Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jdfsl/jdfsl7.bht:"
@article{DBLP:journals/jdfsl/AlvaE12, author = {Aaron Alva and Barbara Endicott{-}Popovsky}, title = {Digital Evidence Education in Schools of Law}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {75--88}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1120}, doi = {10.15394/JDFSL.2012.1120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AlvaE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Barrett12, author = {Diane Barrett}, title = {Book Review: The Software {IP} Detective's Handbook: Measurement, Comparison, and Infringement Detections}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {87--92}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1114}, doi = {10.15394/JDFSL.2012.1114}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Barrett12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BoddingtonAB12, author = {Richard Boddington and Jeremy Ardley and Grant Austin Boxall}, title = {Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery Detection and Validation}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {29--54}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1111}, doi = {10.15394/JDFSL.2012.1111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BoddingtonAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/CantrellD12, author = {Gary Cantrell and David A. Dampier}, title = {Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {99--116}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1135}, doi = {10.15394/JDFSL.2012.1135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/CantrellD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/CarltonK12, author = {Gregory H. Carlton and Gary C. Kessler}, title = {Identifying trace evidence in data wiping application software}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {113--142}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1122}, doi = {10.15394/JDFSL.2012.1122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/CarltonK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12, author = {Fred Cohen}, title = {Column: The Physics of Digital Information-Part 2}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {7--14}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1109}, doi = {10.15394/JDFSL.2012.1109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12a, author = {Fred Cohen}, title = {Identifying and Attributing Similar Traces with Greatest Common Factor Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {89--112}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1121}, doi = {10.15394/JDFSL.2012.1121}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12b, author = {Fred Cohen}, title = {Column: The Science of Digital Forensics: Analysis of Digital Traces}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {5--12}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1125}, doi = {10.15394/JDFSL.2012.1125}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12c, author = {Fred Cohen}, title = {Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {7--20}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1131}, doi = {10.15394/JDFSL.2012.1131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Ebert12, author = {John C. Ebert}, title = {Book Review: Mastering Windows Network Forensics and Investigation, 2/e}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {117--124}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1136}, doi = {10.15394/JDFSL.2012.1136}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Ebert12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FairbanksG12, author = {Kevin D. Fairbanks and Simson L. Garfinkel}, title = {Column: Factors Affecting Data Decay}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {7--10}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1116}, doi = {10.15394/JDFSL.2012.1116}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/FairbanksG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Flor12, author = {Nick V. Flor}, title = {Technology Corner: Automated Data Extraction Using Facebook}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {149--164}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1124}, doi = {10.15394/JDFSL.2012.1124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Flor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Flor12a, author = {Nick V. Flor}, title = {Technology Corner: {A} Regular Expression Training App}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {125--132}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1137}, doi = {10.15394/JDFSL.2012.1137}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Flor12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/IrwinDS12, author = {David Irwin and Arek Dadej and Jill Slay}, title = {Extraction Of Electronic Evidence From VoIP: Identification {\&} Analysis Of Digital Speech}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {55--82}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1128}, doi = {10.15394/JDFSL.2012.1128}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/IrwinDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Ismail12, author = {Sellam Ismail}, title = {Technology Corner: Dating of Electronic Hardware for Prior Art Investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {93--100}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1115}, doi = {10.15394/JDFSL.2012.1115}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Ismail12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Keith12, author = {Nate Keith}, title = {Book Review: System Forensics, Investigation, and Response}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {143--148}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1123}, doi = {10.15394/JDFSL.2012.1123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Keith12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Lallie12, author = {Harjinder Singh Lallie}, title = {Challenges in applying the {ACPO} principles in cloud forensic investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {71--86}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1113}, doi = {10.15394/JDFSL.2012.1113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Lallie12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LallieB12, author = {Harjinder Singh Lallie and Parmjit Bains}, title = {An Overview of the Jumplist Configuration File in Windows 7}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {15--28}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1110}, doi = {10.15394/JDFSL.2012.1110}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LallieB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoW012, author = {Thomas Lonardo and Doug White and Alan Rea}, title = {To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {83--110}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1129}, doi = {10.15394/JDFSL.2012.1129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoW012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Luoma12, author = {Milton H. Luoma}, title = {Book Review: Dispute Resolution and e-Discovery}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {111--114}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1130}, doi = {10.15394/JDFSL.2012.1130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Luoma12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MellingZ12, author = {Larry Melling and Robert Zeidman}, title = {Comparing Android Applications to Find Copying}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {55--70}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1112}, doi = {10.15394/JDFSL.2012.1112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MellingZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MoranO12, author = {John Moran and Douglas Orr}, title = {Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {33--54}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1127}, doi = {10.15394/JDFSL.2012.1127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MoranO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/NicholsBW12, author = {Jason Nichols and David P. Biros and Mark Weiser}, title = {Toward Alignment between Communities of Practice and Knowledge-Based Decision Support}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {61--74}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1119}, doi = {10.15394/JDFSL.2012.1119}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/NicholsBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PattersonH12, author = {Jonathan Patterson and Christopher James Hargreaves}, title = {Automated Identification and Reconstruction of YouTube Video Access}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {43--60}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1118}, doi = {10.15394/JDFSL.2012.1118}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/PattersonH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Simpson12, author = {Robert Vose Simpson}, title = {Confronting Potential Injustice with Preemptive Suppression}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {21--50}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1132}, doi = {10.15394/JDFSL.2012.1132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Simpson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Szewczyk12, author = {Patryk Szewczyk}, title = {An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {51--72}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1133}, doi = {10.15394/JDFSL.2012.1133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Szewczyk12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Tu12, author = {Manghui Tu}, title = {Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {73--98}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1134}, doi = {10.15394/JDFSL.2012.1134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Tu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TuXBC12, author = {Manghui Tu and Dianxiang Xu and Cristian Balan and Kyle Cronin}, title = {On the Development of Digital Forensics Curriculum}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {13--32}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1126}, doi = {10.15394/JDFSL.2012.1126}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TuXBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Wright12, author = {Neil Fowler Wright}, title = {{DNS} in Computer Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {11--42}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1117}, doi = {10.15394/JDFSL.2012.1117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Wright12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.