Search dblp for Publications

export results for "toc:db/journals/di/di18.bht:"

 download as .bib file

@article{DBLP:journals/di/Casey16b,
  author       = {Eoghan Casey},
  title        = {Focused digital evidence analysis and forensic distinguishers},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {A1--A3},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.08.004},
  doi          = {10.1016/J.DIIN.2016.08.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChooHIM16,
  author       = {Kim{-}Kwang Raymond Choo and
                  Martin Herman and
                  Michaela Iorga and
                  Ben Martini},
  title        = {Cloud forensics: State-of-the-art and future directions},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {77--78},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.08.003},
  doi          = {10.1016/J.DIIN.2016.08.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChooHIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/EbrahimiSO16,
  author       = {Mohammad Reza Ebrahimi and
                  Ching Y. Suen and
                  Olga Ormandjieva},
  title        = {Detecting predatory conversations in social media by deep Convolutional
                  Neural Networks},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {33--49},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.07.001},
  doi          = {10.1016/J.DIIN.2016.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/EbrahimiSO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FahdiCLF16,
  author       = {M. Al Fahdi and
                  Nathan L. Clarke and
                  Fudong Li and
                  Steven M. Furnell},
  title        = {A suspect-oriented intelligent and automated computer forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {65--76},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.08.001},
  doi          = {10.1016/J.DIIN.2016.08.001},
  timestamp    = {Fri, 19 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FahdiCLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JamesG16,
  author       = {Joshua I. James and
                  Pavel Gladyshev},
  title        = {A survey of mutual legal assistance involving digital evidence},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {23--32},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.06.004},
  doi          = {10.1016/J.DIIN.2016.06.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JamesG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeimichHB16,
  author       = {Petra Leimich and
                  Josh Harrison and
                  William J. Buchanan},
  title        = {A {RAM} triage methodology for Hadoop {HDFS} forensics},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {96--109},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.07.003},
  doi          = {10.1016/J.DIIN.2016.07.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LeimichHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PeersmanSRBF16,
  author       = {Claudia Peersman and
                  Christian Schulze and
                  Awais Rashid and
                  Margaret Brennan and
                  Carl Fischer},
  title        = {iCOP: Live forensics to reveal previously unknown criminal media on
                  {P2P} networks},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {50--64},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.07.002},
  doi          = {10.1016/J.DIIN.2016.07.002},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PeersmanSRBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevABMS16,
  author       = {Vassil Roussev and
                  Irfan Ahmed and
                  Andres Barreto and
                  Shane McCulley and
                  Vivek Shanmughan},
  title        = {Cloud forensics-Tool development studies {\&} future outlook},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {79--95},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.05.001},
  doi          = {10.1016/J.DIIN.2016.05.001},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevABMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SitaraM16,
  author       = {K. Sitara and
                  Babu M. Mehtre},
  title        = {Digital video tampering detection: An overview of passive techniques},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {8--22},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.06.003},
  doi          = {10.1016/J.DIIN.2016.06.003},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SitaraM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SongLLL16,
  author       = {Ji Eun Song and
                  Kiryong Lee and
                  Wan Yeon Lee and
                  Heejo Lee},
  title        = {Integrity verification of the ordered data structures in manipulated
                  video content},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {1--7},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.06.001},
  doi          = {10.1016/J.DIIN.2016.06.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SongLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics