Search dblp for Publications

export results for "toc:db/journals/di/di14.bht:"

 download as .bib file

@article{DBLP:journals/di/ArmknechtD15,
  author       = {Frederik Armknecht and
                  Andreas Dewald},
  title        = {Privacy-preserving email forensics},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S127--S136},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.003},
  doi          = {10.1016/J.DIIN.2015.05.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ArmknechtD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BalzarottiPV15,
  author       = {Davide Balzarotti and
                  Roberto Di Pietro and
                  Antonio Villani},
  title        = {The impact of GPU-assisted malware on memory forensics: {A} case study},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S16--S24},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.010},
  doi          = {10.1016/J.DIIN.2015.05.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BoukhtoutaMDAIB15,
  author       = {Amine Boukhtouta and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Omar Alfandi and
                  Farkhund Iqbal and
                  May El Barachi},
  title        = {Graph-theoretic characterization of cyber-threat infrastructures},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S3--S15},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.002},
  doi          = {10.1016/J.DIIN.2015.05.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseR15,
  author       = {Andrew Case and
                  Golden G. Richard III},
  title        = {Advancing Mac {OS} {X} rootkit detection},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S25--S33},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.005},
  doi          = {10.1016/J.DIIN.2015.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Clemens15,
  author       = {John Clemens},
  title        = {Automatic classification of object code using machine learning},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S156--S162},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.007},
  doi          = {10.1016/J.DIIN.2015.05.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Clemens15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DietrichA15,
  author       = {Dianne Dietrich and
                  Frank Adelstein},
  title        = {Archival science, digital forensics, and new media art},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S137--S145},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.004},
  doi          = {10.1016/J.DIIN.2015.05.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DietrichA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelM15,
  author       = {Simson L. Garfinkel and
                  Michael McCarrin},
  title        = {Hash-based carving: Searching media for complete files and file fragments
                  with sector hashing and hashdb},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S95--S105},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.001},
  doi          = {10.1016/J.DIIN.2015.05.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrierR15,
  author       = {Jonathan Grier and
                  Golden G. Richard III},
  title        = {Rapid forensic imaging of large disks with sifting collectors},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S34--S44},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.006},
  doi          = {10.1016/J.DIIN.2015.05.006},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrierR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LarbanetLD15,
  author       = {Adrien Larbanet and
                  Jonas Lerebours and
                  J. P. David},
  title        = {Detecting very large sets of referenced files at 40/100 GbE, especially
                  {MP4} files},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S85--S94},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.011},
  doi          = {10.1016/J.DIIN.2015.05.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LarbanetLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RahimianSAWD15,
  author       = {Ashkan Rahimian and
                  Paria Shirani and
                  Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {BinComp: {A} stratified approach to compiler provenance Attribution},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S146--S155},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.015},
  doi          = {10.1016/J.DIIN.2015.05.015},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schatz15,
  author       = {Bradley L. Schatz},
  title        = {Wirespeed: Extending the {AFF4} forensic container format for scalable
                  acquisition and live analysis},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S45--S54},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.016},
  doi          = {10.1016/J.DIIN.2015.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schatz15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchmidIF15,
  author       = {Michael R. Schmid and
                  Farkhund Iqbal and
                  Benjamin C. M. Fung},
  title        = {E-mail authorship attribution using customized associative classification},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S116--S126},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.012},
  doi          = {10.1016/J.DIIN.2015.05.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SchmidIF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schweinsberg15,
  author       = {Elizabeth Schweinsberg},
  title        = {Fifteenth Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S1--S2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.001},
  doi          = {10.1016/J.DIIN.2015.07.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schweinsberg15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRG15,
  author       = {James Wagner and
                  Alexander Rasin and
                  Jonathan Grier},
  title        = {Database forensic analysis through internal structure carving},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S106--S115},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.013},
  doi          = {10.1016/J.DIIN.2015.05.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WalnyckyBMMB15,
  author       = {Daniel Walnycky and
                  Ibrahim M. Baggili and
                  Andrew Marrington and
                  Jason Moore and
                  Frank Breitinger},
  title        = {Network and device forensic analysis of Android social-messaging applications},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S77--S84},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.009},
  doi          = {10.1016/J.DIIN.2015.05.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WalnyckyBMMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YangCKC15,
  author       = {Seung Jei Yang and
                  Jung Ho Choi and
                  Ki Bom Kim and
                  Taejoo Chang},
  title        = {New acquisition method based on firmware update protocols for Android
                  smartphones},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S68--S76},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.008},
  doi          = {10.1016/J.DIIN.2015.05.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YangCKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZawoadHG15,
  author       = {Shams Zawoad and
                  Ragib Hasan and
                  John Grimes},
  title        = {{LINCS:} Towards building a trustworthy litigation hold enabled cloud
                  storage system},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S55--S67},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.014},
  doi          = {10.1016/J.DIIN.2015.05.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZawoadHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics