


default search action
Digital Investigation, Volume 29
Volume 29, June 2019
- Hudan Studiawan

, Ferdous Sohel
, Christian Payne:
A survey on forensic investigation of operating system logs. 1-20
- Eoghan Casey:

Maturation of digital forensics. 1-
- Doowon Jeong, Sangjin Lee:

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts. 21-27 - Xiaolu Zhang, Justin Grannis, Ibrahim M. Baggili

, Nicole Lang Beebe:
Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system. 28-42
- Asanka P. Sayakkara

, Nhien-An Le-Khac
, Mark Scanlon
:
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. 43-54
- Jesús Gregorio, Bernardo Alarcos

, Alfredo Gardel Vicente:
Forensic analysis of Nucleus RTOS on MTK smartwatches. 55-66
- Pamela Johnston

, Eyad Elyan
:
A review of digital video tampering: From simple editing to full synthesis. 67-81
- Angus M. Marshall

, Peter Miller:
CaseNote: Mobile phone call data obfuscation & techniques for call correlation. 82-90
- Emmanuel Kiegaing Kouokam, Ahmet Emir Dirik

:
PRNU-based source device attribution for YouTube videos. 91-100
- Nina Sunde

, Itiel E. Dror:
Cognitive and human factors in digital forensics: Problems, challenges, and the way forward. 101-108
- Peter McLaren, Gordon Russell

, William J. Buchanan
, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. 109-117
- Matt Muir, Petra Leimich

, William J. Buchanan
:
A Forensic Audit of the Tor Browser Bundle. 118-128
- Chao Jin

, Rangding Wang, Diqun Yan
:
Source smartphone identification by exploiting encoding characteristics of recorded speech. 129-146 - Humaira Arshad, Aman Jantan

, Gan Keng Hoon
, Anila Sahar Butt:
A multilayered semantic framework for integrated forensic acquisition on social media. 147-158
- Marco Nicoletti

, Massimo Bernaschi:
Forensic analysis of Microsoft Skype for Business. 159-179
- Rupali M. Chopade

, Vinod Keshaorao Pachghare:
Ten years of critical review on database forensics research. 180-197
- Thibaut Heckmann

, James P. McEvoy
, Konstantinos Markantonakis
, Raja Naeem Akram
, David Naccache:
Removing epoxy underfill between neighbouring components using acid for component chip-off. 198-209 - Thibaut Heckmann

, Thomas R. Souvignet
, David Naccache:
Decrease of energy deposited during laser decapsulation attacks by dyeing and pigmenting the ECA: Application to the forensic micro-repair of wire bonding. 210-218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














