Search dblp for Publications

export results for "stream:journals/jdfp:"

 download as .bib file

@article{DBLP:journals/jdfp/BogenDVRAC10,
  author       = {Alfred C. Bogen and
                  David A. Dampier and
                  Rayford B. Vaughn and
                  Donna S. Reese and
                  Edward B. Allen and
                  Jeffrey C. Carver},
  title        = {Structured Forensics Examination Planning with Domain Modeling: {A}
                  Report of Three Experiment Trials},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {23--32},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903376896},
  doi          = {10.1080/15567280903376896},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BogenDVRAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BrungsJ10,
  author       = {Angela Brungs and
                  Rodger Jamieson},
  title        = {Identification of Legal Issues for Computer Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {140--149},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536740},
  doi          = {10.1080/15567281.2010.536740},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BrungsJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/EtgesS10,
  author       = {Rafael Etges and
                  Emma Sutcliffe},
  title        = {An Overview of Transnational Organized Cyber Crime},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {106--114},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536731},
  doi          = {10.1080/15567281.2010.536731},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/EtgesS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Freeman10,
  author       = {Edward H. Freeman},
  title        = {Computer Printouts as Legal Evidence},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {98--105},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536730},
  doi          = {10.1080/15567281.2010.536730},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Freeman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Geers10,
  author       = {Kenneth Geers},
  title        = {The Cyber Threat to National Critical Infrastructures: Beyond Theory},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {124--130},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536735},
  doi          = {10.1080/15567281.2010.536735},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Geers10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GloeB10,
  author       = {Thomas Gloe and
                  Rainer B{\"{o}}hme},
  title        = {The Dresden Image Database for Benchmarking Digital Image Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {150--159},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.531500},
  doi          = {10.1080/15567281.2010.531500},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GloeB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GogolinJ10,
  author       = {Greg Gogolin and
                  James Jones},
  title        = {Law Enforcement's Ability to Deal with Digital Crime and the Implications
                  for Business},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {131--139},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536737},
  doi          = {10.1080/15567281.2010.536737},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GogolinJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GuoS10,
  author       = {Yinghua Guo and
                  Jill Slay},
  title        = {Testing Forensic Copy Function of Computer Forensics Investigation
                  Tools},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {46--61},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903521392},
  doi          = {10.1080/15567280903521392},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GuoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kessler10,
  author       = {Gary C. Kessler},
  title        = {\emph{Building a Digital Forensic Laboratory: Establishing and Managing
                  a Successful Facility}. By A. Jones and C. Valli},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {62--63},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903463801},
  doi          = {10.1080/15567280903463801},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kessler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kessler10a,
  author       = {Gary C. Kessler},
  title        = {\emph{Windows Forensic Analysis {DVD} Toolkit}, 2nd edition. By Harlan
                  Carvey},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {64--66},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903463819},
  doi          = {10.1080/15567280903463819},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kessler10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/KesslerH10,
  author       = {Gary C. Kessler and
                  Don A. Haggerty},
  title        = {An Online Graduate Program in Digital Investigation Management: Pedagogy
                  and Overview},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {11--22},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903357771},
  doi          = {10.1080/15567280903357771},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/KesslerH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/LiebrockPH10,
  author       = {Lorie M. Liebrock and
                  Brajendra Panda and
                  Robert L. Hutchinson},
  title        = {Special Issue Guest Editorial: Computer Forensics Track of Symposium
                  on Applied Computing},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {4},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903177856},
  doi          = {10.1080/15567280903177856},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/LiebrockPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Matusitz10,
  author       = {Jonathan Matusitz},
  title        = {Cyberterrorism: Postmodern State of Chaos},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {115--123},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536733},
  doi          = {10.1080/15567281.2010.536733},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Matusitz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/MohamadPHD10,
  author       = {Kamaruddin Malik Mohamad and
                  Ahmed Patel and
                  Tutut Herawan and
                  Mustafa Mat Deris},
  title        = {myKarve: {JPEG} Image and Thumbnail Carver},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {74--97},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.531607},
  doi          = {10.1080/15567281.2010.531607},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/MohamadPHD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt10,
  author       = {Mark Pollitt},
  title        = {Forensic Twitter},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {1--3},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903171024},
  doi          = {10.1080/15567280903171024},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Riley10,
  author       = {John H. Riley Jr.},
  title        = {Recycling in Vista{\textregistered}},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {5--10},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903357763},
  doi          = {10.1080/15567280903357763},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Riley10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Suffern10,
  author       = {Lawrence Suffern},
  title        = {A Study of Current Trends in Database Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {67--73},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.500646},
  doi          = {10.1080/15567281.2010.500646},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Suffern10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/ZwanC10,
  author       = {Pawel Zwan and
                  Andrzej Czyzewski},
  title        = {Verification of the Parameterization Methods in the Context of Automatic
                  Recognition of Sounds Related to Danger},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {33--45},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903493881},
  doi          = {10.1080/15567280903493881},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/ZwanC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BabooB08,
  author       = {S. Santhosh Baboo and
                  P. Vinod Bhattathiripad},
  title        = {Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly
                  Techniques},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {4},
  pages        = {175--182},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280903140938},
  doi          = {10.1080/15567280903140938},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BabooB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/DandassNT08,
  author       = {Yoginder S. Dandass and
                  Nathan Joseph Necaise and
                  Sherry Reede Thomas},
  title        = {An Empirical Analysis of Disk Sector Hashes for Data Carving},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {2},
  pages        = {95--104},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802050436},
  doi          = {10.1080/15567280802050436},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/DandassNT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Desoky08,
  author       = {Abdelrahman Desoky},
  title        = {Nostega: {A} Novel Noiseless Steganography Paradigm},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {132--139},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802558818},
  doi          = {10.1080/15567280802558818},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Desoky08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/DesokyY08,
  author       = {Abdelrahman Desoky and
                  Mohamed F. Younis},
  title        = {Graphstega: Graph Steganography Methodology},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {1},
  pages        = {27--36},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280701797087},
  doi          = {10.1080/15567280701797087},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/DesokyY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Donato08,
  author       = {Lucas Donato},
  title        = {An Introduction to How Criminal Profiling Could Be Used as a Support
                  for Computer Hacking Investigations},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {4},
  pages        = {183--195},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280903140946},
  doi          = {10.1080/15567280903140946},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Donato08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Ferguson08,
  author       = {David Glen Ferguson},
  title        = {Redefining File Slack in Microsoft{\textregistered} {NTFS}},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {140--156},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802587965},
  doi          = {10.1080/15567280802587965},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Ferguson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/HejaziDT08,
  author       = {Seyed Mahmood Hejazi and
                  Mourad Debbabi and
                  Chamseddine Talhi},
  title        = {Automated Windows Memory File Extraction for Cyber Forensics Investigation},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {117--131},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802552829},
  doi          = {10.1080/15567280802552829},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/HejaziDT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/HuebnerB08,
  author       = {Ewa Huebner and
                  Derek Bem},
  title        = {Forensic Extraction of EFS-Encrypted Files in Live System Investigation},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {1},
  pages        = {1--12},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280701721905},
  doi          = {10.1080/15567280701721905},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/HuebnerB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Inch08,
  author       = {Scott Inch},
  title        = {A Simple Image Hiding Technique: What You May Be Missing},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {2},
  pages        = {83--94},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802047150},
  doi          = {10.1080/15567280802047150},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Inch08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kaplan08,
  author       = {Ronald E. Kaplan},
  title        = {Computer Forensics - What Is It Good For?},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {2},
  pages        = {57--61},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280801958464},
  doi          = {10.1080/15567280801958464},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kaplan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kessler08,
  author       = {Gary C. Kessler},
  title        = {On Teaching {TCP/IP} Protocol Analysis to Computer Forensics Examiners},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {1},
  pages        = {43--53},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280701805690},
  doi          = {10.1080/15567280701805690},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kessler08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kornblum08,
  author       = {Jesse D. Kornblum},
  title        = {Auditing Hash Sets: Lessons Learned from \emph{Jurassic Park}},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {108--112},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802385477},
  doi          = {10.1080/15567280802385477},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kornblum08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Liles08,
  author       = {Samuel Liles},
  title        = {Software Forensics. By Robert Slade},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {159--160},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802385493},
  doi          = {10.1080/15567280802385493},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Liles08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Limongelli08,
  author       = {Victor Limongelli},
  title        = {Digital Evidence: Findings of Reliability, Not Presumptions},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {1},
  pages        = {13--16},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280701721913},
  doi          = {10.1080/15567280701721913},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Limongelli08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/LiuAD08,
  author       = {Wayne Liu and
                  Sudhir Aggarwal and
                  Zhenhai Duan},
  title        = {Incorporating Accountability into Internet E-mail},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {4},
  pages        = {209--220},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280903140961},
  doi          = {10.1080/15567280903140961},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/LiuAD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/ManesJBHDH08,
  author       = {Gavin Wylie Manes and
                  James Johnson and
                  Alex Barclay and
                  Michael Harvey and
                  Elizabeth Downing and
                  John Hale},
  title        = {Issues and Techniques for Redacting {PDF} Files},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {113--116},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802385485},
  doi          = {10.1080/15567280802385485},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/ManesJBHDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Matusitz08,
  author       = {Jonathan Matusitz},
  title        = {Postmodernism and Networks of Cyberterrorists},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {1},
  pages        = {17--26},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280701723901},
  doi          = {10.1080/15567280701723901},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Matusitz08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/MatusitzM08,
  author       = {Jonathan Matusitz and
                  Elizabeth Minei},
  title        = {Cyberterrorism: Its Effects on Health-Related Infrastructures},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {4},
  pages        = {161--171},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802678657},
  doi          = {10.1080/15567280802678657},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/MatusitzM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt08,
  author       = {Mark Pollitt},
  title        = {Digital Orange Juice},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {1},
  pages        = {54--56},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280701721921},
  doi          = {10.1080/15567280701721921},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt08a,
  author       = {Mark Pollitt},
  title        = {Blue Skies and Storm Clouds},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {2},
  pages        = {105--106},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802047168},
  doi          = {10.1080/15567280802047168},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt08b,
  author       = {Mark Pollitt},
  title        = {Managing Expectations},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {3},
  pages        = {157--158},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802409574},
  doi          = {10.1080/15567280802409574},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt08c,
  author       = {Mark Pollitt},
  title        = {The Good, the Bad, the Unaddressed},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {4},
  pages        = {172--174},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280902882852},
  doi          = {10.1080/15567280902882852},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/PollittNHDCBMB08,
  author       = {Mark Pollitt and
                  Kara L. Nance and
                  Brian Hay and
                  Ronald C. Dodge and
                  Philip Craiger and
                  Paul Burke and
                  Christopher Marberry and
                  Bryan Brubaker},
  title        = {Virtualization and Digital Forensics: {A} Research and Education Agenda},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {2},
  pages        = {62--73},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802047135},
  doi          = {10.1080/15567280802047135},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/PollittNHDCBMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Riley08,
  author       = {John H. Riley Jr.},
  title        = {Windows Directory Entries for 8.3 Names in {VFAT} File Systems},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {1},
  pages        = {37--42},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280701881915},
  doi          = {10.1080/15567280701881915},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Riley08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/RileyDV08,
  author       = {Jack Wesley Riley and
                  David A. Dampier and
                  Rayford B. Vaughn},
  title        = {A Comparison of Forensic Hard Drive Imagers: {A} Time Analysis Comparison
                  Between the {ICS} Image MASSter-Solo {III} and the Logicube Talon},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {2},
  pages        = {74--82},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802047143},
  doi          = {10.1080/15567280802047143},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/RileyDV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/UriasHL08,
  author       = {Vincent Urias and
                  Curtis Hash and
                  Lorie M. Liebrock},
  title        = {Consideration of Issues for Parallel Digital Forensics of {RAID} Systems},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {4},
  pages        = {196--208},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280903140953},
  doi          = {10.1080/15567280903140953},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/UriasHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BeebeK06,
  author       = {Nicole Beebe and
                  Gary C. Kessler},
  title        = {A Review of: "\emph{Real Digital Forensics: Computer Security and
                  Incident Response}. By Keith J. Jones, Richard Bejtlich, and Curtis
                  W. Rose"},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {325--326},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701417967},
  doi          = {10.1080/15567280701417967},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BeebeK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Bosschert06,
  author       = {Thijs Bosschert},
  title        = {Battling Anti-Forensics: Beating the {U3} Stick},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {265--273},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701417975},
  doi          = {10.1080/15567280701417975},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Bosschert06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BreedenCCSHMSW06,
  author       = {Bob Breeden and
                  Mike Cantey and
                  Brett Cureton and
                  Clifford Stokes and
                  Peter Henry and
                  Judie Mulholland and
                  Wayne Sprague and
                  Jim Watson},
  title        = {The Phlorida Autopsy Report},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {203--222},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601142053},
  doi          = {10.1080/15567280601142053},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BreedenCCSHMSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BrillPW06,
  author       = {Alan E. Brill and
                  Mark Pollitt and
                  Carrie Morgan Whitcomb},
  title        = {The Evolution of Computer Forensic Best Practices: An Update on Programs
                  and Publications},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {3--11},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541488},
  doi          = {10.1080/15567280500541488},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BrillPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BurkeC06,
  author       = {Paul Burke and
                  Philip Craiger},
  title        = {Xbox Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {275--282},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701417991},
  doi          = {10.1080/15567280701417991},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BurkeC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BuskirkL06,
  author       = {Eric Van Buskirk and
                  Vincent T. Liu},
  title        = {Digital Evidence: Challenging the Presumption of Reliability},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {19--26},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541421},
  doi          = {10.1080/15567280500541421},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BuskirkL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Cain06,
  author       = {Patrick Cain},
  title        = {Using {XML} to Support Robust Information Sharing: An {IODEF} Automated
                  Approach},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {77--82},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995451},
  doi          = {10.1080/15567280600995451},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Cain06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Cassidy06,
  author       = {Peter Cassidy},
  title        = {Statement of Support Anti-Phishing Working Group {(APWG)}},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {75--76},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601047476},
  doi          = {10.1080/15567280601047476},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Cassidy06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/ChenH06,
  author       = {Thomas Chen and
                  Peter Henry},
  title        = {A Review of: "\emph{Phishing and Countermeasures: Understanding the
                  Increasing Problem of Electronic Identity Theft}. By Markus Jakobsson
                  and Steven Myers, Editors"},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {147--149},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601044580},
  doi          = {10.1080/15567280601044580},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/ChenH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/CraigerBM06,
  author       = {J. Philip Craiger and
                  Paul Burke and
                  Christopher Marberry},
  title        = {Open Source Tools for Phishing Investigations},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {223--229},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601142129},
  doi          = {10.1080/15567280601142129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/CraigerBM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Emigh06,
  author       = {Aaron Emigh},
  title        = {The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {245--260},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601049985},
  doi          = {10.1080/15567280601049985},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Emigh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/FuDW06,
  author       = {Anthony Y. Fu and
                  Xiaotie Deng and
                  Liu Wenyin},
  title        = {{REGAP:} {A} Tool for Unicode-Based Web Identity Fraud Detection},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {83--97},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995501},
  doi          = {10.1080/15567280600995501},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/FuDW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GandhiJR06,
  author       = {Mona Gandhi and
                  Markus Jakobsson and
                  Jacob Ratkiewicz},
  title        = {Badvertisements: Stealthy Click-Fraud with Unwitting Accessories},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {131--142},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601015598},
  doi          = {10.1080/15567280601015598},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GandhiJR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Grant06,
  author       = {Susan Grant},
  title        = {The National Consumers League's Call for Action},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {99--101},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995675},
  doi          = {10.1080/15567280600995675},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Grant06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Henry06,
  author       = {Peter Henry},
  title        = {A Review of: "\emph{Phishing Exposed: Uncover Secrets from the Dark
                  Side}. By Lance James \emph{Phishing: Cutting the Identity Theft Line}.
                  By Rachel Lininger and Russell Dean Uines"},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {261--262},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601047492},
  doi          = {10.1080/15567280601047492},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Henry06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Hosmer06,
  author       = {Chet Hosmer},
  title        = {Discovering Hidden Evidence},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {47--56},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541447},
  doi          = {10.1080/15567280500541447},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Hosmer06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Insa06,
  author       = {Fredesvinda Insa},
  title        = {The Admissibility of Electronic Evidence in Court {(A.E.E.C.):} Fighting
                  against High-Tech Crime - Results of a European Study},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {285--289},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701418049},
  doi          = {10.1080/15567280701418049},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Insa06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Johnson06,
  author       = {Victor A. Johnson},
  title        = {Phishing Tripz},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {153--155},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995717},
  doi          = {10.1080/15567280600995717},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Johnson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kenneally06,
  author       = {Erin Kenneally},
  title        = {Enabling the Enablers: An Identity Fraud Solution for Law Enforcement},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {157--164},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995758},
  doi          = {10.1080/15567280600995758},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kenneally06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kerivan06,
  author       = {John E. Kerivan},
  title        = {Heuristic Security-Testing Methods},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {27--36},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541439},
  doi          = {10.1080/15567280500541439},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kerivan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/KsanderGR06,
  author       = {Scott L. Ksander and
                  William Blair Gillam and
                  Marcus K. Rogers},
  title        = {Ultrablock Forensic Card Reader},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {69--70},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541413},
  doi          = {10.1080/15567280500541413},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/KsanderGR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/LosavioAR06,
  author       = {Michael Losavio and
                  Julia Adams and
                  Marc Rogers},
  title        = {Gap Analysis: Judicial Experience and Perception of Electronic Evidence},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {13--17},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541462},
  doi          = {10.1080/15567280500541462},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/LosavioAR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/LosavioWE06,
  author       = {Michael Losavio and
                  Deborah Wilson and
                  Adel Elmaghraby},
  title        = {Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular
                  Telephone Consumer and Small-Scale Digital Devices},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {291--296},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701418080},
  doi          = {10.1080/15567280701418080},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/LosavioWE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/LydaH06,
  author       = {Robert Lyda and
                  James Hamrock},
  title        = {Exploring Investigative Methods for Identifying and Profiling Serial
                  Bots},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {165--177},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995782},
  doi          = {10.1080/15567280600995782},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/LydaH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/MarberryC06,
  author       = {Christopher Marberry and
                  Philip Craiger},
  title        = {{CD-R} Acquisition Hashes Affected by Write Options},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {297--307},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701418098},
  doi          = {10.1080/15567280701418098},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/MarberryC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/McRaeMV06,
  author       = {Craig M. McRae and
                  Robert Wesley McGrew and
                  Rayford B. Vaughn},
  title        = {Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating
                  Phishing Scams},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {193--199},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995857},
  doi          = {10.1080/15567280600995857},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/McRaeMV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Mulholland06,
  author       = {Judie Mulholland},
  title        = {Message from the Guest Editor},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {73--74},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601050173},
  doi          = {10.1080/15567280601050173},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Mulholland06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Mulholland06a,
  author       = {Judie Mulholland},
  title        = {Message from the Guest Editor},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {151--152},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601144430},
  doi          = {10.1080/15567280601144430},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Mulholland06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Nelson06,
  author       = {Anthony Nelson},
  title        = {{ISO} 27001 as a Support to Digital Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {43--46},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541405},
  doi          = {10.1080/15567280500541405},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Nelson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Orebaugh06,
  author       = {Angela Orebaugh},
  title        = {Proactive Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {37--41},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600626411},
  doi          = {10.1080/15567280600626411},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Orebaugh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt06,
  author       = {Mark Pollitt},
  title        = {Exploration},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {67--68},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600631940},
  doi          = {10.1080/15567280600631940},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt06a,
  author       = {Mark Pollitt},
  title        = {Byte/Counterbyte},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {283--284},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701418015},
  doi          = {10.1080/15567280701418015},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Quarterman06,
  author       = {John S. Quarterman},
  title        = {PhishScope: Tracking Phish Server Clusters},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {103--114},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995808},
  doi          = {10.1080/15567280600995808},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Quarterman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Radvanovsky06,
  author       = {Bob Radvanovsky},
  title        = {Analyzing Spoofed E-mail Headers},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {231--243},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601142178},
  doi          = {10.1080/15567280601142178},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Radvanovsky06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Ren06,
  author       = {Wei Ren},
  title        = {Modeling Network Forensics Behavior},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {57--65},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600631932},
  doi          = {10.1080/15567280600631932},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Ren06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Smith06,
  author       = {Aaron Smith},
  title        = {Describing and Categorizing Disk-Avoiding Anti-Forensics Tools},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {309--313},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701418155},
  doi          = {10.1080/15567280701418155},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Smith06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Sprague06,
  author       = {Wayne E. Sprague},
  title        = {Uncharted Waters: Prosecuting Phishing and Online Fraud Cases},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {143--146},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601044564},
  doi          = {10.1080/15567280601044564},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Sprague06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Stephenson06,
  author       = {Peter Stephenson},
  title        = {Trends},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280500541496},
  doi          = {10.1080/15567280500541496},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Stephenson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/TallySCCJOR06,
  author       = {Gregg Tally and
                  David Sames and
                  Thomas Chen and
                  Chris Colleran and
                  David Jevans and
                  Kevin Omiliak and
                  Rod Rasmussen},
  title        = {The Phisherman Project: Creating a Comprehensive Data Collection to
                  Combat Phishing Attacks},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {115--129},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601015564},
  doi          = {10.1080/15567280601015564},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/TallySCCJOR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/TsowJYW06,
  author       = {Alex Tsow and
                  Markus Jakobsson and
                  Liu Yang and
                  Susanne Wetzel},
  title        = {Warkitting: The Drive-by Subversion of Wireless Home Routers},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {179--192},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995832},
  doi          = {10.1080/15567280600995832},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/TsowJYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Vidas06,
  author       = {Timothy M. Vidas},
  title        = {The Acquisition and Analysis of Random Access Memory},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {4},
  pages        = {315--323},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280701418171},
  doi          = {10.1080/15567280701418171},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Vidas06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics