


default search action
Journal of Digital Forensics, Security and Law, Volume 11
Volume 11, Number 1, 2016
- William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos

, Matt Campbell:
In-The-Wild Residual Data Research and Privacy. 7-36 - Yi-Ching Liao, Hanno Langweg:

Evidential Reasoning for Forensic Readiness. 37-52 - Eric Olson, Narasimha K. Shashidhar:

Low Budget Forensic Drive Imaging Using ARM Based Single Board Computers. 53-76 - Teri A. Flory:

Digital Forensics In Law Enforcement: A Needs Based Analysis of Indiana Agencies. 77-98
Volume 11, Number 2, 2016
- Samer Al-khateeb

, Kevin J. Conlan, Nitin Agarwal, Ibrahim M. Baggili, Frank Breitinger
:
Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. 7-20 - Monika Singh, Donghoon Chang, Somitra Kumar Sanadhya:

Security Analysis of mvHash-B Similarity Hashing. 21-34 - Murat Gunestas

, Zeki Bilgin:
Log Analysis Using Temporal Logic and Reconstruction Approach: Web Server Case. 35-58 - Vikram S. Harichandran

, Frank Breitinger
, Ibrahim M. Baggili:
Bytewise Approximate Matching: The Good, The Bad, and The Unknown. 59-78 - Petr Matousek, Radek Hranicky

, Martin Holkovic, Ondrej Rysavý:
On Efficiency of Distributed Password Recovery. 79-96 - Doowon Jeong, Frank Breitinger

, Hari Kang, Sangjin Lee:
Towards Syntactic Approximate Matching - A Pre-Processing Experiment. 97-110 - Thibault Julliand, Hugues Talbot, Vincent Nozick:

Countering Noise-based Splicing Detection Using Noise Density Transfer. 111-122 - Kibin Lee, Joshua I. James, Tekachew Gobena Ejeta, Hyoung Joong Kim:

Electronic Voting Service Using Block-Chain. 123-136 - Hussam Jasim Mohammed

, Nathan Luke Clarke, Fudong Li:
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data. 137-152 - Neil C. Rowe, Riqui Schwamm, Michael McCarrin, Ralucca Gera:

Making Sense of Email Addresses on Drives. 153-174 - Marcus Thompson, Raymond Hansen:

Verification of Recovered Digital Evidence on the Amazon Kindle. 175-192
Volume 11, Number 3, 2016
- Lauren A. Zezulka, Kathryn C. Seigfried-Spellar:

Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem. 7-26 - Hyunin Baek, Michael Losavio, George Higgins:

The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity. 27-42 - Brian H. Spitzberg, Jean Mark Gawron:

A Research Agenda for Online Linguistic Surveillance of Threatening Messages. 43-78 - Thomas Lonardo, Tricia Martland, Doug White:

A Legal Examination of Revenge Pornography and Cyber-Harassment. 79-106
Volume 11, Number 4, 2016
- Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

:
Bloom Filters Optimized Wu-Manber for Intrusion Detection. 5-22 - Thomas Anthony Martin

, Andy Jones, Mohammed Alzaabi:
The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE. 23-36 - Bhupendra Singh, Upasna Singh:

Leveraging the Windows Amcache.hve File in Forensic Investigations. 37-54 - Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas

, Bilal Gonen, Ramazan Aygun:
A Survey of Social Network Forensics. 55-128 - Gary C. Kessler:

The Impact of MD5 File Hash Collisions On Digital Forensic Imaging. 129-138 - Gary C. Kessler:

The Impact of SHA-1 File Hash Collisions On Digital Forensic Imaging: A Follow-up Experiment. 139-148 - Saad Fehis, Omar Nouali, Mohand Tahar Kechadi

:
A New Distributed Chinese Wall Security Policy Model. 149-168

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














