Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/di/di14.bht:"
@article{DBLP:journals/di/ArmknechtD15, author = {Frederik Armknecht and Andreas Dewald}, title = {Privacy-preserving email forensics}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S127--S136}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.003}, doi = {10.1016/J.DIIN.2015.05.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ArmknechtD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BalzarottiPV15, author = {Davide Balzarotti and Roberto Di Pietro and Antonio Villani}, title = {The impact of GPU-assisted malware on memory forensics: {A} case study}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S16--S24}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.010}, doi = {10.1016/J.DIIN.2015.05.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BoukhtoutaMDAIB15, author = {Amine Boukhtouta and Djedjiga Mouheb and Mourad Debbabi and Omar Alfandi and Farkhund Iqbal and May El Barachi}, title = {Graph-theoretic characterization of cyber-threat infrastructures}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S3--S15}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.002}, doi = {10.1016/J.DIIN.2015.05.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseR15, author = {Andrew Case and Golden G. Richard III}, title = {Advancing Mac {OS} {X} rootkit detection}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S25--S33}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.005}, doi = {10.1016/J.DIIN.2015.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Clemens15, author = {John Clemens}, title = {Automatic classification of object code using machine learning}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S156--S162}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.007}, doi = {10.1016/J.DIIN.2015.05.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Clemens15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DietrichA15, author = {Dianne Dietrich and Frank Adelstein}, title = {Archival science, digital forensics, and new media art}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S137--S145}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.004}, doi = {10.1016/J.DIIN.2015.05.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DietrichA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelM15, author = {Simson L. Garfinkel and Michael McCarrin}, title = {Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S95--S105}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.001}, doi = {10.1016/J.DIIN.2015.05.001}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GarfinkelM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrierR15, author = {Jonathan Grier and Golden G. Richard III}, title = {Rapid forensic imaging of large disks with sifting collectors}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S34--S44}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.006}, doi = {10.1016/J.DIIN.2015.05.006}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrierR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LarbanetLD15, author = {Adrien Larbanet and Jonas Lerebours and J. P. David}, title = {Detecting very large sets of referenced files at 40/100 GbE, especially {MP4} files}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S85--S94}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.011}, doi = {10.1016/J.DIIN.2015.05.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LarbanetLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RahimianSAWD15, author = {Ashkan Rahimian and Paria Shirani and Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {BinComp: {A} stratified approach to compiler provenance Attribution}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S146--S155}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.015}, doi = {10.1016/J.DIIN.2015.05.015}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schatz15, author = {Bradley L. Schatz}, title = {Wirespeed: Extending the {AFF4} forensic container format for scalable acquisition and live analysis}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S45--S54}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.016}, doi = {10.1016/J.DIIN.2015.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schatz15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchmidIF15, author = {Michael R. Schmid and Farkhund Iqbal and Benjamin C. M. Fung}, title = {E-mail authorship attribution using customized associative classification}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S116--S126}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.012}, doi = {10.1016/J.DIIN.2015.05.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SchmidIF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schweinsberg15, author = {Elizabeth Schweinsberg}, title = {Fifteenth Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S1--S2}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.001}, doi = {10.1016/J.DIIN.2015.07.001}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schweinsberg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRG15, author = {James Wagner and Alexander Rasin and Jonathan Grier}, title = {Database forensic analysis through internal structure carving}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S106--S115}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.013}, doi = {10.1016/J.DIIN.2015.05.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WalnyckyBMMB15, author = {Daniel Walnycky and Ibrahim M. Baggili and Andrew Marrington and Jason Moore and Frank Breitinger}, title = {Network and device forensic analysis of Android social-messaging applications}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S77--S84}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.009}, doi = {10.1016/J.DIIN.2015.05.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WalnyckyBMMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YangCKC15, author = {Seung Jei Yang and Jung Ho Choi and Ki Bom Kim and Taejoo Chang}, title = {New acquisition method based on firmware update protocols for Android smartphones}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S68--S76}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.008}, doi = {10.1016/J.DIIN.2015.05.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/YangCKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZawoadHG15, author = {Shams Zawoad and Ragib Hasan and John Grimes}, title = {{LINCS:} Towards building a trustworthy litigation hold enabled cloud storage system}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S55--S67}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.014}, doi = {10.1016/J.DIIN.2015.05.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZawoadHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.