Search dblp for Publications

export results for "toc:db/journals/jdfsl/jdfsl4.bht:"

 download as .bib file

@article{DBLP:journals/jdfsl/BestRT09,
  author       = {Peter J. Best and
                  Pall Rikhardsson and
                  Mark Toleman},
  title        = {Continuous Fraud Detection in Enterprise Systems through Audit Trail
                  Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {1},
  pages        = {39--60},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1053},
  doi          = {10.15394/JDFSL.2009.1053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BestRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BrowningK09,
  author       = {Dennis Browning and
                  Gary C. Kessler},
  title        = {Bluetooth Hacking: {A} Case Study},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {57--72},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1058},
  doi          = {10.15394/JDFSL.2009.1058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BrowningK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Chawki09,
  author       = {Mohamed Chawki},
  title        = {Online Child Sexual Abuse: The French Response},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {7--42},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1164},
  doi          = {10.15394/JDFSL.2009.1164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Chawki09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cronje09,
  author       = {Francis S. Cronj{\'{e}}},
  title        = {A Synopsis of Proposed Data Protection Legislation in {SA}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {43--50},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1165},
  doi          = {10.15394/JDFSL.2009.1165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cronje09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Fick09,
  author       = {Jacqueline Fick},
  title        = {Prevention is Better than Prosecution: Deepening the Defence against
                  Cyber Crime},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {51--72},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1166},
  doi          = {10.15394/JDFSL.2009.1166},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Fick09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Jobodwana09,
  author       = {Z. Ntozintle Jobodwana},
  title        = {Telecommunications Liberalisation in Africa: Proposed Regulatory Model
                  for the {SADC} Region},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {73--94},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1167},
  doi          = {10.15394/JDFSL.2009.1167},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Jobodwana09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KahvedzicK09,
  author       = {Damir Kahvedzic and
                  M. Tahar Kechadi},
  title        = {Correlating Orphaned Windows Registry Data Structures},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {39--56},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1057},
  doi          = {10.15394/JDFSL.2009.1057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KahvedzicK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kearns09,
  author       = {Grover S. Kearns},
  title        = {Graduate Accounting Students' Perception of {IT} Forensics: {A} Multi-Dimensional
                  Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {1},
  pages        = {5--38},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1052},
  doi          = {10.15394/JDFSL.2009.1052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kearns09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler09,
  author       = {Gary C. Kessler},
  title        = {Book Review: Cyber Security and Global Information Assurance: Threat
                  Analysis and Response Solutions},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {57--60},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1163},
  doi          = {10.15394/JDFSL.2009.1163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KulkarniGNE09,
  author       = {Asawaree Kulkarni and
                  James Goldman and
                  Brad Nabholz and
                  William Eyre},
  title        = {Detection of Steganography-Producing Software Artifacts on Crime-Related
                  Seized Computers},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {5--26},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1055},
  doi          = {10.15394/JDFSL.2009.1055},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KulkarniGNE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoW009,
  author       = {Thomas Lonardo and
                  Doug White and
                  Alan Rea},
  title        = {To License or Not to License Revisited: An Examination of State Statutes
                  Regarding Private Investigators and Digital Examiners},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {35--56},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1162},
  doi          = {10.15394/JDFSL.2009.1162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoW009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LuseMT09,
  author       = {Andy Luse and
                  Brian E. Mennecke and
                  Anthony M. Townsend},
  title        = {Electronic Forms-Based Computing for Evidentiary Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {17--34},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1161},
  doi          = {10.15394/JDFSL.2009.1161},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LuseMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SmithC09,
  author       = {Stevenson G. Smith and
                  Larry D. Crumbley},
  title        = {Defining a Forensic Audit},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {1},
  pages        = {61--80},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1054},
  doi          = {10.15394/JDFSL.2009.1054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SmithC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SutherlandDPB09,
  author       = {Iain Sutherland and
                  Gareth Davies and
                  Nick Pringle and
                  Andrew Blyth},
  title        = {The Impact of Hard Disk Firmware Steganography on Computer Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {73--84},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1059},
  doi          = {10.15394/JDFSL.2009.1059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SutherlandDPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Valli09,
  author       = {Craig Valli},
  title        = {Visualisation of Honeypot Data Using Graphviz and Afterglow},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {27--38},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1056},
  doi          = {10.15394/JDFSL.2009.1056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Valli09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ValliS09,
  author       = {Craig Valli and
                  Patryk Szewczyk},
  title        = {Insecurity by Obscurity: {A} Review of SoHo Router Literature from
                  a Network Security Perspective},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {5--16},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1160},
  doi          = {10.15394/JDFSL.2009.1160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ValliS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics