default search action
Search dblp for Publications
export results for "toc:db/journals/jdfsl/jdfsl11.bht:"
@article{DBLP:journals/jdfsl/Al-khateebCABB16, author = {Samer Al{-}khateeb and Kevin J. Conlan and Nitin Agarwal and Ibrahim M. Baggili and Frank Breitinger}, title = {Exploring Deviant Hacker Networks {(DHN)} On Social Media Platforms}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {7--20}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1375}, doi = {10.15394/JDFSL.2016.1375}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Al-khateebCABB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AldwairiAAS16, author = {Monther Aldwairi and Koloud Al{-}Khamaiseh and Fatima Alharbi and Babar Shah}, title = {Bloom Filters Optimized Wu-Manber for Intrusion Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {5--22}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1427}, doi = {10.15394/JDFSL.2016.1427}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AldwairiAAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BaekLH16, author = {Hyunin Baek and Michael Losavio and George Higgins}, title = {The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {27--42}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1417}, doi = {10.15394/JDFSL.2016.1417}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BaekLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FehisNK16, author = {Saad Fehis and Omar Nouali and Mohand Tahar Kechadi}, title = {A New Distributed Chinese Wall Security Policy Model}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {149--168}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1434}, doi = {10.15394/JDFSL.2016.1434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FehisNK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Flory16, author = {Teri A. Flory}, title = {Digital Forensics In Law Enforcement: {A} Needs Based Analysis of Indiana Agencies}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {77--98}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1374}, doi = {10.15394/JDFSL.2016.1374}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Flory16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GlissonSBGC16, author = {William Bradley Glisson and Tim Storer and Andrew Blyth and George Grispos and Matt Campbell}, title = {In-The-Wild Residual Data Research and Privacy}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {7--36}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1371}, doi = {10.15394/JDFSL.2016.1371}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GlissonSBGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GunestasB16, author = {Murat Gunestas and Zeki Bilgin}, title = {Log Analysis Using Temporal Logic and Reconstruction Approach: Web Server Case}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {35--58}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1377}, doi = {10.15394/JDFSL.2016.1377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GunestasB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HarichandranBB16, author = {Vikram S. Harichandran and Frank Breitinger and Ibrahim M. Baggili}, title = {Bytewise Approximate Matching: The Good, The Bad, and The Unknown}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {59--78}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1379}, doi = {10.15394/JDFSL.2016.1379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HarichandranBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JeongBKL16, author = {Doowon Jeong and Frank Breitinger and Hari Kang and Sangjin Lee}, title = {Towards Syntactic Approximate Matching - {A} Pre-Processing Experiment}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {97--110}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1381}, doi = {10.15394/JDFSL.2016.1381}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JeongBKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JulliandTN16, author = {Thibault Julliand and Hugues Talbot and Vincent Nozick}, title = {Countering Noise-based Splicing Detection Using Noise Density Transfer}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {111--122}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1382}, doi = {10.15394/JDFSL.2016.1382}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JulliandTN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KarabiyikCATAGA16, author = {Umit Karabiyik and Muhammed Abdullah Canbaz and Ahmet Aksoy and Tayfun Tuna and Esra Akbas and Bilal Gonen and Ramazan Aygun}, title = {A Survey of Social Network Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {55--128}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1430}, doi = {10.15394/JDFSL.2016.1430}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KarabiyikCATAGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler16, author = {Gary C. Kessler}, title = {The Impact of {MD5} File Hash Collisions On Digital Forensic Imaging}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {129--138}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1431}, doi = {10.15394/JDFSL.2016.1431}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler16a, author = {Gary C. Kessler}, title = {The Impact of {SHA-1} File Hash Collisions On Digital Forensic Imaging: {A} Follow-up Experiment}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {139--148}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1433}, doi = {10.15394/JDFSL.2016.1433}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LeeJEK16, author = {Kibin Lee and Joshua I. James and Tekachew Gobena Ejeta and Hyoung Joong Kim}, title = {Electronic Voting Service Using Block-Chain}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {123--136}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1383}, doi = {10.15394/JDFSL.2016.1383}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LeeJEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LiaoL16, author = {Yi{-}Ching Liao and Hanno Langweg}, title = {Evidential Reasoning for Forensic Readiness}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {37--52}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1372}, doi = {10.15394/JDFSL.2016.1372}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LiaoL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoMW16, author = {Thomas Lonardo and Tricia Martland and Doug White}, title = {A Legal Examination of Revenge Pornography and Cyber-Harassment}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {79--106}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1412}, doi = {10.15394/JDFSL.2016.1412}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MartinJA16, author = {Thomas Anthony Martin and Andy Jones and Mohammed Alzaabi}, title = {The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the {UAE}}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {23--36}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1428}, doi = {10.15394/JDFSL.2016.1428}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MartinJA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MatousekHHR16, author = {Petr Matousek and Radek Hranicky and Martin Holkovic and Ondrej Rysav{\'{y}}}, title = {On Efficiency of Distributed Password Recovery}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {79--96}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1380}, doi = {10.15394/JDFSL.2016.1380}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MatousekHHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MohammedCL16, author = {Hussam Jasim Mohammed and Nathan Luke Clarke and Fudong Li}, title = {An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {137--152}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1384}, doi = {10.15394/JDFSL.2016.1384}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MohammedCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/OlsonS16, author = {Eric Olson and Narasimha K. Shashidhar}, title = {Low Budget Forensic Drive Imaging Using {ARM} Based Single Board Computers}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {53--76}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1373}, doi = {10.15394/JDFSL.2016.1373}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/OlsonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RoweSMG16, author = {Neil C. Rowe and Riqui Schwamm and Michael McCarrin and Ralucca Gera}, title = {Making Sense of Email Addresses on Drives}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {153--174}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1385}, doi = {10.15394/JDFSL.2016.1385}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RoweSMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghCS16, author = {Monika Singh and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Security Analysis of mvHash-B Similarity Hashing}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {21--34}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1376}, doi = {10.15394/JDFSL.2016.1376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghS16, author = {Bhupendra Singh and Upasna Singh}, title = {Leveraging the Windows Amcache.hve File in Forensic Investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {37--54}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1429}, doi = {10.15394/JDFSL.2016.1429}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SpitzbergG16, author = {Brian H. Spitzberg and Jean Mark Gawron}, title = {A Research Agenda for Online Linguistic Surveillance of Threatening Messages}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {43--78}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1418}, doi = {10.15394/JDFSL.2016.1418}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SpitzbergG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ThompsonH16, author = {Marcus Thompson and Raymond Hansen}, title = {Verification of Recovered Digital Evidence on the Amazon Kindle}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {175--192}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1386}, doi = {10.15394/JDFSL.2016.1386}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ThompsonH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ZezulkaS16, author = {Lauren A. Zezulka and Kathryn C. Seigfried{-}Spellar}, title = {Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {7--26}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1415}, doi = {10.15394/JDFSL.2016.1415}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ZezulkaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.