


default search action
Digital Investigation, Volume 24 Supplement
Volume 24 Supplement, March 2018
- Timothy Bollé, Eoghan Casey

:
Using computed similarity of distinctive digital traces to evaluate non-obvious links and repetitions in cyber-investigations. S2-S9 - Jens-Petter Sandvik

, André Årnes:
The reliability of clocks as digital evidence under low voltage conditions. S10-S17 - Ralph Palutke, Felix C. Freiling:

Styx: Countering robust memory acquisition. S18-S28 - Ethan Bayne

, R. Ian Ferguson
, Adam T. Sampson:
OpenForensics: A digital forensics GPU pattern matching approach for the 21st century. S29-S37 - Christopher Stelly, Vassil Roussev:

Nugget: A digital forensics language. S38-S47 - ElMouatez Billah Karbab, Mourad Debbabi

, Abdelouahid Derhab, Djedjiga Mouheb
:
MalDozer: Automatic framework for android malware detection using deep learning. S48-S59 - Gunnar Alendal, Geir Olav Dyrkolbotn, Stefan Axelsson:

Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode. S60-S67 - Jacques Boucher, Nhien-An Le-Khac

:
Forensic framework to identify local vs synced artefacts. S68-S75 - Hans Henseler, Sophie van Loenhout:

Educating judges, prosecutors and lawyers in the use of digital forensic experts. S76-S82 - Felix C. Freiling, Leonhard Hösch:

Controlled experiments in digital evidence tampering. S83-S92 - Sungmi Park, Nikolay Akatyev, Yunsik Jang, Jisoo Hwang, Donghyun Kim, Woonseon Yu, Hyunwoo Shin, Changhee Han, Jonghyun Kim:

A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement. S93-S100 - Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kazuhiko Ohkubo:

Building stack traces from memory dump of Windows x64. S101-S110 - Thomas Göbel, Harald Baier:

Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding. S111-S120 - Sebastian Nemetz, Sven Schmitt, Felix C. Freiling:

A standardized corpus for SQLite database forensics. S121-S130 - Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi

:
Data-driven approach for automatic telephony threat analysis and campaign detection. S131-S141

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














