nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An extensible and scalable system for hash lookup and approximate similarity search with similarity digest algorithms
|
Huici, Daniel |
|
|
53 |
S |
p. |
artikel |
2 |
ANOC: Automated NoSQL database carver
|
Nissan, Mahfuzul I. |
|
|
53 |
S |
p. |
artikel |
3 |
Bridging knowledge gaps in digital forensics using unsupervised explainable AI
|
Khalid, Zainab |
|
|
53 |
S |
p. |
artikel |
4 |
Bytewise approximate matching: Evaluating common scenarios for executable files
|
Jakobs, Carlo |
|
|
53 |
S |
p. |
artikel |
5 |
Detecting hidden kernel modules in memory snapshots
|
Nagy, Roland |
|
|
53 |
S |
p. |
artikel |
6 |
DFRWS APAC 2025 Seoul
|
|
|
|
53 |
S |
p. |
artikel |
7 |
DFRWS EU 2026 Sweden
|
|
|
|
53 |
S |
p. |
artikel |
8 |
Editorial Board
|
|
|
|
53 |
S |
p. |
artikel |
9 |
Enhancing DFIR in orchestration Environments: Real-time forensic framework with eBPF for windows
|
Jin, Philgeun |
|
|
53 |
S |
p. |
artikel |
10 |
Exploiting database storage for data exfiltration
|
Wagner, James |
|
|
53 |
S |
p. |
artikel |
11 |
Forensic recovery via chip-transplantation in samsung smartphones
|
Song, Sunbum |
|
|
53 |
S |
p. |
artikel |
12 |
If at first you don't succeed, trie, trie again: Correcting TLSH scalability claims for large-dataset malware forensics
|
Gonzalez, Jordi |
|
|
53 |
S |
p. |
artikel |
13 |
Improved Bitcoin simulation model and address heuristic method
|
Gong, Yanan |
|
|
53 |
S |
p. |
artikel |
14 |
Leveraging memory forensics to investigate and detect illegal 3D printing activities
|
Ali, Hala |
|
|
53 |
S |
p. |
artikel |
15 |
Memory Analysis of the Python Runtime Environment
|
Ali, Hala |
|
|
53 |
S |
p. |
artikel |
16 |
Out of Control: Igniting SCADA investigations with an HMI forensics framework and the ignition forensics artifact carving tool (IFACT)
|
Salmon, LaSean |
|
|
53 |
S |
p. |
artikel |
17 |
SoK: Timeline based event reconstruction for digital forensics: Terminology, methodology, and current challenges
|
Breitinger, Frank |
|
|
53 |
S |
p. |
artikel |
18 |
25th DFRWS USA 2025
|
|
|
|
53 |
S |
p. |
artikel |
19 |
Uncovering linux desktop espionage
|
Schmidt, Lukas |
|
|
53 |
S |
p. |
artikel |
20 |
Your forensic AI-assistant, SERENA: Systematic extraction and reconstruction for enhanced A2P message forensics
|
Kim, Jieon |
|
|
53 |
S |
p. |
artikel |