Search dblp for Publications

export results for "toc:db/journals/jdfsl/jdfsl7.bht:"

 download as .bib file

@article{DBLP:journals/jdfsl/AlvaE12,
  author       = {Aaron Alva and
                  Barbara Endicott{-}Popovsky},
  title        = {Digital Evidence Education in Schools of Law},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {75--88},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1120},
  doi          = {10.15394/JDFSL.2012.1120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AlvaE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Barrett12,
  author       = {Diane Barrett},
  title        = {Book Review: The Software {IP} Detective's Handbook: Measurement,
                  Comparison, and Infringement Detections},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {87--92},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1114},
  doi          = {10.15394/JDFSL.2012.1114},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Barrett12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BoddingtonAB12,
  author       = {Richard Boddington and
                  Jeremy Ardley and
                  Grant Austin Boxall},
  title        = {Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery
                  Detection and Validation},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {29--54},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1111},
  doi          = {10.15394/JDFSL.2012.1111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BoddingtonAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/CantrellD12,
  author       = {Gary Cantrell and
                  David A. Dampier},
  title        = {Implementing The Automated Phases Of The Partially-Automated Digital
                  Triage Process Model},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {99--116},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1135},
  doi          = {10.15394/JDFSL.2012.1135},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/CantrellD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/CarltonK12,
  author       = {Gregory H. Carlton and
                  Gary C. Kessler},
  title        = {Identifying trace evidence in data wiping application software},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {113--142},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1122},
  doi          = {10.15394/JDFSL.2012.1122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/CarltonK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12,
  author       = {Fred Cohen},
  title        = {Column: The Physics of Digital Information-Part 2},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {7--14},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1109},
  doi          = {10.15394/JDFSL.2012.1109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12a,
  author       = {Fred Cohen},
  title        = {Identifying and Attributing Similar Traces with Greatest Common Factor
                  Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {89--112},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1121},
  doi          = {10.15394/JDFSL.2012.1121},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12b,
  author       = {Fred Cohen},
  title        = {Column: The Science of Digital Forensics: Analysis of Digital Traces},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {5--12},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1125},
  doi          = {10.15394/JDFSL.2012.1125},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12c,
  author       = {Fred Cohen},
  title        = {Column: The Science of Digital Forensics: Recovery of Data from Overwritten
                  Areas of Magnetic Media},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {7--20},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1131},
  doi          = {10.15394/JDFSL.2012.1131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Ebert12,
  author       = {John C. Ebert},
  title        = {Book Review: Mastering Windows Network Forensics and Investigation,
                  2/e},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {117--124},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1136},
  doi          = {10.15394/JDFSL.2012.1136},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Ebert12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FairbanksG12,
  author       = {Kevin D. Fairbanks and
                  Simson L. Garfinkel},
  title        = {Column: Factors Affecting Data Decay},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {7--10},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1116},
  doi          = {10.15394/JDFSL.2012.1116},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FairbanksG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Flor12,
  author       = {Nick V. Flor},
  title        = {Technology Corner: Automated Data Extraction Using Facebook},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {149--164},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1124},
  doi          = {10.15394/JDFSL.2012.1124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Flor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Flor12a,
  author       = {Nick V. Flor},
  title        = {Technology Corner: {A} Regular Expression Training App},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {125--132},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1137},
  doi          = {10.15394/JDFSL.2012.1137},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Flor12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/IrwinDS12,
  author       = {David Irwin and
                  Arek Dadej and
                  Jill Slay},
  title        = {Extraction Of Electronic Evidence From VoIP: Identification {\&}
                  Analysis Of Digital Speech},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {55--82},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1128},
  doi          = {10.15394/JDFSL.2012.1128},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/IrwinDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Ismail12,
  author       = {Sellam Ismail},
  title        = {Technology Corner: Dating of Electronic Hardware for Prior Art Investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {93--100},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1115},
  doi          = {10.15394/JDFSL.2012.1115},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Ismail12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Keith12,
  author       = {Nate Keith},
  title        = {Book Review: System Forensics, Investigation, and Response},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {143--148},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1123},
  doi          = {10.15394/JDFSL.2012.1123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Keith12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Lallie12,
  author       = {Harjinder Singh Lallie},
  title        = {Challenges in applying the {ACPO} principles in cloud forensic investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {71--86},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1113},
  doi          = {10.15394/JDFSL.2012.1113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Lallie12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LallieB12,
  author       = {Harjinder Singh Lallie and
                  Parmjit Bains},
  title        = {An Overview of the Jumplist Configuration File in Windows 7},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {15--28},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1110},
  doi          = {10.15394/JDFSL.2012.1110},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LallieB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoW012,
  author       = {Thomas Lonardo and
                  Doug White and
                  Alan Rea},
  title        = {To License or Not to License Updated: An Examination of State Statutes
                  Regarding Private Investigators and Digital Examiners},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {83--110},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1129},
  doi          = {10.15394/JDFSL.2012.1129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoW012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Luoma12,
  author       = {Milton H. Luoma},
  title        = {Book Review: Dispute Resolution and e-Discovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {111--114},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1130},
  doi          = {10.15394/JDFSL.2012.1130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Luoma12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MellingZ12,
  author       = {Larry Melling and
                  Robert Zeidman},
  title        = {Comparing Android Applications to Find Copying},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {55--70},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1112},
  doi          = {10.15394/JDFSL.2012.1112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MellingZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MoranO12,
  author       = {John Moran and
                  Douglas Orr},
  title        = {Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {33--54},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1127},
  doi          = {10.15394/JDFSL.2012.1127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MoranO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/NicholsBW12,
  author       = {Jason Nichols and
                  David P. Biros and
                  Mark Weiser},
  title        = {Toward Alignment between Communities of Practice and Knowledge-Based
                  Decision Support},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {61--74},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1119},
  doi          = {10.15394/JDFSL.2012.1119},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/NicholsBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PattersonH12,
  author       = {Jonathan Patterson and
                  Christopher James Hargreaves},
  title        = {Automated Identification and Reconstruction of YouTube Video Access},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {43--60},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1118},
  doi          = {10.15394/JDFSL.2012.1118},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PattersonH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Simpson12,
  author       = {Robert Vose Simpson},
  title        = {Confronting Potential Injustice with Preemptive Suppression},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {21--50},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1132},
  doi          = {10.15394/JDFSL.2012.1132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Simpson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Szewczyk12,
  author       = {Patryk Szewczyk},
  title        = {An Australian Perspective On The Challenges For Computer And Network
                  Security For Novice End-Users},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {51--72},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1133},
  doi          = {10.15394/JDFSL.2012.1133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Szewczyk12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Tu12,
  author       = {Manghui Tu},
  title        = {Forensic Evidence Identification and Modeling for Attacks against
                  a Simulated Online Business Information System},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {73--98},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1134},
  doi          = {10.15394/JDFSL.2012.1134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Tu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TuXBC12,
  author       = {Manghui Tu and
                  Dianxiang Xu and
                  Cristian Balan and
                  Kyle Cronin},
  title        = {On the Development of Digital Forensics Curriculum},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {13--32},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1126},
  doi          = {10.15394/JDFSL.2012.1126},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TuXBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Wright12,
  author       = {Neil Fowler Wright},
  title        = {{DNS} in Computer Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {11--42},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1117},
  doi          = {10.15394/JDFSL.2012.1117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Wright12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics