


default search action
Digital Investigation, Volume 14 Supplement 1
Volume 14 Supplement 1, August 2015
- Elizabeth Schweinsberg:

Fifteenth Annual DFRWS Conference. S1-S2 - Amine Boukhtouta, Djedjiga Mouheb

, Mourad Debbabi
, Omar Alfandi
, Farkhund Iqbal
, May El Barachi
:
Graph-theoretic characterization of cyber-threat infrastructures. S3-S15 - Davide Balzarotti, Roberto Di Pietro

, Antonio Villani:
The impact of GPU-assisted malware on memory forensics: A case study. S16-S24 - Andrew Case

, Golden G. Richard III
:
Advancing Mac OS X rootkit detection. S25-S33 - Jonathan Grier, Golden G. Richard III

:
Rapid forensic imaging of large disks with sifting collectors. S34-S44 - Bradley L. Schatz:

Wirespeed: Extending the AFF4 forensic container format for scalable acquisition and live analysis. S45-S54 - Shams Zawoad, Ragib Hasan

, John Grimes:
LINCS: Towards building a trustworthy litigation hold enabled cloud storage system. S55-S67 - Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Taejoo Chang:

New acquisition method based on firmware update protocols for Android smartphones. S68-S76 - Daniel Walnycky, Ibrahim M. Baggili

, Andrew Marrington
, Jason Moore, Frank Breitinger
:
Network and device forensic analysis of Android social-messaging applications. S77-S84 - Adrien Larbanet, Jonas Lerebours, J. P. David:

Detecting very large sets of referenced files at 40/100 GbE, especially MP4 files. S85-S94 - Simson L. Garfinkel

, Michael McCarrin:
Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb. S95-S105 - James Wagner, Alexander Rasin, Jonathan Grier:

Database forensic analysis through internal structure carving. S106-S115 - Michael R. Schmid, Farkhund Iqbal

, Benjamin C. M. Fung:
E-mail authorship attribution using customized associative classification. S116-S126 - Frederik Armknecht

, Andreas Dewald:
Privacy-preserving email forensics. S127-S136 - Dianne Dietrich, Frank Adelstein:

Archival science, digital forensics, and new media art. S137-S145 - Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi

:
BinComp: A stratified approach to compiler provenance Attribution. S146-S155 - John Clemens

:
Automatic classification of object code using machine learning. S156-S162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














