


default search action
Digital Investigation, Volume 12
Volume 12, March 2015
- Eoghan Casey

:
Strengthening forensic science. A1-A2 - Jicang Lu, Fenlin Liu, Xiangyang Luo:

A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix. 1-14 - Reza Sharifnya, Mahdi Abadi

:
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic. 15-26 - Oluwasola Mary Adedayo

, Martin S. Olivier
:
Ideal log setting for database forensics reconstruction. 27-40 - Jan Peter van Zandwijk:

A mathematical approach to NAND flash-memory descrambling and decoding. 41-52 - Yogesh Khatri

:
Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8. 53-65 - Ahmet Karaküçük

, Ahmet Emir Dirik
:
Adaptive photo-response non-uniformity noise removal against image source attribution. 66-76 - Li Zhang

, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quanxin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. 77-87 - Kathryn C. Seigfried-Spellar

:
Erratum to "Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary findings" [Digit. Invest 11 (4), 252-260]. 88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














