default search action
Search dblp for Publications
export results for "stream:conf/dfrws:"
@article{DBLP:journals/di/DavisMA22, author = {Megan Davis and Bridget T. McInnes and Irfan Ahmed}, title = {Forensic investigation of instant messaging services on linux {OS:} Discord and Slack as case studies}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301401}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301401}, doi = {10.1016/J.FSIDI.2022.301401}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DavisMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GobelUBB22, author = {Thomas G{\"{o}}bel and Frieder Uhlig and Harald Baier and Frank Breitinger}, title = {{FRASHER} - {A} framework for automated evaluation of similarity hashing}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301407}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301407}, doi = {10.1016/J.FSIDI.2022.301407}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GobelUBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JakobsLH22, author = {Carlo Jakobs and Martin Lambertz and Jan{-}Niclas Hilgert}, title = {ssdeeper: Evaluating and improving ssdeep}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301402}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301402}, doi = {10.1016/J.FSIDI.2022.301402}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JakobsLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JohnsonVSGB22, author = {Hailey Johnson and Karl Volk and Robert Serafin and Cinthya Grajeda and Ibrahim M. Baggili}, title = {Alt-tech social forensics: Forensic analysis of alternative social networking applications}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301406}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301406}, doi = {10.1016/J.FSIDI.2022.301406}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JohnsonVSGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LiSL22, author = {Qi Li and Giuliano Sovernigo and Xiaodong Lin}, title = {BlackFeather: {A} framework for background noise forensics}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301396}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301396}, doi = {10.1016/J.FSIDI.2022.301396}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LiSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MannaCAR22, author = {Modhuparna Manna and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Memory analysis of .NET and .Net Core applications}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301404}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301404}, doi = {10.1016/J.FSIDI.2022.301404}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MannaCAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NguyenOA22, author = {Thanh Nguyen and Meni Orenbach and Ahmad Atamli}, title = {Live system call trace reconstruction on Linux}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301398}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301398}, doi = {10.1016/J.FSIDI.2022.301398}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NguyenOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderEF22, author = {Janine Schneider and Maximilian Eichhorn and Felix C. Freiling}, title = {Ambiguous file system partitions}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301399}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301399}, doi = {10.1016/J.FSIDI.2022.301399}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderEF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SentanoeDR22, author = {Stewart Sentanoe and Thomas Dangl and Hans P. Reiser}, title = {\emph{KVMIveggur}: Flexible, secure, and efficient support for self-service virtual machine introspection}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301397}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301397}, doi = {10.1016/J.FSIDI.2022.301397}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SentanoeDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShiCG22, author = {Chen Shi and Chris Chao{-}Chun Cheng and Yong Guan}, title = {LibDroid: Summarizing information flow of android native libraries via static analysis}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301405}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301405}, doi = {10.1016/J.FSIDI.2022.301405}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShiCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Solanke22, author = {Abiodun A. Solanke}, title = {Explainable digital forensics {AI:} Towards mitigating distrust in AI-based digital forensics analysis using interpretable models}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301403}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301403}, doi = {10.1016/J.FSIDI.2022.301403}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Solanke22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WangLCC22, author = {Tianyi Wang and Ming Liu and Wei Cao and Kam{-}Pui Chow}, title = {Deepfake noise investigation and detection}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301395}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301395}, doi = {10.1016/J.FSIDI.2022.301395}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WangLCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WangZDTB22, author = {Enoch Wang and Samuel Zurowski and Orion Duffy and Tyler Thomas and Ibrahim M. Baggili}, title = {Juicing {V8:} {A} primary account for the memory forensics of the {V8} JavaScript engine}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301400}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301400}, doi = {10.1016/J.FSIDI.2022.301400}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WangZDTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlendalAD21, author = {Gunnar Alendal and Stefan Axelsson and Geir Olav Dyrkolbotn}, title = {Chip chop - smashing the mobile phone secure chip for fun and digital forensics}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301191}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301191}, doi = {10.1016/J.FSIDI.2021.301191}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AlendalAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChengSGG21, author = {Chris Chao{-}Chun Cheng and Chen Shi and Neil Zhenqiang Gong and Yong Guan}, title = {LogExtractor: Extracting digital evidence from android log messages via string and taint analysis}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301193}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301193}, doi = {10.1016/J.FSIDI.2021.301193}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChengSGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HranickyBRSSMM21, author = {Radek Hranick{\'{y}} and Frank Breitinger and Ondrej Rysav{\'{y}} and John Sheppard and Florin Schaedler and Holger Morgenstern and Simon Malik}, title = {What do incident response practitioners need to know? {A} skillmap for the years ahead}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301184}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301184}, doi = {10.1016/J.FSIDI.2021.301184}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HranickyBRSSMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KantaCCS21, author = {Aikaterini Kanta and Sein Coray and Iwen Coisel and Mark Scanlon}, title = {How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301186}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301186}, doi = {10.1016/J.FSIDI.2021.301186}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KantaCCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeMD21, author = {Anh Duc Le and Justin P. L. McGuinness and Edward Dixon}, title = {ChunkedHCs algorithm for authorship verification problems: Reddit case study}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301185}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301185}, doi = {10.1016/J.FSIDI.2021.301185}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MaggioCAR21, author = {Ryan D. Maggio and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Seance: Divination of tool-breaking changes in forensically important binaries}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301189}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301189}, doi = {10.1016/J.FSIDI.2021.301189}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MaggioCAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McCulloughAOB21, author = {Syria McCullough and Stella Abudu and Ebere Onwubuariri and Ibrahim M. Baggili}, title = {Another brick in the wall: An exploratory analysis of digital forensics programs in the United States}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301187}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301187}, doi = {10.1016/J.FSIDI.2021.301187}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/McCulloughAOB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NeshenkoBF21, author = {Nataliia Neshenko and Elias Bou{-}Harb and Borko Furht}, title = {A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301198}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301198}, doi = {10.1016/J.FSIDI.2021.301198}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NeshenkoBF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OShaughnessyB21, author = {Stephen O'Shaughnessy and Frank Breitinger}, title = {Malware family classification via efficient Huffman features}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301192}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301192}, doi = {10.1016/J.FSIDI.2021.301192}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OShaughnessyB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RaisALA21, author = {Muhammad Haris Rais and Rima Asmar Awad and Juan Lopez Jr. and Irfan Ahmed}, title = {JTAG-based {PLC} memory acquisition framework for industrial control systems}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301196}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301196}, doi = {10.1016/J.FSIDI.2021.301196}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RaisALA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RathoreSSS21, author = {Hemant Rathore and Adithya Samavedhi and Sanjay K. Sahay and Mohit Sewak}, title = {Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301183}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301183}, doi = {10.1016/J.FSIDI.2021.301183}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RathoreSSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandvikFAA21, author = {Jens{-}Petter Sandvik and Katrin Franke and Habtamu Abie and Andr{\'{e}} {\AA}rnes}, title = {Coffee forensics - Reconstructing data in IoT devices running Contiki {OS}}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301188}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301188}, doi = {10.1016/J.FSIDI.2021.301188}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandvikFAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SerhalL21, author = {Cezar Serhal and Nhien{-}An Le{-}Khac}, title = {Machine learning based approach to analyze file meta data for smart phone file triage}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301194}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301194}, doi = {10.1016/J.FSIDI.2021.301194}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SerhalL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SilvaVSBACCSLJ21, author = {Iaslan Silva and Jo{\~{a}}o Marcos do Valle and Gabriel Souza and Jaine Budke and Daniel Ara{\'{u}}jo and Bruno Carvalho and N{\'{e}}lio Cacho and Henrique Sales and Frederico Lopes and Rivaldo Silva Junior}, title = {Using micro-services and artificial intelligence to analyze images in criminal evidences}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301197}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301197}, doi = {10.1016/J.FSIDI.2021.301197}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SilvaVSBACCSLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sparling21, author = {Aaron Sparling}, title = {Twenty first Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301262}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301262}, doi = {10.1016/J.FSIDI.2021.301262}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Sparling21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasPNB21, author = {Tyler Thomas and Mathew Piscitelli and Bhavik Ashok Nahar and Ibrahim M. Baggili}, title = {Duck Hunt: Memory forensics of {USB} attack platforms}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301190}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301190}, doi = {10.1016/J.FSIDI.2021.301190}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThomasPNB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMMR20, author = {Andrew Case and Ryan D. Maggio and Modhuparna Manna and Golden G. Richard III}, title = {Memory Analysis of macOS Page Queues}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301004}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301004}, doi = {10.1016/J.FSIDI.2020.301004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DoraiAPP20, author = {Gokila Dorai and Sudhir Aggarwal and Neet Patel and Charisa Powell}, title = {{VIDE} - Vault App Identification and Extraction System for iOS Devices}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301007}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301007}, doi = {10.1016/J.FSIDI.2020.301007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DoraiAPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GalbraithSS20, author = {Christopher Galbraith and Padhraic Smyth and Hal S. Stern}, title = {Statistical Methods for the Forensic Analysis of Geolocated Event Data}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301009}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301009}, doi = {10.1016/J.FSIDI.2020.301009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GalbraithSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HassenfeldtJB20, author = {Courtney Hassenfeldt and Jillian Jacques and Ibrahim M. Baggili}, title = {Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging {\&} Tagging of Digital Devices in Immersive Virtual Reality}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301011}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301011}, doi = {10.1016/J.FSIDI.2020.301011}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HassenfeldtJB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarresandDA20, author = {Martin Karresand and Geir Olav Dyrkolbotn and Stefan Axelsson}, title = {An Empirical Study of the {NTFS} Cluster Allocation Behavior Over Time}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301008}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301008}, doi = {10.1016/J.FSIDI.2020.301008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarresandDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nelson20a, author = {Alex Nelson}, title = {Twentieth Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301028}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301028}, doi = {10.1016/J.FSIDI.2020.301028}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Nelson20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NordvikPTAF20, author = {Rune Nordvik and Kyle Porter and Fergus Toolan and Stefan Axelsson and Katrin Franke}, title = {Generic Metadata Time Carving}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301005}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301005}, doi = {10.1016/J.FSIDI.2020.301005}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NordvikPTAF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PalutkeBRS20, author = {Ralph Palutke and Frank Block and Patrick Reichenberger and Dominik Stripeika}, title = {Hiding Process Memory Via Anti-Forensic Techniques}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301012}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301012}, doi = {10.1016/J.FSIDI.2020.301012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PalutkeBRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/QasimSA20, author = {Syed Ali Qasim and Jared M. Smith and Irfan Ahmed}, title = {Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301013}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301013}, doi = {10.1016/J.FSIDI.2020.301013}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/QasimSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SayakkaraLS20a, author = {Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301003}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301003}, doi = {10.1016/J.FSIDI.2020.301003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SayakkaraLS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderDMF20, author = {Janine Schneider and Hans{-}Peter Deifel and Stefan Milius and Felix C. Freiling}, title = {Unifying Metadata-Based Storage Reconstruction and Carving with {LAYR}}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301006}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301006}, doi = {10.1016/J.FSIDI.2020.301006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderDMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinKKYJS20, author = {Yeonghun Shin and Hyungchan Kim and Sungbum Kim and Dongkyun Yoo and Wooyeon Jo and Taeshik Shon}, title = {Certificate Injection-Based Encrypted Traffic Forensics in {AI} Speaker Ecosystem}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301010}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301010}, doi = {10.1016/J.FSIDI.2020.301010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinKKYJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasPSB20, author = {Tyler Thomas and Mathew Piscitelli and Ilya Shavrov and Ibrahim M. Baggili}, title = {Memory {FORESHADOW:} Memory FOREnSics of HArDware CryptOcurrency wallets - {A} Tool and Visualization Framework}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301002}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301002}, doi = {10.1016/J.FSIDI.2020.301002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThomasPSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BlockD19, author = {Frank Block and Andreas Dewald}, title = {Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S3--S12}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.008}, doi = {10.1016/J.DIIN.2019.04.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BlockD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseJFMASR19, author = {Andrew Case and Mohammad M. Jalalzai and Md Firoz{-}Ul{-}Amin and Ryan D. Maggio and Aisha I. Ali{-}Gombe and Mingxuan Sun and Golden G. Richard III}, title = {HookTracer: {A} System for Automated and Accessible {API} Hooks Analysis}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S104--S112}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.011}, doi = {10.1016/J.DIIN.2019.04.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseJFMASR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyLBB19, author = {Peter Casey and Rebecca Lindsay{-}Decusati and Ibrahim M. Baggili and Frank Breitinger}, title = {Inception: Virtual Space in Memory Space in Real Space - Memory Forensics of Immersive Virtual Reality with the {HTC} Vive}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S13--S21}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.007}, doi = {10.1016/J.DIIN.2019.04.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CaseyLBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChangGSSW19, author = {Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya and Monika Singh and Douglas R. White}, title = {FbHash: {A} New Similarity Hashing Scheme for Digital Forensics}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S113--S123}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.006}, doi = {10.1016/J.DIIN.2019.04.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChangGSSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FukamiN19, author = {Aya Fukami and Kazuhiro Nishimura}, title = {Forensic Analysis of Water Damaged Mobile Devices}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S71--S79}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.009}, doi = {10.1016/J.DIIN.2019.04.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FukamiN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLRS19, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Mariia Rybalka and Roman Schell}, title = {Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S22--S30}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.014}, doi = {10.1016/J.DIIN.2019.04.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertLRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JoSKYKKJONS19, author = {Wooyeon Jo and Yeonghun Shin and Hyungchan Kim and Dongkyun Yoo and Donghyun Kim and Cheulhoon Kang and Jongmin Jin and Jungkyung Oh and Bitna Na and Taeshik Shon}, title = {Digital Forensic Practices and Methodologies for {AI} Speaker Ecosystems}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S80--S93}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.013}, doi = {10.1016/J.DIIN.2019.04.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JoSKYKKJONS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarresandAD19, author = {Martin Karresand and Stefan Axelsson and Geir Olav Dyrkolbotn}, title = {Using {NTFS} Cluster Allocation Behavior to Find the Location of User Data}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S51--S60}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.018}, doi = {10.1016/J.DIIN.2019.04.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarresandAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MengB19, author = {Christian Meng and Harald Baier}, title = {bring2lite: {A} Structural Concept and Tool for Forensic Data Analysis and Recovery of Deleted SQLite Records}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S31--S41}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.017}, doi = {10.1016/J.DIIN.2019.04.017}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MengB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PessolanoRSX19, author = {Gus Pessolano and Huw Read and Iain Sutherland and Konstantinos Xynos}, title = {Forensic Analysis of the Nintendo 3DS {NAND}}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S61--S70}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.015}, doi = {10.1016/J.DIIN.2019.04.015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PessolanoRSX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SanchezGBH19, author = {Laura S{\'{a}}nchez and Cinthya Grajeda and Ibrahim M. Baggili and Cory Lloyd Hall}, title = {A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, {\&} Safer Presentation for Investigating Child Sexual Abuse Material {(CSAM)}}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S124--S142}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.005}, doi = {10.1016/J.DIIN.2019.04.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SanchezGBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SayakkaraLS19a, author = {Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S94--S103}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.012}, doi = {10.1016/J.DIIN.2019.04.012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SayakkaraLS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schatz19, author = {Bradley L. Schatz}, title = {{AFF4-L:} {A} Scalable Open Logical Evidence Container}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S143--S149}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.016}, doi = {10.1016/J.DIIN.2019.04.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schatz19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRHJG19, author = {James Wagner and Alexander Rasin and Karen Heart and Rebecca Jacob and Jonathan Grier}, title = {{DB3F} {\&} DF-Toolkit: The Database Forensic File Format and the Database Forensic Toolkit}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S42--S50}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.010}, doi = {10.1016/J.DIIN.2019.04.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRHJG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-kawazCFL18, author = {Hiba Al{-}Kawaz and Nathan L. Clarke and Steven Furnell and Fudong Li}, title = {Facial-Forensic Analysis Tool}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S136}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.008}, doi = {10.1016/J.DIIN.2018.04.008}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-kawazCFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AwasthiRXS18, author = {Akshay Awasthi and Huw Read and Konstantinos Xynos and Iain Sutherland}, title = {Welcome pwn: Almond smart home hub forensics}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S38--S46}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.014}, doi = {10.1016/J.DIIN.2018.04.014}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AwasthiRXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaninD18, author = {Sergii Banin and Geir Olav Dyrkolbotn}, title = {Multinomial malware classification via low-level features}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S107--S117}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.019}, doi = {10.1016/J.DIIN.2018.04.019}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaninD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BhattA18, author = {Manish Bhatt and Irfan Ahmed}, title = {Leveraging relocations in ELF-binaries for Linux kernel version identification}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S12--S20}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.022}, doi = {10.1016/J.DIIN.2018.04.022}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BhattA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrajedaSBCB18, author = {Cinthya Grajeda and Laura S{\'{a}}nchez and Ibrahim M. Baggili and Devon Clark and Frank Breitinger}, title = {Experience constructing the Artifact Genome Project {(AGP):} Managing the domain's knowledge one artifact at a time}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S47--S58}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.021}, doi = {10.1016/J.DIIN.2018.04.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrajedaSBCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLY18, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Shujian Yang}, title = {Forensic analysis of multiple device {BTRFS} configurations using The Sleuth Kit}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S21--S29}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.020}, doi = {10.1016/J.DIIN.2018.04.020}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman18a, author = {Graeme Horsman}, title = {Reconstructing streamed video content: {A} case study on YouTube and Facebook Live stream content in the Chrome web browser cache}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S30--S37}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.017}, doi = {10.1016/J.DIIN.2018.04.017}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KaoCS18, author = {Da{-}Yu Kao and Yuanpei Chen and Neng{-}Hsin Shih}, title = {Reconstructing {ADS} data hiding in windows {NTFS:} {A} temporal analysis}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S137}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.009}, doi = {10.1016/J.DIIN.2018.04.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KaoCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KouwenSCL18, author = {Arie Kouwen and Mark Scanlon and Kim{-}Kwang Raymond Choo and Nhien{-}An Le{-}Khac}, title = {Digital forensic investigation of two-way radio communication equipment and services}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S77--S86}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.007}, doi = {10.1016/J.DIIN.2018.04.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KouwenSCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LambertzHS18, author = {Martin Lambertz and Jan{-}Niclas Hilgert and Roman Schell}, title = {Resurrecting Portable Network Graphics using block generators}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S138}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.010}, doi = {10.1016/J.DIIN.2018.04.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LambertzHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeBNS18, author = {Quan Le and Ois{\'{\i}}n Boydell and Brian Mac Namee and Mark Scanlon}, title = {Deep learning at the shallow end: Malware classification for non-domain experts}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S118--S126}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.024}, doi = {10.1016/J.DIIN.2018.04.024}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeBNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LewisCAR18, author = {Nathan Lewis and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Memory forensics and the Windows Subsystem for Linux}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S3--S11}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.018}, doi = {10.1016/J.DIIN.2018.04.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LewisCAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LinCZYW18, author = {Xiaodong Lin and Ting Chen and Tong Zhu and Kun Yang and Fengguo Wei}, title = {Automated forensic analysis of mobile applications on Android devices}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S59--S66}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.012}, doi = {10.1016/J.DIIN.2018.04.012}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LinCZYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MosliYP18, author = {Rayan Mosli and Bo Yuan and Yin Pan}, title = {On the viability of data collection using Google Rapid Response for enterprise-level malware research}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S139}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.011}, doi = {10.1016/J.DIIN.2018.04.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MosliYP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Porter18, author = {Kyle Porter}, title = {Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using {LDA} topic modeling}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S87--S97}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.023}, doi = {10.1016/J.DIIN.2018.04.023}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Porter18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TaubmannAR18, author = {Benjamin Taubmann and Omar Alabduljaleel and Hans P. Reiser}, title = {DroidKex: Fast extraction of ephemeral {TLS} keys from the memory of Android apps}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S67--S76}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.013}, doi = {10.1016/J.DIIN.2018.04.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TaubmannAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThompsonV18, author = {Michael F. Thompson and Timothy Vidas}, title = {Cyber Grand Challenge {(CGC)} monitor: {A} vetting system for the {DARPA} cyber grand challenge}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S127--S135}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.016}, doi = {10.1016/J.DIIN.2018.04.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThompsonV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TuzelBZLT18, author = {Tomasz Tuzel and Mark P. Bridgman and Joshua Zepf and Tamas K. Lengyel and Kyle J. Temkin}, title = {Who watches the watcher? Detecting hypervisor introspection from unprivileged guests}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S98--S106}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.015}, doi = {10.1016/J.DIIN.2018.04.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TuzelBZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BlockD17, author = {Frank Block and Andreas Dewald}, title = {Linux memory forensics: Dissecting the user space process heap}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S66--S75}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.002}, doi = {10.1016/J.DIIN.2017.06.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BlockD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseDPRR17, author = {Andrew Case and Arghya Kusum Das and Seung{-}Jong Park and J. Ramanujam and Golden G. Richard III}, title = {Gaslight: {A} comprehensive fuzzing architecture for memory forensics frameworks}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S86--S93}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.011}, doi = {10.1016/J.DIIN.2017.06.011}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CaseDPRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChungPL17, author = {Hyunji Chung and Jungheum Park and Sangjin Lee}, title = {Digital forensic approaches for Amazon Alexa ecosystem}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S15--S25}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.010}, doi = {10.1016/J.DIIN.2017.06.010}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChungPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ClarkMBB17, author = {Devon Clark and Christopher Meffert and Ibrahim M. Baggili and Frank Breitinger}, title = {{DROP} (DRone Open source Parser) your drone: Forensic analysis of the {DJI} Phantom {III}}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S3--S14}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.013}, doi = {10.1016/J.DIIN.2017.06.013}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ClarkMBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DentonKBB17, author = {George Denton and Filip Karp{\'{\i}}sek and Frank Breitinger and Ibrahim M. Baggili}, title = {Leveraging the {SRTP} protocol for over-the-network memory acquisition of a {GE} Fanuc Series 90-30}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S26--S38}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.005}, doi = {10.1016/J.DIIN.2017.06.005}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DentonKBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GalbraithS17, author = {Christopher Galbraith and Padhraic Smyth}, title = {Analyzing user-event data using score-based likelihood ratios with marked point processes}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S106--S114}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.009}, doi = {10.1016/J.DIIN.2017.06.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GalbraithS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrajedaBB17, author = {Cinthya Grajeda and Frank Breitinger and Ibrahim M. Baggili}, title = {Availability of datasets for digital forensics - And what is missing}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S94--S105}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.004}, doi = {10.1016/J.DIIN.2017.06.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrajedaBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLP17, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Daniel Plohmann}, title = {Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S76--S85}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.003}, doi = {10.1016/J.DIIN.2017.06.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MillerGCDLP17, author = {Cody Miller and Dae Glendowne and Henry Cook and Thomas DeMarcus and Chris Lanclos and Patrick Pape}, title = {Insights gained from constructing a large scale dynamic analysis platform}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S48--S56}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.007}, doi = {10.1016/J.DIIN.2017.06.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MillerGCDLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SenthivelAR17, author = {Saranyan Senthivel and Irfan Ahmed and Vassil Roussev}, title = {{SCADA} network forensics of the {PCCC} protocol}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S57--S65}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.012}, doi = {10.1016/J.DIIN.2017.06.012}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SenthivelAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StellyR17, author = {Christopher Stelly and Vassil Roussev}, title = {{SCARF:} {A} container-based approach to cloud-scale digital forensic processing}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S39--S47}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.008}, doi = {10.1016/J.DIIN.2017.06.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StellyR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRGHFBG17, author = {James Wagner and Alexander Rasin and Boris Glavic and Karen Heart and Jacob D. Furst and Lucas Bressan and Jonathan Grier}, title = {Carving database storage to detect and trace security breaches}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S127--S136}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.006}, doi = {10.1016/J.DIIN.2017.06.006}, timestamp = {Thu, 14 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRGHFBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Zheng0LT17, author = {Lilei Zheng and Ying Zhang and Chien Eao Lee and Vrizlynn L. L. Thing}, title = {Time-of-recording estimation for audio recordings}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S115--S126}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.001}, doi = {10.1016/J.DIIN.2017.06.001}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Zheng0LT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Alrabaee0D16, author = {Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S11--S22}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.002}, doi = {10.1016/J.DIIN.2016.04.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseR16, author = {Andrew Case and Golden G. Richard III}, title = {Detecting objective-C malware through memory forensics}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S3--S10}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.017}, doi = {10.1016/J.DIIN.2016.04.017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ConlanBB16, author = {Kevin J. Conlan and Ibrahim M. Baggili and Frank Breitinger}, title = {Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S66--S75}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.006}, doi = {10.1016/J.DIIN.2016.04.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ConlanBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuidoBG16, author = {Mark D. Guido and Jonathan Buttner and Justin Grover}, title = {Rapid differential forensic imaging of mobile devices}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S46--S54}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.012}, doi = {10.1016/J.DIIN.2016.04.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GuidoBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HarichandranWBB16, author = {Vikram S. Harichandran and Daniel Walnycky and Ibrahim M. Baggili and Frank Breitinger}, title = {CuFA: {A} more formal definition for digital forensic artifacts}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S125--S137}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.005}, doi = {10.1016/J.DIIN.2016.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HarichandranWBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarbabDM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Djedjiga Mouheb}, title = {Fingerprinting Android packaging: Generating DNAs for malware detection}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S33--S45}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.013}, doi = {10.1016/J.DIIN.2016.04.013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarbabDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimPL16, author = {Jeonghyeon Kim and Aran Park and Sangjin Lee}, title = {Recovery method of deleted records and tables from {ESE} database}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S118--S124}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.003}, doi = {10.1016/J.DIIN.2016.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KovenBDM16, author = {Jay Koven and Enrico Bertini and R. Luke DuBois and Nasir D. Memon}, title = {InVEST: Intelligent visual email search and triage}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S138--S148}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.008}, doi = {10.1016/J.DIIN.2016.04.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KovenBDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeHKN16, author = {Kyoungho Lee and Hyunuk Hwang and Kibom Kim and BongNam Noh}, title = {Robust bootstrapping memory analysis against anti-forensics}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S23--S32}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.009}, doi = {10.1016/J.DIIN.2016.04.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeeHKN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MabeyD0A16, author = {Mike Mabey and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {dbling: Identifying extensions installed on encrypted web thin clients}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S55--S65}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.007}, doi = {10.1016/J.DIIN.2016.04.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MabeyD0A16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McGrath16, author = {Niall McGrath}, title = {Forensically extracting file encrypted contents on {OS} {X} using {HFS+} journal file}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S157}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.014}, doi = {10.1016/J.DIIN.2016.04.014}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McGrath16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MeffertBB16, author = {Christopher Meffert and Ibrahim M. Baggili and Frank Breitinger}, title = {Deleting collected digital evidence by exploiting a widely adopted hardware write blocker}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S87--S96}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.004}, doi = {10.1016/J.DIIN.2016.04.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MeffertBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NeunerSW16, author = {Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl}, title = {\emph{PeekaTorrent}: Leveraging {P2P} hash values for digital forensics}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S149--S156}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.011}, doi = {10.1016/J.DIIN.2016.04.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NeunerSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NeunerVSB0W16, author = {Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and Edgar R. Weippl}, title = {Time is on my side: Steganography in filesystem metadata}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S76--S86}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.010}, doi = {10.1016/J.DIIN.2016.04.010}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NeunerVSB0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TangFCYXFL016, author = {Yanbin Tang and Junbin Fang and Kam{-}Pui Chow and Siu{-}Ming Yiu and Jun Xu and Bo Feng and Qiong Li and Qi Han}, title = {Recovery of heavily fragmented {JPEG} files}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S108--S117}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.016}, doi = {10.1016/J.DIIN.2016.04.016}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TangFCYXFL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRG16, author = {James Wagner and Alexander Rasin and Jonathan Grier}, title = {Database image content explorer: Carving data that does not officially exist}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S97--S107}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.015}, doi = {10.1016/J.DIIN.2016.04.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArmknechtD15, author = {Frederik Armknecht and Andreas Dewald}, title = {Privacy-preserving email forensics}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S127--S136}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.003}, doi = {10.1016/J.DIIN.2015.05.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ArmknechtD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BalzarottiPV15, author = {Davide Balzarotti and Roberto Di Pietro and Antonio Villani}, title = {The impact of GPU-assisted malware on memory forensics: {A} case study}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S16--S24}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.010}, doi = {10.1016/J.DIIN.2015.05.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BoukhtoutaMDAIB15, author = {Amine Boukhtouta and Djedjiga Mouheb and Mourad Debbabi and Omar Alfandi and Farkhund Iqbal and May El Barachi}, title = {Graph-theoretic characterization of cyber-threat infrastructures}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S3--S15}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.002}, doi = {10.1016/J.DIIN.2015.05.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseR15, author = {Andrew Case and Golden G. Richard III}, title = {Advancing Mac {OS} {X} rootkit detection}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S25--S33}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.005}, doi = {10.1016/J.DIIN.2015.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Clemens15, author = {John Clemens}, title = {Automatic classification of object code using machine learning}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S156--S162}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.007}, doi = {10.1016/J.DIIN.2015.05.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Clemens15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DietrichA15, author = {Dianne Dietrich and Frank Adelstein}, title = {Archival science, digital forensics, and new media art}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S137--S145}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.004}, doi = {10.1016/J.DIIN.2015.05.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DietrichA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelM15, author = {Simson L. Garfinkel and Michael McCarrin}, title = {Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S95--S105}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.001}, doi = {10.1016/J.DIIN.2015.05.001}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GarfinkelM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrierR15, author = {Jonathan Grier and Golden G. Richard III}, title = {Rapid forensic imaging of large disks with sifting collectors}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S34--S44}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.006}, doi = {10.1016/J.DIIN.2015.05.006}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrierR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LarbanetLD15, author = {Adrien Larbanet and Jonas Lerebours and J. P. David}, title = {Detecting very large sets of referenced files at 40/100 GbE, especially {MP4} files}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S85--S94}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.011}, doi = {10.1016/J.DIIN.2015.05.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LarbanetLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RahimianSAWD15, author = {Ashkan Rahimian and Paria Shirani and Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {BinComp: {A} stratified approach to compiler provenance Attribution}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S146--S155}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.015}, doi = {10.1016/J.DIIN.2015.05.015}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schatz15, author = {Bradley L. Schatz}, title = {Wirespeed: Extending the {AFF4} forensic container format for scalable acquisition and live analysis}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S45--S54}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.016}, doi = {10.1016/J.DIIN.2015.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schatz15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchmidIF15, author = {Michael R. Schmid and Farkhund Iqbal and Benjamin C. M. Fung}, title = {E-mail authorship attribution using customized associative classification}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S116--S126}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.012}, doi = {10.1016/J.DIIN.2015.05.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SchmidIF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schweinsberg15, author = {Elizabeth Schweinsberg}, title = {Fifteenth Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S1--S2}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.001}, doi = {10.1016/J.DIIN.2015.07.001}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schweinsberg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRG15, author = {James Wagner and Alexander Rasin and Jonathan Grier}, title = {Database forensic analysis through internal structure carving}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S106--S115}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.013}, doi = {10.1016/J.DIIN.2015.05.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WalnyckyBMMB15, author = {Daniel Walnycky and Ibrahim M. Baggili and Andrew Marrington and Jason Moore and Frank Breitinger}, title = {Network and device forensic analysis of Android social-messaging applications}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S77--S84}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.009}, doi = {10.1016/J.DIIN.2015.05.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WalnyckyBMMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YangCKC15, author = {Seung Jei Yang and Jung Ho Choi and Ki Bom Kim and Taejoo Chang}, title = {New acquisition method based on firmware update protocols for Android smartphones}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S68--S76}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.008}, doi = {10.1016/J.DIIN.2015.05.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/YangCKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZawoadHG15, author = {Shams Zawoad and Ragib Hasan and John Grimes}, title = {{LINCS:} Towards building a trustworthy litigation hold enabled cloud storage system}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S55--S67}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.014}, doi = {10.1016/J.DIIN.2015.05.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZawoadHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeebeL14a, author = {Nicole Lang Beebe and Lishu Liu}, title = {Ranking algorithms for digital forensic string search hits}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S124--S132}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.007}, doi = {10.1016/J.DIIN.2014.05.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BeebeL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bou-HarbLBD14, author = {Elias Bou{-}Harb and Nour{-}Eddine Lakhdari and Hamad Binsalleeh and Mourad Debbabi}, title = {Multidimensional investigation of source port 0 probing}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S114--S123}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.012}, doi = {10.1016/J.DIIN.2014.05.012}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyZ14, author = {Eoghan Casey and Rikkert Zoun}, title = {Design tradeoffs for developing fragmented video carving tools}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S30--S39}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.010}, doi = {10.1016/J.DIIN.2014.05.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CaseyZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChabotBNK14, author = {Yoan Chabot and Aur{\'{e}}lie Bertaux and Christophe Nicolle and M. Tahar Kechadi}, title = {A complete formalized knowledge representation model for advanced digital forensics timeline analysis}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S95--S105}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.009}, doi = {10.1016/J.DIIN.2014.05.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChabotBNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KumarOTPP14, author = {Vijay Kumar and George C. Oikonomou and Theo Tryfonas and Dan Page and Iain W. Phillips}, title = {Digital investigations for IPv6-based Wireless Sensor Networks}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S66--S75}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.005}, doi = {10.1016/J.DIIN.2014.05.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KumarOTPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LangBCD14, author = {Anthony Lang and Masooda N. Bashir and Roy H. Campbell and Lizanne DeStefano}, title = {Developing a new digital forensics curriculum}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S76--S84}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.008}, doi = {10.1016/J.DIIN.2014.05.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LangBCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MohamedMIB14, author = {Ahmed Fathy Abdul Latif Mohamed and Andrew Marrington and Farkhund Iqbal and Ibrahim M. Baggili}, title = {Testing the forensic soundness of forensic examination environments on bootable media}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S22--S29}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.015}, doi = {10.1016/J.DIIN.2014.05.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MohamedMIB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MooreBMR14, author = {Jason Moore and Ibrahim M. Baggili and Andrew Marrington and Armindo Rodrigues}, title = {Preliminary forensic analysis of the Xbox One}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S57--S65}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.014}, doi = {10.1016/J.DIIN.2014.05.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MooreBMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NelsonSL14, author = {Alex J. Nelson and Erik Q. Steggall and Darrell D. E. Long}, title = {Cooperative mode: Comparative storage metadata verification applied to the Xbox 360}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S46--S56}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.004}, doi = {10.1016/J.DIIN.2014.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NelsonSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Oestreicher14, author = {Kurt Oestreicher}, title = {A forensically robust method for acquisition of iCloud data}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S106--S113}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.006}, doi = {10.1016/J.DIIN.2014.05.006}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Oestreicher14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Quach14, author = {Tu{-}Thach Quach}, title = {Extracting hidden messages in steganographic images}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S40--S45}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.003}, doi = {10.1016/J.DIIN.2014.05.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Quach14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RichardC14, author = {Golden G. Richard III and Andrew Case}, title = {In lieu of swap: Analyzing compressed {RAM} in Mac {OS} {X} and Linux}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S3--S12}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.011}, doi = {10.1016/J.DIIN.2014.05.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RichardC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevAS14, author = {Vassil Roussev and Irfan Ahmed and Thomas Sires}, title = {Image-based kernel fingerprinting}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S13--S21}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.013}, doi = {10.1016/J.DIIN.2014.05.013}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WestphalANP14, author = {Florian Westphal and Stefan Axelsson and Christian Neuhaus and Andreas Polze}, title = {{VMI-PL:} {A} monitoring language for virtual platforms using virtual machine introspection}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S85--S94}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.016}, doi = {10.1016/J.DIIN.2014.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WestphalANP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerSB13, author = {Frank Breitinger and Georgios Stivaktakis and Harald Baier}, title = {{FRASH:} {A} framework to test algorithms of similarity hashing}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S50--S58}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.006}, doi = {10.1016/J.DIIN.2013.06.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BreitingerSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Brown13, author = {Ralf D. Brown}, title = {Improved recovery and reconstruction of DEFLATEd files}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S21--S29}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.003}, doi = {10.1016/J.DIIN.2013.06.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Brown13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DykstraS13, author = {Josiah Dykstra and Alan T. Sherman}, title = {Design and implementation of {FROST:} Digital forensic tools for the OpenStack cloud computing platform}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S87--S95}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.010}, doi = {10.1016/J.DIIN.2013.06.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DykstraS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Grover13, author = {Justin Grover}, title = {Android forensics: Automated data collection and reporting from a mobile device}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S12--S20}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.002}, doi = {10.1016/J.DIIN.2013.06.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Grover13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuidoOGWNH13, author = {Mark D. Guido and Jared Ondricek and Justin Grover and David Wilburn and Thanh Nguyen and Andrew Hunt}, title = {Automated identification of installed malicious Android applications}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S96--S104}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.011}, doi = {10.1016/J.DIIN.2013.06.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GuidoOGWNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PiccinelliG13, author = {Mario Piccinelli and Paolo Gubian}, title = {Modern ships Voyage Data Recorders: {A} forensics perspective on the Costa Concordia shipwreck}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S41--S49}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.005}, doi = {10.1016/J.DIIN.2013.06.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PiccinelliG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevQ13, author = {Vassil Roussev and Candice Quates}, title = {File fragment encoding classification - An empirical approach}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S69--S77}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.008}, doi = {10.1016/J.DIIN.2013.06.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoweSG13, author = {Neil C. Rowe and Riqui Schwamm and Simson L. Garfinkel}, title = {Language translation for file paths}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S78--S86}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.009}, doi = {10.1016/J.DIIN.2013.06.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoweSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SonLKJLL13, author = {Namheun Son and Yunho Lee and Dohyun Kim and Joshua I. James and Sangjin Lee and Kyungho Lee}, title = {A study of user data integrity during acquisition of Android devices}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S3--S11}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.001}, doi = {10.1016/J.DIIN.2013.06.001}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SonLKJLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StewartU13, author = {Jon Stewart and Joel Uckelman}, title = {Unicode search of dirty data, or: How {I} learned to stop worrying and love Unicode Technical Standard {\#}18}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S116--S125}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.013}, doi = {10.1016/J.DIIN.2013.06.013}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/StewartU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StuttgenC13, author = {Johannes St{\"{u}}ttgen and Michael Cohen}, title = {Anti-forensic resilient memory acquisition}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S105--S115}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.012}, doi = {10.1016/J.DIIN.2013.06.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StuttgenC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VomelS13, author = {Stefan V{\"{o}}mel and Johannes St{\"{u}}ttgen}, title = {An evaluation platform for forensic memory acquisition software}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S30--S40}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.004}, doi = {10.1016/J.DIIN.2013.06.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/VomelS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WhiteSF13, author = {Andrew White and Bradley L. Schatz and Ernest Foo}, title = {Integrity verification of user space code}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S59--S68}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.007}, doi = {10.1016/J.DIIN.2013.06.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WhiteSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Brown12, author = {Ralf D. Brown}, title = {Finding and identifying text in 900+ languages}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S34--S43}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.004}, doi = {10.1016/J.DIIN.2012.05.004}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Brown12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DengX0J12, author = {Zhui Deng and Dongyan Xu and Xiangyu Zhang and Xuxian Jiang}, title = {IntroLib: Efficient and transparent library call introspection for malware forensics}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S13--S23}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.013}, doi = {10.1016/J.DIIN.2012.05.013}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DengX0J12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DykstraS12, author = {Josiah Dykstra and Alan T. Sherman}, title = {Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S90--S98}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.001}, doi = {10.1016/J.DIIN.2012.05.001}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DykstraS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fairbanks12, author = {Kevin D. Fairbanks}, title = {An analysis of Ext4 for digital forensics}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S118--S130}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.010}, doi = {10.1016/J.DIIN.2012.05.010}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fairbanks12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FitzgeraldMMZ12, author = {Simran Fitzgerald and George Mathews and Colin Morris and Oles Zhulyn}, title = {Using {NLP} techniques for file fragment classification}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S44--S49}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.008}, doi = {10.1016/J.DIIN.2012.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FitzgeraldMMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel12a, author = {Simson L. Garfinkel}, title = {Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S80--S89}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.002}, doi = {10.1016/J.DIIN.2012.05.002}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Garfinkel12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelNY12, author = {Simson L. Garfinkel and Alex J. Nelson and Joel Young}, title = {A general strategy for differential forensic analysis}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S50--S59}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.003}, doi = {10.1016/J.DIIN.2012.05.003}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GarfinkelNY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HandLGT12, author = {Scott Hand and Zhiqiang Lin and Guofei Gu and Bhavani Thuraisingham}, title = {Bin-Carver: Automatic recovery of binary executable files}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S108--S117}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.014}, doi = {10.1016/J.DIIN.2012.05.014}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HandLGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HargreavesP12, author = {Christopher James Hargreaves and Jonathan Patterson}, title = {An automated timeline reconstruction approach for digital forensic investigations}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S69--S79}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.006}, doi = {10.1016/J.DIIN.2012.05.006}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HargreavesP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JonesPW12, author = {Brian Jones and Syd Pleno and Michael Wilkinson}, title = {The use of random sampling in investigations involving child abuse material}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S99--S107}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.011}, doi = {10.1016/J.DIIN.2012.05.011}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JonesPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MutawaBM12, author = {Noora Al Mutawa and Ibrahim M. Baggili and Andrew Marrington}, title = {Forensic analysis of social networking applications on mobile devices}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S24--S33}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.007}, doi = {10.1016/J.DIIN.2012.05.007}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MutawaBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevQ12, author = {Vassil Roussev and Candice Quates}, title = {Content triage with similarity digests: The {M57} case study}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S60--S68}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.012}, doi = {10.1016/J.DIIN.2012.05.012}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Rowe12, author = {Neil C. Rowe}, title = {Testing the National Software Reference Library}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S131--S138}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.009}, doi = {10.1016/J.DIIN.2012.05.009}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Rowe12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WhiteSF12, author = {Andrew White and Bradley L. Schatz and Ernest Foo}, title = {Surveying the user space through user allocations}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S3--S12}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.005}, doi = {10.1016/J.DIIN.2012.05.005}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WhiteSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-WehaibiSG11, author = {Khawla Al{-}Wehaibi and Tim Storer and William Bradley Glisson}, title = {Augmenting password recovery with online profiling}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S25--S33}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.004}, doi = {10.1016/J.DIIN.2011.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-WehaibiSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeverlyGC11, author = {Robert Beverly and Simson L. Garfinkel and Greg Cardwell}, title = {Forensic carving of network packets and associated data structures}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S78--S89}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.010}, doi = {10.1016/J.DIIN.2011.05.010}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BeverlyGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Brown11, author = {Ralf D. Brown}, title = {Reconstructing corrupt DEFLATEd files}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S125--S131}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.015}, doi = {10.1016/J.DIIN.2011.05.015}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Brown11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CohenBC11, author = {Michael I. Cohen and Darren Bilby and Germano Caronni}, title = {Distributed forensics and incident response in the enterprise}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S101--S110}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.012}, doi = {10.1016/J.DIIN.2011.05.012}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CohenBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Grier11, author = {Jonathan Grier}, title = {Detecting data theft using stochastic forensics}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S71--S77}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.009}, doi = {10.1016/J.DIIN.2011.05.009}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Grier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/InoueAJ11, author = {Hajime Inoue and Frank Adelstein and Robert A. Joyce}, title = {Visualization in testing a volatile memory forensic tool}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S42--S51}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.006}, doi = {10.1016/J.DIIN.2011.05.006}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/InoueAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KingV11, author = {Christopher King and Timothy Vidas}, title = {Empirical analysis of solid state disk data retention when used with contemporary operating systems}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S111--S117}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.013}, doi = {10.1016/J.DIIN.2011.05.013}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KingV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MarringtonBMC11, author = {Andrew Marrington and Ibrahim M. Baggili and George M. Mohay and Andrew J. Clark}, title = {{CAT} Detect (Computer Activity Timeline Detection): {A} tool for detecting inconsistency in computer activity timelines}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S52--S61}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.007}, doi = {10.1016/J.DIIN.2011.05.007}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MarringtonBMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OhLL11, author = {Junghoon Oh and SeungBong Lee and Sangjin Lee}, title = {Advanced evidence collection and analysis of web browser activity}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S62--S70}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.008}, doi = {10.1016/J.DIIN.2011.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OhLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OkolicaP11, author = {James S. Okolica and Gilbert L. Peterson}, title = {Extracting the windows clipboard from physical memory}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S118--S124}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.014}, doi = {10.1016/J.DIIN.2011.05.014}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OkolicaP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Roussev11, author = {Vassil Roussev}, title = {An evaluation of forensic similarity hashes}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S34--S41}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.005}, doi = {10.1016/J.DIIN.2011.05.005}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Roussev11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShebaroC11, author = {Bilal Shebaro and Jedidiah R. Crandall}, title = {Privacy-preserving network flow recording}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S90--S100}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.011}, doi = {10.1016/J.DIIN.2011.05.011}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShebaroC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShieldsFM11, author = {Clay Shields and Ophir Frieder and Mark Maloof}, title = {A system for the proactive, continuous, and efficient collection of digital forensic evidence}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S3--S13}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.002}, doi = {10.1016/J.DIIN.2011.05.002}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShieldsFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Venema11, author = {Wietse Z. Venema}, title = {Eleventh Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S1--S2}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.001}, doi = {10.1016/J.DIIN.2011.05.001}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Venema11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VidasZC11, author = {Timothy Vidas and Chengye Zhang and Nicolas Christin}, title = {Toward a general collection methodology for Android devices}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S14--S24}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.003}, doi = {10.1016/J.DIIN.2011.05.003}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/VidasZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Axelsson10, author = {Stefan Axelsson}, title = {The Normalised Compression Distance as a file fragment classifier}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S24--S31}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.004}, doi = {10.1016/J.DIIN.2010.05.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Axelsson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BangYL10, author = {Jewan Bang and Byeongyeong Yoo and Sangjin Lee}, title = {Secure {USB} bypassing tool}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S114--S120}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.014}, doi = {10.1016/J.DIIN.2010.05.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BangYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Carrier10, author = {Brian D. Carrier}, title = {Different interpretations of {ISO9660} file systems}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S129--S134}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.016}, doi = {10.1016/J.DIIN.2010.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Carrier10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMNR10, author = {Andrew Case and Lodovico Marziale and Cris Neckar and Golden G. Richard III}, title = {Treasure and tragedy in \emph{kmem{\_}cache} mining for live forensics investigation}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S41--S47}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.006}, doi = {10.1016/J.DIIN.2010.05.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMR10, author = {Andrew Case and Lodovico Marziale and Golden G. Richard III}, title = {Dynamic recreation of kernel data structures for live forensics}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S32--S40}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.005}, doi = {10.1016/J.DIIN.2010.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CohenS10, author = {Michael Cohen and Bradley L. Schatz}, title = {Hash based disk imaging using {AFF4}}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S121--S128}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.015}, doi = {10.1016/J.DIIN.2010.05.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CohenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ContiBSSRSLP10, author = {Gregory J. Conti and Sergey Bratus and Anna Shubina and Benjamin Sangster and Roy Ragsdale and Matthew Supan and Andrew Lichtenberg and Robert Perez{-}Alemany}, title = {Automated mapping of large binary objects using primitive fragment type classification}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S3--S12}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.002}, doi = {10.1016/J.DIIN.2010.05.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ContiBSSRSLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DistefanoMP10, author = {Alessandro Distefano and Gianluigi Me and Francesco Pace}, title = {Android anti-forensics through a local paradigm}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S83--S94}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.011}, doi = {10.1016/J.DIIN.2010.05.011}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DistefanoMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel10, author = {Simson L. Garfinkel}, title = {Digital forensics research: The next 10 years}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S64--S73}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.009}, doi = {10.1016/J.DIIN.2010.05.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Garfinkel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelNWR10, author = {Simson L. Garfinkel and Alex J. Nelson and Douglas White and Vassil Roussev}, title = {Using purpose-built functions and block hashes to enable small block and sub-file forensics}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S13--S23}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.003}, doi = {10.1016/J.DIIN.2010.05.003}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GarfinkelNWR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LiberatoreEKLS10, author = {Marc Liberatore and Robert Erdely and Thomas Kerle and Brian Neil Levine and Clay Shields}, title = {Forensic investigation of peer-to-peer file sharing networks}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S95--S103}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.012}, doi = {10.1016/J.DIIN.2010.05.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LiberatoreEKLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lyle10, author = {James R. Lyle}, title = {If \emph{error rate} is such a simple concept, why don't {I} have one for my forensic tool yet?}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S135--S139}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.017}, doi = {10.1016/J.DIIN.2010.05.017}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Lyle10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OkolicaP10, author = {James S. Okolica and Gilbert L. Peterson}, title = {Windows operating systems agnostic memory analysis}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S48--S56}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.007}, doi = {10.1016/J.DIIN.2010.05.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OkolicaP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShebaroPC10, author = {Bilal Shebaro and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Jedidiah R. Crandall}, title = {Leaving timing-channel fingerprints in hidden service log files}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S104--S113}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.013}, doi = {10.1016/J.DIIN.2010.05.013}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShebaroPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StevensC10, author = {Richard M. Stevens and Eoghan Casey}, title = {Extracting Windows command line details from physical memory}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S57--S63}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.008}, doi = {10.1016/J.DIIN.2010.05.008}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StevensC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThingNC10, author = {Vrizlynn L. L. Thing and Kian{-}Yong Ng and Ee{-}Chien Chang}, title = {Live memory forensics of mobile phones}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S74--S82}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.010}, doi = {10.1016/J.DIIN.2010.05.010}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThingNC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Ayers09, author = {Daniel Ayers}, title = {A second generation computer forensic analysis system}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S34--S42}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.013}, doi = {10.1016/J.DIIN.2009.06.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Ayers09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeebeSS09, author = {Nicole Lang Beebe and Sonia D. Stacy and Dane Stuckey}, title = {Digital forensic implications of {ZFS}}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S99--S107}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.006}, doi = {10.1016/J.DIIN.2009.06.006}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BeebeSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CohenGS09, author = {Michael Cohen and Simson L. Garfinkel and Bradley L. Schatz}, title = {Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S57--S68}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.010}, doi = {10.1016/J.DIIN.2009.06.010}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CohenGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelFRD09, author = {Simson L. Garfinkel and Paul F. Farrell Jr. and Vassil Roussev and George W. Dinolt}, title = {Bringing science to digital forensics with standardized forensic corpora}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S2--S11}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.016}, doi = {10.1016/J.DIIN.2009.06.016}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GarfinkelFRD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuoSB09, author = {Yinghua Guo and Jill Slay and Jason Beckett}, title = {Validation and verification of computer forensic software tools - Searching Function}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S12--S22}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.015}, doi = {10.1016/J.DIIN.2009.06.015}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GuoSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HejaziTD09, author = {Seyed Mahmood Hejazi and Chamseddine Talhi and Mourad Debbabi}, title = {Extraction of forensically sensitive information from windows physical memory}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S121--S131}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.003}, doi = {10.1016/J.DIIN.2009.06.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HejaziTD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KahvedzicK09, author = {Damir Kahvedzic and M. Tahar Kechadi}, title = {{DIALOG:} {A} framework for modeling, analysis and reuse of digital forensic knowledge}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S23--S33}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.014}, doi = {10.1016/J.DIIN.2009.06.014}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KahvedzicK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimPCLB09, author = {Kibom Kim and Sangseo Park and Taejoo Chang and Cheolwon Lee and Sungjai Baek}, title = {Lessons learned from the construction of a Korean software reference data set for digital forensics}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S108--S113}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.005}, doi = {10.1016/J.DIIN.2009.06.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KimPCLB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LevineL09, author = {Brian Neil Levine and Marc Liberatore}, title = {{DEX:} Digital evidence provenance supporting reproducibility and comparison}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S48--S56}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.011}, doi = {10.1016/J.DIIN.2009.06.011}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LevineL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Maartmann-MoeTA09, author = {Carsten Maartmann{-}Moe and Steffen E. Thorkildsen and Andr{\'{e}} {\AA}rnes}, title = {The persistence of memory: Forensic identification and extraction of cryptographic keys}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S132--S140}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.002}, doi = {10.1016/J.DIIN.2009.06.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Maartmann-MoeTA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OlssonB09, author = {Jens Olsson and Martin Boldt}, title = {Computer forensic timeline visualization tool}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S78--S87}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.008}, doi = {10.1016/J.DIIN.2009.06.008}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OlssonB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SencarM09, author = {Husrev T. Sencar and Nasir D. Memon}, title = {Identification and recovery of {JPEG} files with missing fragments}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S88--S98}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.007}, doi = {10.1016/J.DIIN.2009.06.007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SencarM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThingY09, author = {Vrizlynn L. L. Thing and Hwei{-}Ming Ying}, title = {A novel time-memory trade-off method for password recovery}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S114--S120}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.004}, doi = {10.1016/J.DIIN.2009.06.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThingY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WatkinsMLH09, author = {Kathryn Watkins and Mike McWhorte and Jeff Long and Bill Hill}, title = {Teleporter: An analytically and forensically sound duplicate transfer system}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S43--S47}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.012}, doi = {10.1016/J.DIIN.2009.06.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WatkinsMLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhuGJ09, author = {Yuandong Zhu and Pavel Gladyshev and Joshua James}, title = {Using shellbag information to reconstruct user activities}, journal = {Digit. Investig.}, volume = {6}, number = {Supplement}, pages = {S69--S77}, year = {2009}, url = {https://doi.org/10.1016/j.diin.2009.06.009}, doi = {10.1016/J.DIIN.2009.06.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZhuGJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaarAB08, author = {Ruud B. van Baar and Wouter Alink and Alex van Ballegooij}, title = {Forensic memory analysis: Files mapped in memory}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S52--S57}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.014}, doi = {10.1016/J.DIIN.2008.05.014}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaarAB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BruecknerGAW08, author = {Stephen Brueckner and David Guaspari and Frank Adelstein and Joseph Weeks}, title = {Automated computer forensics training in a virtualized environment}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S105--S111}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.009}, doi = {10.1016/J.DIIN.2008.05.009}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BruecknerGAW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BurghardtF08, author = {Aaron Burghardt and Adam J. Feldman}, title = {Using the {HFS+} journal for deleted file recovery}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S76--S82}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.013}, doi = {10.1016/J.DIIN.2008.05.013}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BurghardtF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CalhounC08, author = {William C. Calhoun and Drue Coles}, title = {Predicting the types of file fragments}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S14--S20}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.005}, doi = {10.1016/J.DIIN.2008.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CalhounC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseCMRR08, author = {Andrew Case and Andrew Cristina and Lodovico Marziale and Golden G. Richard III and Vassil Roussev}, title = {{FACE:} Automated digital evidence discovery and correlation}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S65--S75}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.008}, doi = {10.1016/J.DIIN.2008.05.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseCMRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Cohen08, author = {Michael I. Cohen}, title = {PyFlag - An advanced network forensic framework}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S112--S120}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.016}, doi = {10.1016/J.DIIN.2008.05.016}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Cohen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DistefanoM08, author = {Alessandro Distefano and Gianluigi Me}, title = {An overall assessment of Mobile Internal Acquisition Tool}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S121--S127}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.010}, doi = {10.1016/J.DIIN.2008.05.010}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DistefanoM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Dolan-Gavitt08, author = {Brendan Dolan{-}Gavitt}, title = {Forensic analysis of the Windows registry in memory}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S26--S32}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.003}, doi = {10.1016/J.DIIN.2008.05.003}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Dolan-Gavitt08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IqbalHFD08, author = {Farkhund Iqbal and Rachid Hadjidj and Benjamin C. M. Fung and Mourad Debbabi}, title = {A novel approach of mining write-prints for authorship attribution in e-mail forensics}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S42--S51}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.001}, doi = {10.1016/J.DIIN.2008.05.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IqbalHFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JoycePA08, author = {Robert A. Joyce and Judson Powers and Frank Adelstein}, title = {{MEGA:} {A} tool for Mac {OS} {X} operating system and application forensics}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S83--S90}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.011}, doi = {10.1016/J.DIIN.2008.05.011}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JoycePA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Kornblum08, author = {Jesse D. Kornblum}, title = {Using {JPEG} quantization tables to identify imagery processed by software}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S21--S25}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.004}, doi = {10.1016/J.DIIN.2008.05.004}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Kornblum08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeUH08, author = {Jooyoung Lee and Sung{-}Kyong Un and Dowon Hong}, title = {High-speed search using Tarari content processor in digital forensics}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S91--S95}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.006}, doi = {10.1016/J.DIIN.2008.05.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeeUH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LewthwaiteS08, author = {Joseph Lewthwaite and Victoria Smith}, title = {Limewire examinations}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S96--S104}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.017}, doi = {10.1016/J.DIIN.2008.05.017}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LewthwaiteS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Morgan08, author = {Timothy D. Morgan}, title = {Recovering deleted data from the Windows registry}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S33--S41}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.002}, doi = {10.1016/J.DIIN.2008.05.002}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Morgan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PalSM08, author = {Anandabrata Pal and Husrev T. Sencar and Nasir D. Memon}, title = {Detecting file fragmentation point using sequential hypothesis testing}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S2--S13}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.015}, doi = {10.1016/J.DIIN.2008.05.015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PalSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schuster08, author = {Andreas Schuster}, title = {The impact of Microsoft Windows pool allocation strategies on memory forensics}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S58--S64}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.007}, doi = {10.1016/J.DIIN.2008.05.007}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schuster08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThonnardD08, author = {Olivier Thonnard and Marc Dacier}, title = {A framework for attack patterns' discovery in honeynet data}, journal = {Digit. Investig.}, volume = {5}, number = {Supplement}, pages = {S128--S139}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.05.012}, doi = {10.1016/J.DIIN.2008.05.012}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThonnardD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AdelsteinJ07, author = {Frank Adelstein and Robert A. Joyce}, title = {File Marshal: Automatic extraction of peer-to-peer data}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {43--48}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.016}, doi = {10.1016/J.DIIN.2007.06.016}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AdelsteinJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArastehD07, author = {Ali Reza Arasteh and Mourad Debbabi}, title = {Forensic memory analysis: From stack and code to execution history}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {114--125}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.010}, doi = {10.1016/J.DIIN.2007.06.010}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ArastehD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArastehDSS07, author = {Ali Reza Arasteh and Mourad Debbabi and Assaad Sakha and Mohamed Mostafa Saleh}, title = {Analyzing multiple logs for forensic evidence}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {82--91}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.013}, doi = {10.1016/J.DIIN.2007.06.013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ArastehDSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BarikGSMM07, author = {Mridul Sankar Barik and Gaurav Gupta and Shubhro Sinha and Alok Mishra and Chandan Mazumdar}, title = {An efficient technique for enhancing forensic capabilities of Ext2 file system}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {55--61}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.007}, doi = {10.1016/J.DIIN.2007.06.007}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BarikGSMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeebeC07, author = {Nicole Lang Beebe and Jan Guynes Clark}, title = {Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {49--54}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.005}, doi = {10.1016/J.DIIN.2007.06.005}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BeebeC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BuchholzT07, author = {Florian P. Buchholz and Brett C. Tjaden}, title = {A brief study of time}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {31--42}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.004}, doi = {10.1016/J.DIIN.2007.06.004}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BuchholzT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Dolan-Gavitt07, author = {Brendan Dolan{-}Gavitt}, title = {The {VAD} tree: {A} process-eye view of physical memory}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {62--64}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.008}, doi = {10.1016/J.DIIN.2007.06.008}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Dolan-Gavitt07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel07, author = {Simson L. Garfinkel}, title = {Carving contiguous and fragmented files with fast object validation}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {2--12}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.017}, doi = {10.1016/J.DIIN.2007.06.017}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Garfinkel07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LyleW07, author = {James R. Lyle and Mark Wozar}, title = {Issues with imaging drives containing faulty sectors}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {13--15}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.002}, doi = {10.1016/J.DIIN.2007.06.002}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LyleW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MarzialeRR07, author = {Lodovico Marziale and Golden G. Richard III and Vassil Roussev}, title = {Massive threading: Using GPUs to increase the performance of digital forensics tools}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {73--81}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.014}, doi = {10.1016/J.DIIN.2007.06.014}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MarzialeRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MastersT07, author = {Gerry Masters and Philip Turner}, title = {Forensic data recovery and examination of magnetic swipe card cloning devices}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {16--22}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.018}, doi = {10.1016/J.DIIN.2007.06.018}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MastersT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Murphey07, author = {Rich Murphey}, title = {Automated Windows event log forensics}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {92--100}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.012}, doi = {10.1016/J.DIIN.2007.06.012}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Murphey07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevRM07, author = {Vassil Roussev and Golden G. Richard III and Lodovico Marziale}, title = {Multi-resolution similarity hashing}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {105--113}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.011}, doi = {10.1016/J.DIIN.2007.06.011}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevRM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schatz07, author = {Bradley L. Schatz}, title = {BodySnatcher: Towards reliable volatile memory acquisition by software}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {126--134}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.009}, doi = {10.1016/J.DIIN.2007.06.009}, timestamp = {Sat, 01 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schatz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schuster07, author = {Andreas Schuster}, title = {Introducing the Microsoft Vista event log file format}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {65--72}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.015}, doi = {10.1016/J.DIIN.2007.06.015}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schuster07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SeifertSWKE07, author = {Christian Seifert and Ramon Steenson and Ian Welch and Peter Komisarczuk and Barbara Endicott{-}Popovsky}, title = {Capture - {A} behavioral analysis tool for applications and documents}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {23--30}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.003}, doi = {10.1016/J.DIIN.2007.06.003}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SeifertSWKE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TaylorEF07, author = {Carol A. Taylor and Barbara Endicott{-}Popovsky and Deborah A. Frincke}, title = {Specifying digital forensics: {A} forensics policy approach}, journal = {Digit. Investig.}, volume = {4}, number = {Supplement}, pages = {101--104}, year = {2007}, url = {https://doi.org/10.1016/j.diin.2007.06.006}, doi = {10.1016/J.DIIN.2007.06.006}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TaylorEF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Adelstein06, author = {Frank Adelstein}, title = {The proceedings of the Sixth Annual Digital Forensic Research Workshop {(DFRWS} '06)}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {1--2}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.017}, doi = {10.1016/J.DIIN.2006.06.017}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Adelstein06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlinkBBV06, author = {Wouter Alink and R. A. F. Bhoedjang and Peter A. Boncz and Arjen P. de Vries}, title = {{XIRAF} - XML-based indexing and querying for digital forensics}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {50--58}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.016}, doi = {10.1016/J.DIIN.2006.06.016}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AlinkBBV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BrinsonRR06, author = {Ashley Brinson and Abigail Robinson and Marcus K. Rogers}, title = {A cyber forensics ontology: Creating a new approach to studying cyber forensics}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {37--43}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.008}, doi = {10.1016/J.DIIN.2006.06.008}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BrinsonRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CarrierS06, author = {Brian D. Carrier and Eugene H. Spafford}, title = {Categories of digital investigation analysis techniques based on the computer history model}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {121--130}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.011}, doi = {10.1016/J.DIIN.2006.06.011}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CarrierS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel06, author = {Simson L. Garfinkel}, title = {Forensic feature extraction and cross-drive analysis}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {71--81}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.007}, doi = {10.1016/J.DIIN.2006.06.007}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Garfinkel06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Harris06, author = {Ryan Harris}, title = {Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {44--49}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.005}, doi = {10.1016/J.DIIN.2006.06.005}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Harris06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Ieong06, author = {Ricci S. C. Ieong}, title = {{FORZA} - Digital forensics investigation framework that incorporate legal issues}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {29--36}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.004}, doi = {10.1016/J.DIIN.2006.06.004}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Ieong06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JeyaramanA06, author = {Sundararaman Jeyaraman and Mikhail J. Atallah}, title = {An empirical study of automatic event reconstruction systems}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {108--115}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.013}, doi = {10.1016/J.DIIN.2006.06.013}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JeyaramanA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhannaMMACAD06, author = {Nitin Khanna and Aravind K. Mikkilineni and Anthony F. Martone and Gazi N. Ali and George T.{-}C. Chiu and Jan P. Allebach and Edward J. Delp}, title = {A survey of forensic characterization methods for physical devices}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {17--28}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.014}, doi = {10.1016/J.DIIN.2006.06.014}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KhannaMMACAD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Kornblum06, author = {Jesse D. Kornblum}, title = {Identifying almost identical files using context triggered piecewise hashing}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {91--97}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.015}, doi = {10.1016/J.DIIN.2006.06.015}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Kornblum06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeSG06, author = {Sangwon Lee and David A. Shamma and Bruce Gooch}, title = {Detecting false captioning using common-sense reasoning}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {65--70}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.006}, doi = {10.1016/J.DIIN.2006.06.006}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeeSG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lyle06, author = {James R. Lyle}, title = {A strategy for testing hardware write block devices}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {3--9}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.001}, doi = {10.1016/J.DIIN.2006.06.001}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Lyle06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RogersST06, author = {Marcus K. Rogers and Kate Seigfried and Kirti Tidke}, title = {Self-reported computer criminal behavior: {A} psychological analysis}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {116--120}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.002}, doi = {10.1016/J.DIIN.2006.06.002}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RogersST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevCBR06, author = {Vassil Roussev and Yixin Chen and Timothy Bourg and Golden G. Richard III}, title = {\emph{md5bloom}: Forensic filesystem hashing revisited}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {82--90}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.012}, doi = {10.1016/J.DIIN.2006.06.012}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevCBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchatzMC06, author = {Bradley L. Schatz and George M. Mohay and Andrew J. Clark}, title = {A correlation method for establishing provenance of timestamps in digital evidence}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {98--107}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.009}, doi = {10.1016/J.DIIN.2006.06.009}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SchatzMC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schuster06, author = {Andreas Schuster}, title = {Searching for processes and threads in Microsoft Windows memory dumps}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {10--16}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.010}, doi = {10.1016/J.DIIN.2006.06.010}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schuster06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Turner06, author = {Philip Turner}, title = {Selective and intelligent imaging using digital evidence bags}, journal = {Digit. Investig.}, volume = {3}, number = {Supplement}, pages = {59--64}, year = {2006}, url = {https://doi.org/10.1016/j.diin.2006.06.003}, doi = {10.1016/J.DIIN.2006.06.003}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Turner06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/AdelsteinGR05, author = {Frank Adelstein and Yun Gao and Golden G. Richard III}, title = {Automatically Creating Realistic Targets for Digital Forensics Investigation}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/adelstein\_falcon.pdf}, timestamp = {Fri, 17 Mar 2006 12:41:42 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/AdelsteinGR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/BogenD05, author = {A. Chris Bogen and David A. Dampier}, title = {Preparing for Large-Scale Investigations with Case Domain Modeling}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/bogen\_domainmodel.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/BogenD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/BuchholzF05, author = {Florian P. Buchholz and Courtney Falk}, title = {Design and Implementation of Zeitline: a Forensic Timeline Editor}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/buchholz\_zeitline.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/BuchholzF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/CarrierS05, author = {Brian D. Carrier and Eugene H. Spafford}, title = {Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/carrier\_targetdefn.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/CarrierS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/EcksteinJ05, author = {Knut Eckstein and Marko Jahnke}, title = {Data Hiding in Journaling File Systems}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/eckstein\_journal.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/EcksteinJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/Geiger05, author = {Matthew Geiger}, title = {Evaluating Commercial Counter-Forensic Tools}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/geiger\_couterforensics.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/Geiger05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/GillamR05, author = {William Blair Gillam and Marc Rogers}, title = {File Hound: {A} Forensics Tool for First Responders}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/gillam\_filehound.pdf}, timestamp = {Mon, 21 Dec 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/GillamR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/KenneallyB05, author = {Erin E. Kenneally and Christopher L. T. Brown}, title = {Risk Sensitive Digital Evidence Collection}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/KenneallyB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/PanB05, author = {Lei Pan and Lynn Margaret Batten}, title = {Reproducibility of Digital Evidence in Forensic Investigations}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/pan\_reproducibility.pdf}, timestamp = {Tue, 08 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfrws/PanB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/RichardR05, author = {Golden G. Richard III and Vassil Roussev}, title = {Scalpel: {A} Frugal, High Performance File Carver}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/richard\_scalpel.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/RichardR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/SarmoriaC05, author = {Christian G. Sarmoria and Steve J. Chapin}, title = {Monitoring Access to Shared Memory-Mapped Files}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/sarmoria\_memorymap.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/SarmoriaC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/Turner05, author = {Philip Turner}, title = {Unification of Digital Evidence from Disparate Sources (Digital Evidence Bags)}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/turner\_evidencebags.pdf}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/Turner05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dfrws/WangD05, author = {Wei Wang and Thomas E. Daniels}, title = {Network Forensics Analysis with Evidence Graphs}, booktitle = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, url = {http://www.dfrws.org/2005/proceedings/wang\_evidencegraphs.pdf}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dfrws/WangD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dfrws/2005, title = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005}, year = {2005}, timestamp = {Fri, 17 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dfrws/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.