Search dblp for Publications

export results for "toc:db/journals/ijde/ijde3.bht:"

 download as .bib file

@article{DBLP:journals/ijde/AbouzakharM04,
  author       = {Nasser Salem Abouzakhar and
                  Gordon A. Manson},
  title        = {Evaluation of Intelligent Intrusion Detection Models},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {1},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B5CEAB-E87A-0E38-2D38CE3A3FB2F737.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/AbouzakharM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Ciardhuain04,
  author       = {S{\'{e}}amus {\'{O}} Ciardhu{\'{a}}in},
  title        = {An Extended Model of Cybercrime Investigations},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {1},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijde/Ciardhuain04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/FosterW04,
  author       = {Mark Foster and
                  Joseph N. Wilson},
  title        = {Process Forensics: {A} Pilot Study on the Use of Checkpointing Technology
                  in Computer Forensics},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {1},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B687DB-C476-3187-6211DDBF21DF3FB8.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/FosterW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/GaoRR04,
  author       = {Yun Gao and
                  Golden G. Richard III and
                  Vassil Roussev},
  title        = {Bluepipe: {A} Scalable Architecture for On-the-Spot Digital Forensics},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {1},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B57A8C-B6FD-092A-4D06F7039867505D.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/GaoRR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Kornblum04,
  author       = {Jesse D. Kornblum},
  title        = {The Linux Kernel and the Forensic Acquisition of Hard Discs with an
                  Odd Number of Sectors},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {2},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B8BE05-BD96-240E-F1BE517A38B48665.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Kornblum04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/LeiglandK04,
  author       = {Ryan Leigland and
                  Axel W. Krings},
  title        = {A Formalization of Digital Forensics},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {2},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B8472C-D1D2-8F98-8F7597844CF74DF8.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/LeiglandK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/MeyersR04,
  author       = {Matthew Meyers and
                  Marc Rogers},
  title        = {Computer Forensics: The Need for Standardization and Certification},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {2},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B7F51C-D8F9-A0D0-7F387126198F12F6.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/MeyersR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Stephenson04,
  author       = {Peter Stephenson},
  title        = {Application Of Formal Methods To Root Cause Analysis of Digital Incidents},
  journal      = {Int. J. Digit. EVid.},
  volume       = {3},
  number       = {1},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B62ABA-F4C9-CBCE-8B9812B7B4055CAC.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Stephenson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics