default search action
Digital Investigation, Volume 24 Supplement
Volume 24 Supplement, March 2018
- Timothy Bollé, Eoghan Casey:
Using computed similarity of distinctive digital traces to evaluate non-obvious links and repetitions in cyber-investigations. S2-S9 - Jens-Petter Sandvik, André Årnes:
The reliability of clocks as digital evidence under low voltage conditions. S10-S17 - Ralph Palutke, Felix C. Freiling:
Styx: Countering robust memory acquisition. S18-S28 - Ethan Bayne, R. Ian Ferguson, Adam T. Sampson:
OpenForensics: A digital forensics GPU pattern matching approach for the 21st century. S29-S37 - Christopher Stelly, Vassil Roussev:
Nugget: A digital forensics language. S38-S47 - ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
MalDozer: Automatic framework for android malware detection using deep learning. S48-S59 - Gunnar Alendal, Geir Olav Dyrkolbotn, Stefan Axelsson:
Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode. S60-S67 - Jacques Boucher, Nhien-An Le-Khac:
Forensic framework to identify local vs synced artefacts. S68-S75 - Hans Henseler, Sophie van Loenhout:
Educating judges, prosecutors and lawyers in the use of digital forensic experts. S76-S82 - Felix C. Freiling, Leonhard Hösch:
Controlled experiments in digital evidence tampering. S83-S92 - Sungmi Park, Nikolay Akatyev, Yunsik Jang, Jisoo Hwang, Donghyun Kim, Woonseon Yu, Hyunwoo Shin, Changhee Han, Jonghyun Kim:
A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement. S93-S100 - Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kazuhiko Ohkubo:
Building stack traces from memory dump of Windows x64. S101-S110 - Thomas Göbel, Harald Baier:
Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding. S111-S120 - Sebastian Nemetz, Sven Schmitt, Felix C. Freiling:
A standardized corpus for SQLite database forensics. S121-S130 - Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi:
Data-driven approach for automatic telephony threat analysis and campaign detection. S131-S141
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.