Search dblp for Publications

export results for "toc:db/journals/jdfsl/jdfsl8.bht:"

 download as .bib file

@article{DBLP:journals/jdfsl/AdamsHM13,
  author       = {Richard Brian Adams and
                  Valerie Hobbs and
                  Graham Mann},
  title        = {The Advanced Data Acquisition Model {(ADAM):} {A} Process Model for
                  Digital Forensic Practice},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {25--48},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1154},
  doi          = {10.15394/JDFSL.2013.1154},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AdamsHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Bartolomie13,
  author       = {Joshua Bartolomie},
  title        = {Book Review: Professional Penetration Testing: Creating and Learning
                  in a Hacking Lab 2E},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {87--90},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1152},
  doi          = {10.15394/JDFSL.2013.1152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Bartolomie13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Carlton13,
  author       = {Gregory H. Carlton},
  title        = {A simple experiment with Microsoft Office 2010 and Windows 7 utilizing
                  digital forensic methodology},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {17--38},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1139},
  doi          = {10.15394/JDFSL.2013.1139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Carlton13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen13,
  author       = {Fred Cohen},
  title        = {Science Column: Measuring Inconsistency Methods for Evidentiary Value},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {7--16},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1138},
  doi          = {10.15394/JDFSL.2013.1138},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen13a,
  author       = {Fred Cohen},
  title        = {Science Column: Reconstruction: The Experimental Side of Digital Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {49--56},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1155},
  doi          = {10.15394/JDFSL.2013.1155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Garfinkel13,
  author       = {Simson L. Garfinkel},
  title        = {Book Review: iPhone and iOS Forensic: Investigation, Analysis and
                  Mobile Security for Apple iPhone, iPad and iOS Devices},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {65--68},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1157},
  doi          = {10.15394/JDFSL.2013.1157},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Garfinkel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler13,
  author       = {Gary C. Kessler},
  title        = {Technology Corner: Calculating the Number of Android Lock Patterns:
                  An Unfinished Study in Number Theory},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {57--64},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1156},
  doi          = {10.15394/JDFSL.2013.1156},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Larson13,
  author       = {Stephen Parker Larson},
  title        = {Analysis of Second Hand Google Mini Search Appliance},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {7--24},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1153},
  doi          = {10.15394/JDFSL.2013.1153},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Larson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MabutoV13,
  author       = {Enos K. Mabuto and
                  Hein S. Venter},
  title        = {System-Generated Digital Forensic Evidence in Graphic Design Applications},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {71--86},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1151},
  doi          = {10.15394/JDFSL.2013.1151},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MabutoV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MehmetB13,
  author       = {Murad Mehmet and
                  Miguel Fuentes Buchholtz},
  title        = {Money Laundering Detection Framework to Link the Disparate and Evolving
                  Schemes},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {41--70},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1150},
  doi          = {10.15394/JDFSL.2013.1150},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MehmetB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Nash13,
  author       = {Thomas Nash},
  title        = {Book Review: Placing the Suspect behind the Keyboard: Using Digital
                  Forensics and Investigative Techniques to Identify Cybercrime Suspects},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {115--118},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1146},
  doi          = {10.15394/JDFSL.2013.1146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Nash13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RuhnkaL13,
  author       = {John C. Ruhnka and
                  Windham E. Loopesko},
  title        = {Risk Management Of Email And Internet Use In The Workplace},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {7--20},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1148},
  doi          = {10.15394/JDFSL.2013.1148},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RuhnkaL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Schofield13,
  author       = {Damian Schofield},
  title        = {Visualizing Forensic Data: Evidence Guidelines (Part 1)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {73--90},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1141},
  doi          = {10.15394/JDFSL.2013.1141},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Schofield13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SchofieldF13,
  author       = {Damian Schofield and
                  Ken Fowle},
  title        = {Technology Corner: Visualising Forensic Data: Evidence Guidelines
                  (Part 2)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {93--114},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1145},
  doi          = {10.15394/JDFSL.2013.1145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SchofieldF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ShaerpourDM13,
  author       = {Kaveh Shaerpour and
                  Ali Dehghantanha and
                  Ramlan Mahmod},
  title        = {Trends In Android Malware Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {21--40},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1149},
  doi          = {10.15394/JDFSL.2013.1149},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ShaerpourDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Shaw13,
  author       = {Eric D. Shaw},
  title        = {How Often is Employee Anger an Insider Risk I?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {39--72},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1140},
  doi          = {10.15394/JDFSL.2013.1140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Shaw13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Shaw13a,
  author       = {Eric D. Shaw},
  title        = {How Often is Employee Aanger an Insider Risk II?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {73--92},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1144},
  doi          = {10.15394/JDFSL.2013.1144},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Shaw13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghBM13,
  author       = {Kishore Singh and
                  Peter J. Best and
                  Joseph M. Mula},
  title        = {Automating Vendor Fraud Detection in Enterprise Systems},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {7--40},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1142},
  doi          = {10.15394/JDFSL.2013.1142},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ThompsonL13,
  author       = {Nik Thompson and
                  Kevin Lee},
  title        = {The Digital Forensics and Security Challenge of {QR} Codes},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {41--72},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1143},
  doi          = {10.15394/JDFSL.2013.1143},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ThompsonL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics