Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/di/di18.bht:"
@article{DBLP:journals/di/Casey16b, author = {Eoghan Casey}, title = {Focused digital evidence analysis and forensic distinguishers}, journal = {Digit. Investig.}, volume = {18}, pages = {A1--A3}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.08.004}, doi = {10.1016/J.DIIN.2016.08.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChooHIM16, author = {Kim{-}Kwang Raymond Choo and Martin Herman and Michaela Iorga and Ben Martini}, title = {Cloud forensics: State-of-the-art and future directions}, journal = {Digit. Investig.}, volume = {18}, pages = {77--78}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.08.003}, doi = {10.1016/J.DIIN.2016.08.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChooHIM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EbrahimiSO16, author = {Mohammad Reza Ebrahimi and Ching Y. Suen and Olga Ormandjieva}, title = {Detecting predatory conversations in social media by deep Convolutional Neural Networks}, journal = {Digit. Investig.}, volume = {18}, pages = {33--49}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.07.001}, doi = {10.1016/J.DIIN.2016.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EbrahimiSO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FahdiCLF16, author = {M. Al Fahdi and Nathan L. Clarke and Fudong Li and Steven M. Furnell}, title = {A suspect-oriented intelligent and automated computer forensic analysis}, journal = {Digit. Investig.}, volume = {18}, pages = {65--76}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.08.001}, doi = {10.1016/J.DIIN.2016.08.001}, timestamp = {Fri, 19 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FahdiCLF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JamesG16, author = {Joshua I. James and Pavel Gladyshev}, title = {A survey of mutual legal assistance involving digital evidence}, journal = {Digit. Investig.}, volume = {18}, pages = {23--32}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.06.004}, doi = {10.1016/J.DIIN.2016.06.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JamesG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeimichHB16, author = {Petra Leimich and Josh Harrison and William J. Buchanan}, title = {A {RAM} triage methodology for Hadoop {HDFS} forensics}, journal = {Digit. Investig.}, volume = {18}, pages = {96--109}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.07.003}, doi = {10.1016/J.DIIN.2016.07.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LeimichHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PeersmanSRBF16, author = {Claudia Peersman and Christian Schulze and Awais Rashid and Margaret Brennan and Carl Fischer}, title = {iCOP: Live forensics to reveal previously unknown criminal media on {P2P} networks}, journal = {Digit. Investig.}, volume = {18}, pages = {50--64}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.07.002}, doi = {10.1016/J.DIIN.2016.07.002}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PeersmanSRBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevABMS16, author = {Vassil Roussev and Irfan Ahmed and Andres Barreto and Shane McCulley and Vivek Shanmughan}, title = {Cloud forensics-Tool development studies {\&} future outlook}, journal = {Digit. Investig.}, volume = {18}, pages = {79--95}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.05.001}, doi = {10.1016/J.DIIN.2016.05.001}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevABMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SitaraM16, author = {K. Sitara and Babu M. Mehtre}, title = {Digital video tampering detection: An overview of passive techniques}, journal = {Digit. Investig.}, volume = {18}, pages = {8--22}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.06.003}, doi = {10.1016/J.DIIN.2016.06.003}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SitaraM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SongLLL16, author = {Ji Eun Song and Kiryong Lee and Wan Yeon Lee and Heejo Lee}, title = {Integrity verification of the ordered data structures in manipulated video content}, journal = {Digit. Investig.}, volume = {18}, pages = {1--7}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.06.001}, doi = {10.1016/J.DIIN.2016.06.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SongLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.