


default search action
Journal of Digital Forensics, Security and Law, Volume 12
Volume 12, Number 1, 2017
- Johannes Stadlinger, Andreas Dewald:

A Forensic Email Analysis Tool Using Dynamic Visualization. 7-14 - Jason Moore, Ibrahim M. Baggili, Frank Breitinger

:
Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. 15-30 - Kyoung Park, Jung-Min Park, Eun-Jin Kim, Chang Cheon, Joshua James:

Anti-Forensic Trace Detection in Digital Forensic Triage Investigations. 31-40 - James E. Fowler:

Compression of Virtual-Machine Memory in Dynamic Malware Analysis. 41-46 - Patrick Tobin, Nhien-An Le-Khac

, M. Tahar Kechadi
:
Forensic Analysis of Virtual Hard Drives. 47-58
Volume 12, Number 2, 2017
- Travis Atkison, Nathan Wallace:

A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection. 5-18 - Konstantinos Karampidis, Giorgos Papadourakis:

File Type Identification - Computational Intelligence for Digital Forensics. 19-32 - John B. Minor:

Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology. 33-52 - Daniel Schatz, Rabih Bashroush, Julie A. Wall:

Towards a More Representative Definition of Cyber Security. 53-74 - Diane Barrett:

Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions. 75-96 - Matthew Horner, Thomas Hyslip:

SQL Injection: The Longest Running Sequel in Programming History. 97-108 - M. A. K. Sudozai, Nisar Habib, Shahzad Saleem, A. A. Khan:

Signatures of Viber Security Traffic. 109-120 - Makhdoom Shah, Shahzad Saleem, Roha Zulqarnain:

Protecting Digital Evidence Integrity and Preserving Chain of Custody. 121-130
Volume 12, Number 3, 2017
- Sungmi Park, Yunsik Jang, Joshua James:

Possession of Child Exploitation Material in Computer Temporary Internet Cache. 7-22 - Nikolay Akatyev, Joshua James:

Legislative Requirements for Cyber Peacekeeping. 23-38 - Isabel de la Torre Díez

, Begoña García Zapirain
, Miguel López Coronado:
Analysis of Security in Big Data Related to Healthcare. 39-46 - Deborah W. Keeling, Michael Losavio:

Public Security & Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security. 47-60 - Alexander Syatchikhin, Valery Golubtsov, Natalia Syropiatova:

Contractual Responsibility for the Disclosure of Bank Secrets. 61-66 - Michael Losavio, Adel Elmaghraby

:
Security and the Transnational Information Polity. 67-76 - Olga Kuznetsova

, Natalia Pavlovna Bondarenko:
Private Life Safety Provision in Digital Age. 77-86 - Pavel Pastukhov, Svetlana Polyakova, Evelina Frolovich:

The Use of Information Technologies to Combat Counterfeit Alcohol Products and Ensure the Right to Life in Russia. 87-94 - Galina Borisevich:

Providing for the Safety of the Participants of the Criminal Court Proceedings - The Subject of Cconcern of Russian Legislator, Government, Scientists and Practicians. 95-102 - Svetlana Afanasieva, Irina Kilina

:
Use of House Arrest In The Context of the Respecting the Constitutional Rights of an Individual in Russia. 103-112
Volume 12, Number 4, 2017
- Chetan K. R, Shivananda Nirmala:

Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image. 5-28 - Joan Through, Gary Cantrell:

Varying Instructional Approaches to Physical Extraction of Mobile Device Memory. 29-42 - Nickson M. Karie, Simon M. Karume

:
Digital Forensic Readiness in Organizations: Issues and Challenges. 43-54 - Patryk Szewczyk, Rose Macdonald:

Broadband Router Security: History, Challenges and Future Implications. 55-74 - Ryne Teague, Michael Black:

Evidence Verification Complications with Solid-State Drives. 75-86 - Sengül Dogan:

A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs. 87-100

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














