


default search action
Digital Investigation, Volume 27
Volume 27, December 2018
- Eoghan Casey:

The knowledge management gap in digital investigations. 1-2 - Ben van Werkhoven, Pieter Hijma, Ceriel J. H. Jacobs

, Jason Maassen
, Zeno J. M. H. Geradts
, Henri E. Bal:
A Jungle Computing approach to common image source identification in large collections of images. 3-16 - Gareth Owenson, Sarah Cortes, Andrew Lewman:

The darknet's smaller than we thought: The life cycle of Tor Hidden Services. 17-22
- Angus M. Marshall

, Richard F. Paige:
Requirements in digital forensics method definition: Observations from a UK study. 23-29 - Yusheng Dai, Hui Li, Yekui Qian, Xidong Lu:

A malware classification method based on memory dump grayscale image. 30-37
- Ngoc-Tu Chau

, Souhwan Jung:
Dynamic analysis with Android container: Challenges and opportunities. 38-46 - Graeme Horsman, Helen Page, Peter Beveridge:

A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions. 47-56 - Wasim Ahmad Bhat

, Mohamad Ahtisham Wani
:
Forensic analysis of B-tree file system (Btrfs). 57-70

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














