


default search action
Journal of Digital Forensics, Security and Law, Volume 9
Volume 9, Number 1, 2014
- Chad M. S. Steel:

Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints. 7-18 - Michael Raymond Bartolacci, Larry J. LeBlanc, Ashley L. Podhradsky

:
Personal Denial Of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime. 19-36 - Wei Gao, Thomas H. Morris:

On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems. 37-56 - Marcus K. Rogers, Kathryn C. Seigfried-Spellar:

Using Internet Artifacts to Profile a Child Pornography Suspect. 57-66 - Rasib Khan, Mainul Mizan, Ragib Hasan

, Alan P. Sprague:
Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering. 67-82 - Stephen Larson:

Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. 83-85
Volume 9, Number 2, 2014
- Ibrahim M. Baggili:

From the Editor-in-Chief. 7-8 - Libor Polcak, Radek Hranicky

, Tomás Martínek:
On Identities in Modern Networks. 9-22 - Frank Breitinger

, Ibrahim M. Baggili:
File Detection On Network Traffic Using Approximate Matching. 23-36 - Amit Kleinmann, Avishai Wool:

Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic. 37-50 - Kam-Pui Chow, Frank Y. W. Law, Y. H. Mai:

Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case. 51-58 - Joshua I. James:

Multi-Stakeholder Case Prioritization in Digital Investigations. 59-72 - Vinod Polpaya Bhattathiripad:

Forensics of Software Copyright Infringement Crimes: The Modern POSAR Test Juxtaposed With the Dated AFC Test. 73-84 - Mark Scanlon, Jason Farina, Nhien-An Le-Khac

, M. Tahar Kechadi
:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync. 85-100 - Petr Matousek, Ondrej Rysavý, Martin Kmet:

Fast RTP Detection and Codecs Classification in Internet Traffic. 101-112 - Samer Al-khateeb

, Nitin Agarwal:
Developing a Conceptual Framwork for Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs. 113-128 - Umit Karabiyik, Sudhir Aggarwal:

Audit: Automated Disk Investigation Toolkit. 129-144 - Shruti Gupta, Marcus K. Rogers:

Exploring Forensic Implications of the Fusion Drive. 145-154 - Frank Breitinger

, Christian Rathgeb, Harald Baier:
An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach. 155-166 - Erin Smith Crabb:

"Time for Some Traffic Problems": Enhancing E-Discovery and Big Data Processing Tools with Linguistic Methods for Deception Detection. 167-180 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:

Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction. 181-196 - Michael Losavio, Deborah W. Keeling:

Evidentiary Power and Propriety of Digital Identifiers and the Impact on Privacy Rights in the United States. 197-204 - Riqui Schwamm, Neil C. Rowe:

Effects of the Factory Reset on Mobile Devices. 205-220 - Maxwell Anobah, Shahzad Saleem

, Oliver Popov:
Testing Framework for Mobile Device Forensics Tools. 221-234
Volume 9, Number 3, 2014
- Ibrahim M. Baggili:

From the Editor-in-Chief. 5 - Jennifer Moore, Jonathan Langton, Joseph Pochron:

The Cost of Privacy: Riley v. California's Impact on Cell Phone Searches. 7-18 - Shahzad Saleem, Ibrahim M. Baggili, Oliver Popov:

Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices. 19-50 - Gary C. Kessler, Gregory H. Carlton:

An Analysis of Forensic Imaging in the Absence of Write-Blockers. 51-58 - Linda K. Lau:

Book Review: The X-Ways Forensics Practitioner's Guide. 59-61
Volume 9, Number 4, 2014
- Ibrahim M. Baggili:

From the Editor-in-Chief. 5-6 - Sameera Abdulrahman Almulla, Youssef Iraqi, Andrew Jones:

A State-of-the-Art Review of Cloud Forensics. 7-28 - Jasmine Eggestein, Kenneth J. Knapp:

Fighting Child Pornography: A Review of Legal and Technological Developments. 29-48 - Chad M. S. Steel:

Technical Soddi Defenses: The Trojan Horse Defense Revisited. 49-62 - Pedro Luís Próspero Sanchez:

Book Review: Judiciary-Friendly Forensics of Software Copyright Infringement (Vinod Polpaya Bhattathiripad). 63-64

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














