default search action
Digital Investigation, Volume 27
Volume 27, December 2018
- Eoghan Casey:
The knowledge management gap in digital investigations. 1-2 - Ben van Werkhoven, Pieter Hijma, Ceriel J. H. Jacobs, Jason Maassen, Zeno J. M. H. Geradts, Henri E. Bal:
A Jungle Computing approach to common image source identification in large collections of images. 3-16 - Gareth Owenson, Sarah Cortes, Andrew Lewman:
The darknet's smaller than we thought: The life cycle of Tor Hidden Services. 17-22
- Angus M. Marshall, Richard F. Paige:
Requirements in digital forensics method definition: Observations from a UK study. 23-29 - Yusheng Dai, Hui Li, Yekui Qian, Xidong Lu:
A malware classification method based on memory dump grayscale image. 30-37
- Ngoc-Tu Chau, Souhwan Jung:
Dynamic analysis with Android container: Challenges and opportunities. 38-46 - Graeme Horsman, Helen Page, Peter Beveridge:
A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions. 47-56 - Wasim Ahmad Bhat, Mohamad Ahtisham Wani:
Forensic analysis of B-tree file system (Btrfs). 57-70
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.