![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ijde/ijde3.bht:"
@article{DBLP:journals/ijde/AbouzakharM04, author = {Nasser Salem Abouzakhar and Gordon A. Manson}, title = {Evaluation of Intelligent Intrusion Detection Models}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {1}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B5CEAB-E87A-0E38-2D38CE3A3FB2F737.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/AbouzakharM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Ciardhuain04, author = {S{\'{e}}amus {\'{O}} Ciardhu{\'{a}}in}, title = {An Extended Model of Cybercrime Investigations}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {1}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijde/Ciardhuain04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/FosterW04, author = {Mark Foster and Joseph N. Wilson}, title = {Process Forensics: {A} Pilot Study on the Use of Checkpointing Technology in Computer Forensics}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {1}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B687DB-C476-3187-6211DDBF21DF3FB8.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/FosterW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/GaoRR04, author = {Yun Gao and Golden G. Richard III and Vassil Roussev}, title = {Bluepipe: {A} Scalable Architecture for On-the-Spot Digital Forensics}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {1}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B57A8C-B6FD-092A-4D06F7039867505D.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/GaoRR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Kornblum04, author = {Jesse D. Kornblum}, title = {The Linux Kernel and the Forensic Acquisition of Hard Discs with an Odd Number of Sectors}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {2}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B8BE05-BD96-240E-F1BE517A38B48665.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Kornblum04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/LeiglandK04, author = {Ryan Leigland and Axel W. Krings}, title = {A Formalization of Digital Forensics}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {2}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B8472C-D1D2-8F98-8F7597844CF74DF8.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/LeiglandK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/MeyersR04, author = {Matthew Meyers and Marc Rogers}, title = {Computer Forensics: The Need for Standardization and Certification}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {2}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B7F51C-D8F9-A0D0-7F387126198F12F6.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/MeyersR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Stephenson04, author = {Peter Stephenson}, title = {Application Of Formal Methods To Root Cause Analysis of Digital Incidents}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {1}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B62ABA-F4C9-CBCE-8B9812B7B4055CAC.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Stephenson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.