
|
Shin, Yeonghun |
|
|
50 |
C |
p. |
artikel |
12 |
Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs
|
Sharma, Pankaj |
|
|
50 |
C |
p. |
artikel |