


default search action
Digital Investigation, Volume 11
Volume 11, Number 1, 2014
- Eoghan Casey

:
Growing societal impact of digital forensics and incident response. 1-2
- Jonathan Zdziarski:

Identifying back doors, attack points, and surveillance mechanisms in iOS devices. 3-19 - Howard Chivers:

Private browsing: A window of forensic opportunity. 20-29 - Corrado Federici:

Cloud Data Imager: A unified answer to remote acquisition of cloud storage areas. 30-42 - George E. Noel, Gilbert L. Peterson

:
Applicability of Latent Dirichlet Allocation to multi-disk search. 43-56 - Jicang Lu, Fenlin Liu, Xiangyang Luo:

Selection of image features for steganalysis based on the Fisher criterion. 57-66 - Pritesh Pathak, S. Selvakumar

:
Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation. 67-77
Volume 11, Number Supplement 1, May 2014
- Frank Breitinger

, Harald Baier, Douglas White:
On the database lookup problem of approximate matching. S1-S9 - Frank Breitinger

, Vassil Roussev:
Automated evaluation of approximate matching algorithms on real data. S10-S17 - Petter Christian Bjelland, Katrin Franke, André Årnes:

Practical use of Approximate Hash Based Matching in digital investigations. S18-S26 - Christian Winter, Martin Steinebach, York Yannikos

:
Fast indexing strategies for robust image hashes. S27-S35 - Nick Pringle, Mikhaila Burgess

:
Information assurance in a distributed forensic cluster. S36-S44 - Timothy Vidas, Brian Kaplan, Matthew Geiger:

OpenLV: Empowering investigators and first-responders in the digital forensics process. S45-S53 - Ruud B. van Baar, Harm M. A. van Beek

, E. J. van Eijk:
Digital Forensics as a Service: A game changer. S54-S62 - Alexander Nilsson

, Marcus Andersson, Stefan Axelsson:
Key-hiding on the ARM platform. S63-S67 - Thomas Gloe, André Fischer, Matthias Kirchner:

Forensic analysis of video file formats. S68-S76 - Jason Farina, Mark Scanlon

, M. Tahar Kechadi
:
BitTorrent Sync: First Impressions and Digital Forensic Implications. S77-S86 - Asif Iqbal, Hanan Al Obaidli, Andrew Marrington

, Andy Jones:
Windows Surface RT tablet forensics. S87-S93 - Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi

:
OBA2: An Onion approach to Binary code Authorship Attribution. S94-S103 - Wicher Minnaard:

Out of sight, but not out of mind: Traces of nearby devices' wireless transmissions in volatile memory. S104-S111 - Johannes Stüttgen, Michael Cohen:

Robust Linux memory acquisition with minimal target impact. S112-S119
Volume 11, Number 2, 2014
- Eoghan Casey

:
What constitutes a proper education? 79-80
- Frank Breitinger

, Georgios Stivaktakis, Vassil Roussev:
Evaluating detection error trade-offs for bytewise approximate matching algorithms. 81-89 - Benjamin Aziz

:
Modelling and refinement of forensic data acquisition specifications. 90-101 - Chan-Youn Lee, Sangjin Lee:

Structure and application of IconCache.db files for digital forensics. 102-110 - Fei Peng

, Die-lan Zhou:
Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU. 111-119 - Cheng-Shian Lin, Jyh-Jong Tsay:

A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. 120-140
Volume 11, Number Supplement 2, August 2014
- Golden G. Richard III

, Andrew Case
:
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux. S3-S12 - Vassil Roussev, Irfan Ahmed

, Thomas Sires:
Image-based kernel fingerprinting. S13-S21 - Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington

, Farkhund Iqbal
, Ibrahim M. Baggili
:
Testing the forensic soundness of forensic examination environments on bootable media. S22-S29 - Eoghan Casey

, Rikkert Zoun:
Design tradeoffs for developing fragmented video carving tools. S30-S39 - Tu-Thach Quach:

Extracting hidden messages in steganographic images. S40-S45 - Alex J. Nelson

, Erik Q. Steggall, Darrell D. E. Long:
Cooperative mode: Comparative storage metadata verification applied to the Xbox 360. S46-S56 - Jason Moore, Ibrahim M. Baggili

, Andrew Marrington
, Armindo Rodrigues
:
Preliminary forensic analysis of the Xbox One. S57-S65 - Vijay Kumar, George C. Oikonomou

, Theo Tryfonas
, Dan Page, Iain W. Phillips
:
Digital investigations for IPv6-based Wireless Sensor Networks. S66-S75 - Anthony Lang, Masooda N. Bashir

, Roy H. Campbell, Lizanne DeStefano:
Developing a new digital forensics curriculum. S76-S84 - Florian Westphal

, Stefan Axelsson, Christian Neuhaus, Andreas Polze:
VMI-PL: A monitoring language for virtual platforms using virtual machine introspection. S85-S94 - Yoan Chabot

, Aurélie Bertaux, Christophe Nicolle, M. Tahar Kechadi
:
A complete formalized knowledge representation model for advanced digital forensics timeline analysis. S95-S105 - Kurt Oestreicher:

A forensically robust method for acquisition of iCloud data. S106-S113 - Elias Bou-Harb

, Nour-Eddine Lakhdari, Hamad Binsalleeh
, Mourad Debbabi
:
Multidimensional investigation of source port 0 probing. S114-S123 - Nicole Lang Beebe

, Lishu Liu:
Ranking algorithms for digital forensic string search hits. S124-S132
Volume 11, Number 3, September 2014
- Bradley L. Schatz, Pavel Gladyshev

, Ronald M. van der Knijff:
The internet of things: Interconnected digital dust. 141-142 - Thomas R. Souvignet

, Julien Hatin, Fabrice Maqua
, D. Tesniere, Pierre Léger, Romain Hormière
:
Payment card forensic analysis: From concepts to desktop and mobile analysis tools. 143-153 - Thomas R. Souvignet

, T. Prüfer, J. Frinken, R. Kricsanowits:
Case study: From embedded system analysis to embedded system based investigator tools. 154-159 - Ronald M. van der Knijff:

Control systems/SCADA forensics, what's the difference? 160-174 - Iain Sutherland

, Huw Read
, Konstantinos Xynos
:
Forensic analysis of smart TV: A current issue and call to arms. 175-178 - Lee Tobin, Ahmed F. Shosha, Pavel Gladyshev

:
Reverse engineering a CCTV system, a case study. 179-186 - Jungheum Park

, Sangjin Lee:
Data fragment forensics for embedded DVR systems. 187-200 - Cosimo Anglano:

Forensic analysis of WhatsApp Messenger on Android smartphones. 201-213 - Bradley L. Schatz

:
A visual approach to interpreting NAND flash memory. 214-223 - Wicher Minnaard:

The Linux FAT32 allocator and file creation order reconstruction. 224-233 - Marnix Kaart, Susan Laraghy

:
Android forensics: Interpretation of timestamps. 234-248
Volume 11, Number 4, December 2014
- Bruce J. Nikkel:

Fostering incident response and digital forensics research. 249-251 - Kathryn C. Seigfried-Spellar

:
Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings. 252-260 - Amy Phelps

, Allan Watt:
I shop online - recreationally! Internet anonymity and Silk Road enabling drug use in Australia. 261-272 - Darren Quick, Kim-Kwang Raymond Choo

:
Impacts of increasing volume of digital forensic data: A survey and future research challenges. 273-294 - Ben Martini, Kim-Kwang Raymond Choo

:
Distributed filesystem forensics: XtreemFS as a case study. 295-313 - Nicole Lang Beebe

, Lishu Liu:
Clustering digital forensic string search output. 314-322 - Boojoong Kang, Kyoung-Soo Han, Byeongho Kang, Eul Gyu Im:

Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering. 323-335 - Peter Frühwirt, Peter Kieseberg

, Katharina Krombholz, Edgar R. Weippl:
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. 336-348 - Tarique Anwar

, Muhammad Abulaish
:
A social graph based text mining framework for chat log investigation. 349-362 - Frank Breitinger

, Georgios Stivaktakis, Vassil Roussev:
Erratum to "Evaluating detection error trade-offs for bytewise approximate matching algorithms" [Digit Invest 11 (2) 81-89]. 363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














