Search dblp for Publications

export results for "toc:db/journals/jdfsl/jdfsl11.bht:"

 download as .bib file

@article{DBLP:journals/jdfsl/Al-khateebCABB16,
  author       = {Samer Al{-}khateeb and
                  Kevin J. Conlan and
                  Nitin Agarwal and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Exploring Deviant Hacker Networks {(DHN)} On Social Media Platforms},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {7--20},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1375},
  doi          = {10.15394/JDFSL.2016.1375},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Al-khateebCABB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AldwairiAAS16,
  author       = {Monther Aldwairi and
                  Koloud Al{-}Khamaiseh and
                  Fatima Alharbi and
                  Babar Shah},
  title        = {Bloom Filters Optimized Wu-Manber for Intrusion Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {5--22},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1427},
  doi          = {10.15394/JDFSL.2016.1427},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AldwairiAAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BaekLH16,
  author       = {Hyunin Baek and
                  Michael Losavio and
                  George Higgins},
  title        = {The Impact of Low Self-Control on Online Harassment: Interaction with
                  Opportunity},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {27--42},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1417},
  doi          = {10.15394/JDFSL.2016.1417},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BaekLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FehisNK16,
  author       = {Saad Fehis and
                  Omar Nouali and
                  Mohand Tahar Kechadi},
  title        = {A New Distributed Chinese Wall Security Policy Model},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {149--168},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1434},
  doi          = {10.15394/JDFSL.2016.1434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FehisNK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Flory16,
  author       = {Teri A. Flory},
  title        = {Digital Forensics In Law Enforcement: {A} Needs Based Analysis of
                  Indiana Agencies},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {77--98},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1374},
  doi          = {10.15394/JDFSL.2016.1374},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Flory16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GlissonSBGC16,
  author       = {William Bradley Glisson and
                  Tim Storer and
                  Andrew Blyth and
                  George Grispos and
                  Matt Campbell},
  title        = {In-The-Wild Residual Data Research and Privacy},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {7--36},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1371},
  doi          = {10.15394/JDFSL.2016.1371},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GlissonSBGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GunestasB16,
  author       = {Murat Gunestas and
                  Zeki Bilgin},
  title        = {Log Analysis Using Temporal Logic and Reconstruction Approach: Web
                  Server Case},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {35--58},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1377},
  doi          = {10.15394/JDFSL.2016.1377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GunestasB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HarichandranBB16,
  author       = {Vikram S. Harichandran and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Bytewise Approximate Matching: The Good, The Bad, and The Unknown},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {59--78},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1379},
  doi          = {10.15394/JDFSL.2016.1379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HarichandranBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JeongBKL16,
  author       = {Doowon Jeong and
                  Frank Breitinger and
                  Hari Kang and
                  Sangjin Lee},
  title        = {Towards Syntactic Approximate Matching - {A} Pre-Processing Experiment},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {97--110},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1381},
  doi          = {10.15394/JDFSL.2016.1381},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JeongBKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JulliandTN16,
  author       = {Thibault Julliand and
                  Hugues Talbot and
                  Vincent Nozick},
  title        = {Countering Noise-based Splicing Detection Using Noise Density Transfer},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {111--122},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1382},
  doi          = {10.15394/JDFSL.2016.1382},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JulliandTN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KarabiyikCATAGA16,
  author       = {Umit Karabiyik and
                  Muhammed Abdullah Canbaz and
                  Ahmet Aksoy and
                  Tayfun Tuna and
                  Esra Akbas and
                  Bilal Gonen and
                  Ramazan Aygun},
  title        = {A Survey of Social Network Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {55--128},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1430},
  doi          = {10.15394/JDFSL.2016.1430},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KarabiyikCATAGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler16,
  author       = {Gary C. Kessler},
  title        = {The Impact of {MD5} File Hash Collisions On Digital Forensic Imaging},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {129--138},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1431},
  doi          = {10.15394/JDFSL.2016.1431},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler16a,
  author       = {Gary C. Kessler},
  title        = {The Impact of {SHA-1} File Hash Collisions On Digital Forensic Imaging:
                  {A} Follow-up Experiment},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {139--148},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1433},
  doi          = {10.15394/JDFSL.2016.1433},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LeeJEK16,
  author       = {Kibin Lee and
                  Joshua I. James and
                  Tekachew Gobena Ejeta and
                  Hyoung Joong Kim},
  title        = {Electronic Voting Service Using Block-Chain},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {123--136},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1383},
  doi          = {10.15394/JDFSL.2016.1383},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LeeJEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LiaoL16,
  author       = {Yi{-}Ching Liao and
                  Hanno Langweg},
  title        = {Evidential Reasoning for Forensic Readiness},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {37--52},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1372},
  doi          = {10.15394/JDFSL.2016.1372},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LiaoL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoMW16,
  author       = {Thomas Lonardo and
                  Tricia Martland and
                  Doug White},
  title        = {A Legal Examination of Revenge Pornography and Cyber-Harassment},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {79--106},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1412},
  doi          = {10.15394/JDFSL.2016.1412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MartinJA16,
  author       = {Thomas Anthony Martin and
                  Andy Jones and
                  Mohammed Alzaabi},
  title        = {The 2016 Analysis of Information Remaining on Computer Hard Disks
                  Offered for Sale on the Second Hand Market in the {UAE}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {23--36},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1428},
  doi          = {10.15394/JDFSL.2016.1428},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MartinJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MatousekHHR16,
  author       = {Petr Matousek and
                  Radek Hranicky and
                  Martin Holkovic and
                  Ondrej Rysav{\'{y}}},
  title        = {On Efficiency of Distributed Password Recovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {79--96},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1380},
  doi          = {10.15394/JDFSL.2016.1380},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MatousekHHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MohammedCL16,
  author       = {Hussam Jasim Mohammed and
                  Nathan Luke Clarke and
                  Fudong Li},
  title        = {An Automated Approach for Digital Forensic Analysis of Heterogeneous
                  Big Data},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {137--152},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1384},
  doi          = {10.15394/JDFSL.2016.1384},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MohammedCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/OlsonS16,
  author       = {Eric Olson and
                  Narasimha K. Shashidhar},
  title        = {Low Budget Forensic Drive Imaging Using {ARM} Based Single Board Computers},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {53--76},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1373},
  doi          = {10.15394/JDFSL.2016.1373},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/OlsonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RoweSMG16,
  author       = {Neil C. Rowe and
                  Riqui Schwamm and
                  Michael McCarrin and
                  Ralucca Gera},
  title        = {Making Sense of Email Addresses on Drives},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {153--174},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1385},
  doi          = {10.15394/JDFSL.2016.1385},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RoweSMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghCS16,
  author       = {Monika Singh and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Security Analysis of mvHash-B Similarity Hashing},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {21--34},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1376},
  doi          = {10.15394/JDFSL.2016.1376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghS16,
  author       = {Bhupendra Singh and
                  Upasna Singh},
  title        = {Leveraging the Windows Amcache.hve File in Forensic Investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {37--54},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1429},
  doi          = {10.15394/JDFSL.2016.1429},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SpitzbergG16,
  author       = {Brian H. Spitzberg and
                  Jean Mark Gawron},
  title        = {A Research Agenda for Online Linguistic Surveillance of Threatening
                  Messages},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {43--78},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1418},
  doi          = {10.15394/JDFSL.2016.1418},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SpitzbergG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ThompsonH16,
  author       = {Marcus Thompson and
                  Raymond Hansen},
  title        = {Verification of Recovered Digital Evidence on the Amazon Kindle},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {175--192},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1386},
  doi          = {10.15394/JDFSL.2016.1386},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ThompsonH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ZezulkaS16,
  author       = {Lauren A. Zezulka and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Differentiating Cyberbullies and Internet Trolls by Personality Characteristics
                  and Self-Esteem},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {7--26},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1415},
  doi          = {10.15394/JDFSL.2016.1415},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ZezulkaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}