


default search action
Journal of Digital Forensics, Security and Law, Volume 7
Volume 7, Number 1, 2012
- Fred Cohen:

Column: The Physics of Digital Information-Part 2. 7-14 - Harjinder Singh Lallie, Parmjit Bains:

An Overview of the Jumplist Configuration File in Windows 7. 15-28 - Richard Boddington, Jeremy Ardley, Grant Austin Boxall:

Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery Detection and Validation. 29-54 - Larry Melling, Robert Zeidman:

Comparing Android Applications to Find Copying. 55-70 - Harjinder Singh Lallie:

Challenges in applying the ACPO principles in cloud forensic investigations. 71-86 - Diane Barrett:

Book Review: The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detections. 87-92 - Sellam Ismail:

Technology Corner: Dating of Electronic Hardware for Prior Art Investigations. 93-100
Volume 7, Number 2, 2012
- Kevin D. Fairbanks, Simson L. Garfinkel

:
Column: Factors Affecting Data Decay. 7-10 - Neil Fowler Wright:

DNS in Computer Forensics. 11-42 - Jonathan Patterson, Christopher James Hargreaves:

Automated Identification and Reconstruction of YouTube Video Access. 43-60 - Jason Nichols, David P. Biros, Mark Weiser:

Toward Alignment between Communities of Practice and Knowledge-Based Decision Support. 61-74 - Aaron Alva, Barbara Endicott-Popovsky:

Digital Evidence Education in Schools of Law. 75-88 - Fred Cohen:

Identifying and Attributing Similar Traces with Greatest Common Factor Analysis. 89-112 - Gregory H. Carlton, Gary C. Kessler:

Identifying trace evidence in data wiping application software. 113-142 - Nate Keith:

Book Review: System Forensics, Investigation, and Response. 143-148 - Nick V. Flor:

Technology Corner: Automated Data Extraction Using Facebook. 149-164
Volume 7, Number 3, 2012
- Fred Cohen:

Column: The Science of Digital Forensics: Analysis of Digital Traces. 5-12 - Manghui Tu, Dianxiang Xu, Cristian Balan, Kyle Cronin:

On the Development of Digital Forensics Curriculum. 13-32 - John Moran, Douglas Orr:

Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9. 33-54 - David Irwin, Arek Dadej

, Jill Slay
:
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech. 55-82 - Thomas Lonardo, Doug White, Alan Rea:

To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. 83-110 - Milton H. Luoma:

Book Review: Dispute Resolution and e-Discovery. 111-114
Volume 7, Number 4, 2012
- Fred Cohen:

Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media. 7-20 - Robert Vose Simpson:

Confronting Potential Injustice with Preemptive Suppression. 21-50 - Patryk Szewczyk:

An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users. 51-72 - Manghui Tu:

Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System. 73-98 - Gary Cantrell, David A. Dampier:

Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model. 99-116 - John C. Ebert:

Book Review: Mastering Windows Network Forensics and Investigation, 2/e. 117-124 - Nick V. Flor:

Technology Corner: A Regular Expression Training App. 125-132

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














