Stop the war!
Остановите войну!
for scientists:
default search action
Digital Investigation, Volume 12
Volume 12, March 2015
- Eoghan Casey:
Strengthening forensic science. A1-A2 - Jicang Lu, Fenlin Liu, Xiangyang Luo:
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix. 1-14 - Reza Sharifnya, Mahdi Abadi:
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic. 15-26 - Oluwasola Mary Adedayo, Martin S. Olivier:
Ideal log setting for database forensics reconstruction. 27-40 - Jan Peter van Zandwijk:
A mathematical approach to NAND flash-memory descrambling and decoding. 41-52 - Yogesh Khatri:
Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8. 53-65 - Ahmet Karaküçük, Ahmet Emir Dirik:
Adaptive photo-response non-uniformity noise removal against image source attribution. 66-76 - Li Zhang, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quan-xin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. 77-87 - Kathryn C. Seigfried-Spellar:
Erratum to "Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary findings" [Digit. Invest 11 (4), 252-260]. 88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.