


default search action
Digital Investigation, Volume 7
Volume 7, Number Supplement, August 2010
- Gregory J. Conti, Sergey Bratus, Anna Shubina, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, Robert Perez-Alemany:

Automated mapping of large binary objects using primitive fragment type classification. S3-S12 - Simson L. Garfinkel

, Alex J. Nelson
, Douglas White, Vassil Roussev:
Using purpose-built functions and block hashes to enable small block and sub-file forensics. S13-S23 - Stefan Axelsson:

The Normalised Compression Distance as a file fragment classifier. S24-S31 - Andrew Case

, Lodovico Marziale, Golden G. Richard III
:
Dynamic recreation of kernel data structures for live forensics. S32-S40 - Andrew Case

, Lodovico Marziale, Cris Neckar, Golden G. Richard III
:
Treasure and tragedy in kmem_cache mining for live forensics investigation. S41-S47 - James S. Okolica, Gilbert L. Peterson

:
Windows operating systems agnostic memory analysis. S48-S56 - Richard M. Stevens, Eoghan Casey

:
Extracting Windows command line details from physical memory. S57-S63 - Simson L. Garfinkel

:
Digital forensics research: The next 10 years. S64-S73 - Vrizlynn L. L. Thing, Kian-Yong Ng, Ee-Chien Chang

:
Live memory forensics of mobile phones. S74-S82 - Alessandro Distefano, Gianluigi Me

, Francesco Pace:
Android anti-forensics through a local paradigm. S83-S94 - Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, Clay Shields:

Forensic investigation of peer-to-peer file sharing networks. S95-S103 - Bilal Shebaro, Fernando Pérez-González

, Jedidiah R. Crandall
:
Leaving timing-channel fingerprints in hidden service log files. S104-S113 - Jewan Bang

, Byeongyeong Yoo, Sangjin Lee:
Secure USB bypassing tool. S114-S120 - Michael Cohen, Bradley L. Schatz:

Hash based disk imaging using AFF4. S121-S128 - Brian D. Carrier:

Different interpretations of ISO9660 file systems. S129-S134 - James R. Lyle:

If error rate is such a simple concept, why don't I have one for my forensic tool yet? S135-S139
Volume 7, Numbers 1-2, October 2010
- Eoghan Casey

:
Digital investigations, security and privacy. 1-2
- Greg Gogolin:

The Digital Crime Tsunami. 3-8 - Geoffrey Fellows:

WinRAR temporary folder artefacts. 9-13 - Emmanuel S. Pilli

, Ramesh C. Joshi, Rajdeep Niyogi:
Network forensic frameworks: Survey and research challenges. 14-27 - Karla Saur, Julian B. Grizzard:

Locating ×86 paging structures in memory images. 28-37 - Frederick Rehault:

Windows mobile advanced forensics: An alternative to existing tools. 38-47 - Ming Xu, Hong-Rong Yang, Jian Xu, Ye Xu, Ning Zheng:

An adaptive method to identify disk cluster size based on block content. 48-55 - Farkhund Iqbal

, Hamad Binsalleeh
, Benjamin C. M. Fung
, Mourad Debbabi
:
Mining writeprints from anonymous e-mails for forensic investigation. 56-64 - Liaqat Ali Khan, Muhammad Shamim Baig, Amr M. Youssef:

Speaker recognition from encrypted VoIP communications. 65-73 - Liaqat Ali Khan, Farkhund Iqbal

, Muhammad Shamim Baig:
Speaker verification from partially encrypted compressed speech for forensic investigation. 74-80 - Fa-Chang Cheng, Wen-Hsing Lai:

An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan. 81-89 - Muhammad Yasin, Ahmad R. Cheema

, Firdous Kausar
:
Analysis of Internet Download Manager for collection of digital forensic artefacts. 90-94 - Neil J. Croft, Martin S. Olivier

:
Sequenced release of privacy-accurate information in a forensic investigation. 95-101
Volume 7, Numbers 3-4, April 2011
- Eoghan Casey

:
The increasing need for automation and validation in digital forensics. 103-104
- Paul Hunton:

A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment. 105-113 - Howard Chivers, Christopher James Hargreaves

:
Forensic data recovery from the Windows Search Database. 114-126 - Harjinder Singh Lallie

, Philip James Briggs:
Windows 7 registry forensic evidence created by three popular BitTorrent clients. 127-134 - Jewan Bang

, Byeongyeong Yoo, Sangjin Lee:
Analysis of changes in file time attributes with file manipulation. 135-144 - M. Tariq Banday

, Farooq A. Mir, Jameel A. Qadri, Nisar Ahmed Shah:
Analyzing Internet e-mail date-spoofing. 145-153 - A. L. Louis, Andries P. Engelbrecht

:
Unsupervised discovery of relations for analysis of textual data. 154-171 - Dung Vu Pham, Ali Syed, Malka N. Halgamuge

:
Universal serial bus based software attacks and protection solutions. 172-184 - Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen:

Collaborative scheme for VoIP traceback. 185-195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














