Search dblp for Publications

export results for "stream:journals/di:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/di/AagaardDAC23,
  author       = {Posie Aagaard and
                  Bijan Dinyarian and
                  Omar Abduljabbar and
                  Kim{-}Kwang Raymond Choo},
  title        = {Family locating sharing app forensics: Life360 as a case study},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301478},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301478},
  doi          = {10.1016/J.FSIDI.2022.301478},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AagaardDAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AnLH23,
  author       = {Sang Hyuk An and
                  Sangjin Lee and
                  Jaehyeok Han},
  title        = {Data reconstruction and recovery of deduplicated files having non-resident
                  attributes in {NTFS} volume},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301571},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301571},
  doi          = {10.1016/J.FSIDI.2023.301571},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AnLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndreoliLDH23,
  author       = {Anthony Andreoli and
                  Anis Lounis and
                  Mourad Debbabi and
                  Aiman Hanna},
  title        = {On the prevalence of software supply chain attacks: Empirical study
                  and investigative framework},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301508},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301508},
  doi          = {10.1016/J.FSIDI.2023.301508},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndreoliLDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AssumpcaoRMEV23,
  author       = {Matheus Bichara de Assump{\c{c}}{\~{a}}o and
                  Marcelo Abdalla dos Reis and
                  Marcos Roberto Marcondes and
                  Pedro Monteiro da Silva Eleuterio and
                  Victor Hugo Vieira},
  title        = {Forensic method for decrypting TPM-protected BitLocker volumes using
                  Intel {DCI}},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301514},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301514},
  doi          = {10.1016/J.FSIDI.2023.301514},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AssumpcaoRMEV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AwadRRAP23,
  author       = {Rima Asmar Awad and
                  Muhammad Haris Rais and
                  Michael Rogers and
                  Irfan Ahmed and
                  Vincent C. Paquit},
  title        = {Towards generic memory forensic framework for programmable logic controllers},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301513},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301513},
  doi          = {10.1016/J.FSIDI.2023.301513},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AwadRRAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BabianoMD23,
  author       = {Luis Fernandez de Loaysa Babiano and
                  Richard Macfarlane and
                  Simon R. Davies},
  title        = {Evaluation of live forensic techniques, towards Salsa20-Based cryptographic
                  ransomware mitigation},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301572},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301572},
  doi          = {10.1016/J.FSIDI.2023.301572},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BabianoMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BlankesteijnFG23,
  author       = {Matthe{\"{u}}s B. Blankesteijn and
                  Aya Fukami and
                  Zeno J. M. H. Geradts},
  title        = {Assessing data remnants in modern smartphones after factory reset},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301587},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301587},
  doi          = {10.1016/J.FSIDI.2023.301587},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BlankesteijnFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChoiBLP23,
  author       = {Geun{-}Yeong Choi and
                  Jewan Bang and
                  Sangjin Lee and
                  Jungheum Park},
  title        = {\emph{Chracer}: Memory analysis of Chromium-based browsers},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301613},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301613},
  doi          = {10.1016/J.FSIDI.2023.301613},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChoiBLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChoiL23,
  author       = {Hoyong Choi and
                  Sangjin Lee},
  title        = {Forensic analysis of {SQL} server transaction log in unallocated area
                  of file system},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301605},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301605},
  doi          = {10.1016/J.FSIDI.2023.301605},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChoiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DolejskaKVP23,
  author       = {Daniel Dolejska and
                  Michal Koutensk{\'{y}} and
                  Vladim{\'{\i}}r Vesel{\'{y}} and
                  Jan Pluskal},
  title        = {Busting up Monopoly: Methods for modern darknet marketplace forensics},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301604},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301604},
  doi          = {10.1016/J.FSIDI.2023.301604},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DolejskaKVP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DominguesFF23,
  author       = {Patr{\'{\i}}cio Domingues and
                  Jos{\'{e}} Carlos Francisco and
                  Miguel Frade},
  title        = {Post-mortem digital forensics analysis of the Zepp Life android application},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301555},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301555},
  doi          = {10.1016/J.FSIDI.2023.301555},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DominguesFF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DubettierGGR23,
  author       = {Adrien Dubettier and
                  Tanguy Gernot and
                  Emmanuel Giguet and
                  Christophe Rosenberger},
  title        = {File type identification tools for digital investigations},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301574},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301574},
  doi          = {10.1016/J.FSIDI.2023.301574},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DubettierGGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DudaniBRM23,
  author       = {Sahil Dudani and
                  Ibrahim Baggili and
                  David R. Raymond and
                  Randolph Marchany},
  title        = {The current state of cryptocurrency forensics},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301576},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301576},
  doi          = {10.1016/J.FSIDI.2023.301576},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DudaniBRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FahndrichHPRBL23,
  author       = {Johannes F{\"{a}}hndrich and
                  Wilfried Honekamp and
                  Roman Povalej and
                  Heiko Rittelmeier and
                  Silvio Berner and
                  Dirk Labudde},
  title        = {Digital forensics and strong {AI:} {A} structured literature review},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301617},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301617},
  doi          = {10.1016/J.FSIDI.2023.301617},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FahndrichHPRBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FernandesA23,
  author       = {Pedro Fernandes and
                  M{\'{a}}rio Antunes},
  title        = {Benford's law applied to digital forensic analysis},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301515},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301515},
  doi          = {10.1016/J.FSIDI.2023.301515},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FernandesA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FernandezAlvarezR23,
  author       = {Pedro Fern{\'{a}}ndez{-}{\'{A}}lvarez and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Module extraction and {DLL} hijacking detection via single or multiple
                  memory dumps},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301505},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301505},
  doi          = {10.1016/J.FSIDI.2023.301505},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FernandezAlvarezR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Findlay23,
  author       = {Benjamin Findlay},
  title        = {A review of \emph{thumbnail images} artefacts in the Linux desktop
                  and a methodology to add provenance to deleted files, using the \emph{thumbnail
                  images} artefact in combination with \emph{recent files} history,
                  and \emph{Trash} artefacts},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301498},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301498},
  doi          = {10.1016/J.FSIDI.2022.301498},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Findlay23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GongCYT23,
  author       = {Yanan Gong and
                  Kam{-}Pui Chow and
                  Siu Ming Yiu and
                  Hing{-}Fung Ting},
  title        = {Analyzing the peeling chain patterns on the Bitcoin blockchain},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301614},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301614},
  doi          = {10.1016/J.FSIDI.2023.301614},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GongCYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GostojicV23,
  author       = {Milica Matijevic Gostojic and
                  Zeljko Vukovic},
  title        = {A knowledge-based system for supporting the soundness of digital forensic
                  investigations},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301601},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301601},
  doi          = {10.1016/J.FSIDI.2023.301601},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GostojicV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GruberHF23,
  author       = {Jan Gruber and
                  Christopher James Hargreaves and
                  Felix C. Freiling},
  title        = {Contamination of digital evidence: Understanding an underexposed risk},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301501},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301501},
  doi          = {10.1016/J.FSIDI.2023.301501},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GruberHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuptaVZ23,
  author       = {Khushi Gupta and
                  Cihan Varol and
                  Bing Zhou},
  title        = {Digital forensic analysis of discord on google chrome},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301479},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301479},
  doi          = {10.1016/J.FSIDI.2022.301479},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuptaVZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeathMA23,
  author       = {Howard Heath and
                  {\'{A}}ine MacDermott and
                  Alex Akinbi},
  title        = {Forensic analysis of ephemeral messaging applications: Disappearing
                  messages or evidential data?},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301585},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301585},
  doi          = {10.1016/J.FSIDI.2023.301585},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HeathMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HilgertSJL23,
  author       = {Jan{-}Niclas Hilgert and
                  Roman Schell and
                  Carlo Jakobs and
                  Martin Lambertz},
  title        = {About the applicability of Apache2 web server memory forensics},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301610},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301610},
  doi          = {10.1016/J.FSIDI.2023.301610},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HilgertSJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HiranoK23,
  author       = {Manabu Hirano and
                  Ryotaro Kobayashi},
  title        = {{FIMAR:} Fast incremental memory acquisition and restoration system
                  for temporal-dimension forensic analysis},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301603},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301603},
  doi          = {10.1016/J.FSIDI.2023.301603},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HiranoK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HolmesB23,
  author       = {Arran Holmes and
                  William J. Buchanan},
  title        = {A framework for live host-based Bitcoin wallet forensics and triage},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301486},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301486},
  doi          = {10.1016/J.FSIDI.2022.301486},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HolmesB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman23,
  author       = {Graeme Horsman},
  title        = {Can signs of digital coercive control be evidenced in mobile operating
                  system settings? - {A} guide for first responders},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301483},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301483},
  doi          = {10.1016/J.FSIDI.2022.301483},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HurKKK23,
  author       = {Uk Hur and
                  Giyoon Kim and
                  Soojin Kang and
                  Jongsung Kim},
  title        = {Forensic analysis for multi-platform Cisco Webex},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301659},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301659},
  doi          = {10.1016/J.FSIDI.2023.301659},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HurKKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IrshadLLL23,
  author       = {Muhammad Irshad and
                  Sea Ran Cleon Liew and
                  Ngai{-}Fong Law and
                  Ka Hong Loo},
  title        = {CAM\({}_{\mbox{ID}}\): An assuasive approach to reveal source camera
                  through inconspicuous evidence},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301616},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301616},
  doi          = {10.1016/J.FSIDI.2023.301616},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IrshadLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JenningsSE23,
  author       = {Luke Jennings and
                  Matthew Sorell and
                  Hugo G. Espinosa},
  title        = {Interpreting the location data extracted from the Apple Health database},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301504},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301504},
  doi          = {10.1016/J.FSIDI.2023.301504},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JenningsSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JounLP23,
  author       = {Jihun Joun and
                  Sangjin Lee and
                  Jungheum Park},
  title        = {Discovering spoliation of evidence through identifying traces on deleted
                  files in macOS},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301502},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301502},
  doi          = {10.1016/J.FSIDI.2023.301502},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JounLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JounLP23a,
  author       = {Jihun Joun and
                  Sangjin Lee and
                  Jungheum Park},
  title        = {Data remnants analysis of document files in Windows: Microsoft 365
                  as a case study},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301612},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301612},
  doi          = {10.1016/J.FSIDI.2023.301612},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JounLP23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KadhaNBD23,
  author       = {Vijayakumar Kadha and
                  V. V. N. J. Sri Lakshmi Nandikattu and
                  Sambit Bakshi and
                  Santos Kumar Das},
  title        = {Forensic analysis of manipulation chains: {A} deep residual network
                  for detecting JPEG-manipulation-JPEG},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301623},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301623},
  doi          = {10.1016/J.FSIDI.2023.301623},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KadhaNBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KantaCS23,
  author       = {Aikaterini Kanta and
                  Iwen Coisel and
                  Mark Scanlon},
  title        = {Harder, better, faster, stronger: Optimising the performance of context-based
                  password cracking dictionaries},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301507},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301507},
  doi          = {10.1016/J.FSIDI.2023.301507},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KantaCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KerrHYKS23,
  author       = {Michael Kerr and
                  Fengling Han and
                  Xun Yi and
                  Andrei Kelarev and
                  Ron G. van Schyndel},
  title        = {A non-invasive method for the cataloguing and authentication of surveillance
                  video using on-camera blockchain participation, machine learning and
                  signal analysis},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301573},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301573},
  doi          = {10.1016/J.FSIDI.2023.301573},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KerrHYKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimOS23,
  author       = {Donghyun Kim and
                  Subin Oh and
                  Taeshik Shon},
  title        = {Digital forensic approaches for metaverse ecosystems},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301608},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301608},
  doi          = {10.1016/J.FSIDI.2023.301608},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KimOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimPL23,
  author       = {Jieon Kim and
                  Jungheum Park and
                  Sangjin Lee},
  title        = {An improved IoT forensic model to identify interconnectivity between
                  things},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301499},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301499},
  doi          = {10.1016/J.FSIDI.2022.301499},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KowalskiKK23,
  author       = {Piotr A. Kowalski and
                  Maciej Kusy and
                  Karol Kocierz},
  title        = {The forensic information identification based on machine learning
                  algorithms},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301619},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301619},
  doi          = {10.1016/J.FSIDI.2023.301619},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KowalskiKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LarsenNL23,
  author       = {Ole Halvar Larsen and
                  Hung Q. Ngo and
                  Nhien{-}An Le{-}Khac},
  title        = {A quantitative study of the law enforcement in using open source intelligence
                  techniques through undergraduate practical training},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301622},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301622},
  doi          = {10.1016/J.FSIDI.2023.301622},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LarsenNL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeHJP23,
  author       = {Jung Hwan Lee and
                  Bumsu Hyeon and
                  Oc{-}Yeub Jeon and
                  Nam In Park},
  title        = {Analysis of real-time operating systems' file systems: Built-in cameras
                  from vehicles},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301500},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301500},
  doi          = {10.1016/J.FSIDI.2023.301500},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeHJP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeLKLK23,
  author       = {Eunji Lee and
                  Seo Yeon Lee and
                  Hyeon Kwon and
                  Sungjin Lee and
                  Gi Bum Kim},
  title        = {Identification of data wiping tools based on deletion patterns in
                  ReFS {\textdollar}Logfile},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301607},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301607},
  doi          = {10.1016/J.FSIDI.2023.301607},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeLKLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LorenzSCST23,
  author       = {Scott Lorenz and
                  Stanley Stinehour and
                  Anitha Chennamaneni and
                  Abdul B. Subhani and
                  Damiano Torre},
  title        = {IoT forensic analysis: {A} family of experiments with Amazon Echo
                  devices},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301541},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301541},
  doi          = {10.1016/J.FSIDI.2023.301541},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LorenzSCST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McKeownB23,
  author       = {Sean McKeown and
                  William J. Buchanan},
  title        = {Hamming distributions of popular perceptual hashing techniques},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301509},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301509},
  doi          = {10.1016/J.FSIDI.2023.301509},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/McKeownB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MettigGCR23,
  author       = {Raphaela Mettig and
                  Charles Glass and
                  Andrew Case and
                  Golden G. Richard III},
  title        = {Assessing the threat of Rosetta 2 on Apple Silicon devices},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301618},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301618},
  doi          = {10.1016/J.FSIDI.2023.301618},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MettigGCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MuriasLM23,
  author       = {Juli{\'{a}}n Garc{\'{\i}}a Murias and
                  Douglas Levick and
                  Sean McKeown},
  title        = {A forensic analysis of streaming platforms on Android {OS}},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301485},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301485},
  doi          = {10.1016/J.FSIDI.2022.301485},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MuriasLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Neale23,
  author       = {Christopher Neale},
  title        = {Fool me once: {A} systematic review of techniques to authenticate
                  digital artefacts},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301516},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301516},
  doi          = {10.1016/J.FSIDI.2023.301516},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Neale23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NgoL23,
  author       = {Hung Q. Ngo and
                  Nhien{-}An Le{-}Khac},
  title        = {Ontology-based case study management towards bridging training and
                  actual investigation gaps in digital forensics},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301621},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301621},
  doi          = {10.1016/J.FSIDI.2023.301621},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NgoL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NisiotiLMP23,
  author       = {Antonia Nisioti and
                  George Loukas and
                  Alexios Mylonas and
                  Emmanouil Panaousis},
  title        = {Forensics for multi-stage cyber incidents: Survey and future directions},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301480},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301480},
  doi          = {10.1016/J.FSIDI.2022.301480},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NisiotiLMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NissanWA23,
  author       = {Mahfuzul I. Nissan and
                  James Wagner and
                  Sharmin Aktar},
  title        = {Database memory forensics: {A} machine learning approach to reverse-engineer
                  query activity},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301503},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301503},
  doi          = {10.1016/J.FSIDI.2023.301503},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NissanWA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NordvikA23,
  author       = {Rune Nordvik and
                  Stefan Axelsson},
  title        = {Corrigendum to "It is about time-do exFAT implementations handle timestamps
                  correctly?" [Forensic Science International: Digital Investigation
                  42-43 {(2022)} 301476]},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301542},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301542},
  doi          = {10.1016/J.FSIDI.2023.301542},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NordvikA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NunesDF23,
  author       = {Fabian Nunes and
                  Patr{\'{\i}}cio Domingues and
                  Miguel Frade},
  title        = {Post-mortem digital forensic analysis of the Garmin Connect application
                  for Android},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301624},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301624},
  doi          = {10.1016/J.FSIDI.2023.301624},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NunesDF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/QamhanAS23,
  author       = {Mustafa A. Qamhan and
                  Yousef Ajami Alotaibi and
                  Sid{-}Ahmed Selouani},
  title        = {Transformer for authenticating the source microphone in digital audio
                  forensics},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301539},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301539},
  doi          = {10.1016/J.FSIDI.2023.301539},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/QamhanAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RaisAA23,
  author       = {Muhammad Haris Rais and
                  Muhammad Ahsan and
                  Irfan Ahmed},
  title        = {FRoMEPP: Digital forensic readiness framework for material extrusion
                  based 3D printing process},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301510},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301510},
  doi          = {10.1016/J.FSIDI.2023.301510},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RaisAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RathoreNSS23,
  author       = {Hemant Rathore and
                  Adarsh Nandanwar and
                  Sanjay K. Sahay and
                  Mohit Sewak},
  title        = {Adversarial superiority in android malware detection: Lessons from
                  reinforcement learning based evasion attacks and defenses},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301511},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301511},
  doi          = {10.1016/J.FSIDI.2023.301511},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RathoreNSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RaymerMA23,
  author       = {Emma Raymer and
                  {\'{A}}ine MacDermott and
                  Alex Akinbi},
  title        = {Virtual reality forensics: Forensic analysis of Meta Quest 2},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301658},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301658},
  doi          = {10.1016/J.FSIDI.2023.301658},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RaymerMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoopakKPA23,
  author       = {Monika Roopak and
                  Saad Khan and
                  Simon Parkinson and
                  Rachel Armitage},
  title        = {Comparison of deep learning classification models for facial image
                  age estimation in digital forensic investigations},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301637},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301637},
  doi          = {10.1016/J.FSIDI.2023.301637},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoopakKPA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SadineniPB23,
  author       = {Lakshminarayana Sadineni and
                  Emmanuel S. Pilli and
                  Ramesh Babu Battula},
  title        = {ProvLink-IoT: {A} novel provenance model for Link-Layer Forensics
                  in IoT networks},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301600},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301600},
  doi          = {10.1016/J.FSIDI.2023.301600},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SadineniPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SandvikFAA23,
  author       = {Jens{-}Petter Sandvik and
                  Katrin Franke and
                  Habtamu Abie and
                  Andr{\'{e}} {\AA}rnes},
  title        = {Evidence in the fog - Triage in fog computing systems},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301506},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301506},
  doi          = {10.1016/J.FSIDI.2023.301506},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SandvikFAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ScanlonBHHS23,
  author       = {Mark Scanlon and
                  Frank Breitinger and
                  Christopher Hargreaves and
                  Jan{-}Niclas Hilgert and
                  John Sheppard},
  title        = {ChatGPT for digital forensic investigation: The good, the bad, and
                  the unknown},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301609},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301609},
  doi          = {10.1016/J.FSIDI.2023.301609},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ScanlonBHHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ScanlonNG23,
  author       = {Mark Scanlon and
                  Bruce J. Nikkel and
                  Zeno J. M. H. Geradts},
  title        = {Digital forensic investigation in the age of ChatGPT},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301543},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301543},
  doi          = {10.1016/J.FSIDI.2023.301543},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ScanlonNG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SoltaniH23,
  author       = {Somayeh Soltani and
                  Seyed{-}Amin Hosseini{-}Seno},
  title        = {Detecting the software usage on a compromised system: {A} triage solution
                  for digital forensics},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  pages        = {301484},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301484},
  doi          = {10.1016/J.FSIDI.2022.301484},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SoltaniH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SonKJBP23,
  author       = {Jihun Son and
                  Gyubin Kim and
                  Hyunwoo Jung and
                  Jewan Bang and
                  Jungheum Park},
  title        = {\emph{IF-DSS}: {A} forensic investigation framework for decentralized
                  storage services},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301611},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301611},
  doi          = {10.1016/J.FSIDI.2023.301611},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SonKJBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SongO23,
  author       = {Kwangkeun Song and
                  Dong Bin Oh},
  title        = {Bike computer forensics: An efficient and robust method for {FIT}
                  file recovery},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  number       = {Supplement},
  pages        = {301606},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301606},
  doi          = {10.1016/J.FSIDI.2023.301606},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SongO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Spichiger23,
  author       = {Hannes Spichiger},
  title        = {A likelihood ratio approach for the evaluation of single point device
                  locations},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {44},
  number       = {Supplement},
  pages        = {301512},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301512},
  doi          = {10.1016/J.FSIDI.2023.301512},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Spichiger23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Stoykova23,
  author       = {Radina Stoykova},
  title        = {\emph{Encrochat}: The hacker with a warrant and fair trials?},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301602},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301602},
  doi          = {10.1016/J.FSIDI.2023.301602},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Stoykova23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StoykovaF23,
  author       = {Radina Stoykova and
                  Katrin Franke},
  title        = {Reliability validation enabling framework {(RVEF)} for digital forensics
                  in criminal investigations},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301554},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301554},
  doi          = {10.1016/J.FSIDI.2023.301554},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/StoykovaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SundeF23,
  author       = {Nina Sunde and
                  Virginia N. L. Franqueira},
  title        = {Adding transparency to uncertainty: An argument-based method for evaluative
                  opinions},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301657},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301657},
  doi          = {10.1016/J.FSIDI.2023.301657},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SundeF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TokC23,
  author       = {Yee Ching Tok and
                  Sudipta Chattopadhyay},
  title        = {Identifying threats, cybercrime and digital forensic opportunities
                  in Smart City Infrastructure via threat modeling},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {45},
  pages        = {301540},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301540},
  doi          = {10.1016/J.FSIDI.2023.301540},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TokC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TrozzeDK23,
  author       = {Arianna Trozze and
                  Toby Davies and
                  Bennett Kleinberg},
  title        = {Of degens and defrauders: Using open-source investigative tools to
                  investigate decentralized finance frauds and money laundering},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {46},
  pages        = {301575},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301575},
  doi          = {10.1016/J.FSIDI.2023.301575},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TrozzeDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WestlakeG23,
  author       = {Bryce Westlake and
                  Enrique Guerra},
  title        = {Using file and folder naming and structuring to improve automated
                  detection of child sexual abuse images on the Dark Web},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301620},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301620},
  doi          = {10.1016/J.FSIDI.2023.301620},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WestlakeG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZandwijkLB23,
  author       = {Jan Peter van Zandwijk and
                  Kim Lensen and
                  Abdul Boztas},
  title        = {Have you been upstairs? On the accuracy of registrations of ascended
                  and descended floors in iPhones},
  journal      = {Forensic Sci. Int. Digit. Investig.},
  volume       = {47},
  pages        = {301660},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.fsidi.2023.301660},
  doi          = {10.1016/J.FSIDI.2023.301660},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZandwijkLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AkbariAEKLB22,
  author       = {Younes Akbari and
                  Somaya Al{-}M{\'{a}}adeed and
                  Omar Elharrouss and
                  Fouad Khelifi and
                  Ashref Lawgaly and
                  Ahmed Bouridane},
  title        = {Digital forensic analysis for source video identification: {A} survey},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301390},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301390},
  doi          = {10.1016/J.FSIDI.2022.301390},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AkbariAEKLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AkilalK22,
  author       = {Abdellah Akilal and
                  M. Tahar Kechadi},
  title        = {An improved forensic-by-design framework for cloud computing with
                  systems engineering standard compliance},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301315},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301315},
  doi          = {10.1016/J.FSIDI.2021.301315},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AkilalK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BahamazavaN22,
  author       = {Katsiaryna Bahamazava and
                  Rohan Nanda},
  title        = {The shift of DarkNet illegal drug trade preferences in cryptocurrency:
                  The question of traceability and deterrence},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301377},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301377},
  doi          = {10.1016/J.FSIDI.2022.301377},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BahamazavaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BangPL22,
  author       = {Jewan Bang and
                  Jungheum Park and
                  Sangjin Lee},
  title        = {Vision: An empirical framework for examiners to accessing password-protected
                  resources for on-the-scene digital investigations},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301376},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301376},
  doi          = {10.1016/J.FSIDI.2022.301376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BangPL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BreitingerZQ22,
  author       = {Frank Breitinger and
                  Xiaolu Zhang and
                  Darren Quick},
  title        = {A forensic analysis of rclone and rclone's prospects for digital forensic
                  investigations of cloud storage},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301443},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301443},
  doi          = {10.1016/J.FSIDI.2022.301443},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BreitingerZQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CalderoniM22,
  author       = {Luca Calderoni and
                  Antonio Magnani},
  title        = {The impact of face image compression in future generation electronic
                  identity documents},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301345},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301345},
  doi          = {10.1016/J.FSIDI.2022.301345},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CalderoniM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChamotGH22,
  author       = {Frederic Chamot and
                  Zeno J. M. H. Geradts and
                  Evert Haasdijk},
  title        = {Deepfake forensics: Cross-manipulation robustness of feedforward-
                  and recurrent convolutional forgery detection methods},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301374},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301374},
  doi          = {10.1016/J.FSIDI.2022.301374},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChamotGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ClosserB22,
  author       = {Dayton Closser and
                  Elias Bou{-}Harb},
  title        = {A live digital forensics approach for quantum mechanical computers},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301341},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301341},
  doi          = {10.1016/J.FSIDI.2022.301341},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ClosserB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DaviesMB22,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {NapierOne: {A} modern mixed file data set alternative to Govdocs1},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301330},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301330},
  doi          = {10.1016/J.FSIDI.2021.301330},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DaviesMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DavisMA22,
  author       = {Megan Davis and
                  Bridget T. McInnes and
                  Irfan Ahmed},
  title        = {Forensic investigation of instant messaging services on linux {OS:}
                  Discord and Slack as case studies},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301401},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301401},
  doi          = {10.1016/J.FSIDI.2022.301401},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DavisMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fernandez-Alvarez22,
  author       = {Pedro Fern{\'{a}}ndez{-}{\'{A}}lvarez and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Extraction and analysis of retrievable memory artifacts from Windows
                  Telegram Desktop application},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301342},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301342},
  doi          = {10.1016/J.FSIDI.2022.301342},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fernandez-Alvarez22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GobelMTBM22,
  author       = {Thomas G{\"{o}}bel and
                  Stephan Maltan and
                  Jan T{\"{u}}rr and
                  Harald Baier and
                  Florian Mann},
  title        = {ForTrace - {A} holistic forensic data set synthesis framework},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301344},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301344},
  doi          = {10.1016/J.FSIDI.2022.301344},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GobelMTBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GobelUBB22,
  author       = {Thomas G{\"{o}}bel and
                  Frieder Uhlig and
                  Harald Baier and
                  Frank Breitinger},
  title        = {{FRASHER} - {A} framework for automated evaluation of similarity hashing},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301407},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301407},
  doi          = {10.1016/J.FSIDI.2022.301407},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GobelUBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GoncalvesDSAB22,
  author       = {Patrik Gon{\c{c}}alves and
                  Klara Dolos and
                  Michelle Stebner and
                  Andreas Attenberger and
                  Harald Baier},
  title        = {Revisiting the dataset gap problem - On availability, assessment and
                  perspective of mobile forensic corpora},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301439},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301439},
  doi          = {10.1016/J.FSIDI.2022.301439},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GoncalvesDSAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GongCYT22,
  author       = {Yanan Gong and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Hing{-}Fung Ting},
  title        = {Sensitivity analysis for a Bitcoin simulation model},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301449},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301449},
  doi          = {10.1016/J.FSIDI.2022.301449},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GongCYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GruberVBF22,
  author       = {Jan Gruber and
                  Lena L. Voigt and
                  Zinaida Benenson and
                  Felix C. Freiling},
  title        = {Foundations of cybercriminalistics: From general process models to
                  case-specific concretizations in cybercrime investigations},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301438},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301438},
  doi          = {10.1016/J.FSIDI.2022.301438},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GruberVBF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HiranoHK22,
  author       = {Manabu Hirano and
                  Ryo Hodota and
                  Ryotaro Kobayashi},
  title        = {RanSAP: An open dataset of ransomware storage access patterns for
                  training machine learning models},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301314},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301314},
  doi          = {10.1016/J.FSIDI.2021.301314},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HiranoHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman22,
  author       = {Graeme Horsman},
  title        = {Conducting a 'manual examination' of a device as part of a digital
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301331},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301331},
  doi          = {10.1016/J.FSIDI.2021.301331},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman22a,
  author       = {Graeme Horsman},
  title        = {Defining principles for preserving privacy in digital forensic examinations},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301350},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301350},
  doi          = {10.1016/J.FSIDI.2022.301350},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalKMSH22,
  author       = {Farkhund Iqbal and
                  Zainab Khalid and
                  Andrew Marrington and
                  Babar Shah and
                  Patrick C. K. Hung},
  title        = {Forensic investigation of Google Meet for memory and browser artifacts},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301448},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301448},
  doi          = {10.1016/J.FSIDI.2022.301448},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IqbalKMSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JakobsLH22,
  author       = {Carlo Jakobs and
                  Martin Lambertz and
                  Jan{-}Niclas Hilgert},
  title        = {ssdeeper: Evaluating and improving ssdeep},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301402},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301402},
  doi          = {10.1016/J.FSIDI.2022.301402},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JakobsLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Jaquet-Chiffelle22,
  author       = {David{-}Olivier Jaquet{-}Chiffelle and
                  Eoghan Casey and
                  Jonathan Bourquenoud},
  title        = {Corrigendum to "Tamperproof timestamped provenance ledger using blockchain
                  technology{\({_\ast}\)}" [Forens. Sci. Int.: Digit. Invest. 33 {(2020)}
                  300977]},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301332},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301332},
  doi          = {10.1016/J.FSIDI.2022.301332},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Jaquet-Chiffelle22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JohnsonVSGB22,
  author       = {Hailey Johnson and
                  Karl Volk and
                  Robert Serafin and
                  Cinthya Grajeda and
                  Ibrahim M. Baggili},
  title        = {Alt-tech social forensics: Forensic analysis of alternative social
                  networking applications},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301406},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301406},
  doi          = {10.1016/J.FSIDI.2022.301406},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JohnsonVSGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhaireK22,
  author       = {Pushpajit Khaire and
                  Praveen Kumar},
  title        = {A semi-supervised deep learning based video anomaly detection framework
                  using {RGB-D} for surveillance of real-world critical environments},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301346},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301346},
  doi          = {10.1016/J.FSIDI.2022.301346},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhaireK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimKSYSLK22,
  author       = {Soram Kim and
                  Giyoon Kim and
                  Sumin Shin and
                  Byungchul Youn and
                  Jian Song and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Methods for recovering deleted data from the Realm database: Case
                  study on Minitalk and Xabber},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301353},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301353},
  doi          = {10.1016/J.FSIDI.2022.301353},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimKSYSLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LamshoftNHVD22,
  author       = {Kevin Lamsh{\"{o}}ft and
                  Tom Neubert and
                  Jonas Hielscher and
                  Claus Vielhauer and
                  Jana Dittmann},
  title        = {Knock, knock, log: Threat analysis, detection {\&} mitigation
                  of covert channels in syslog using port scans as cover},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301335},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301335},
  doi          = {10.1016/J.FSIDI.2022.301335},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LamshoftNHVD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LiSL22,
  author       = {Qi Li and
                  Giuliano Sovernigo and
                  Xiaodong Lin},
  title        = {BlackFeather: {A} framework for background noise forensics},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301396},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301396},
  doi          = {10.1016/J.FSIDI.2022.301396},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LiSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MacDermottMISHM22,
  author       = {{\'{A}}ine MacDermott and
                  Michal Motylinski and
                  Farkhund Iqbal and
                  Kellyann Stamp and
                  Mohammed Hussain and
                  Andrew Marrington},
  title        = {Using deep learning to detect social media 'trolls'},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301446},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301446},
  doi          = {10.1016/J.FSIDI.2022.301446},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MacDermottMISHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MannaCAR22,
  author       = {Modhuparna Manna and
                  Andrew Case and
                  Aisha I. Ali{-}Gombe and
                  Golden G. Richard III},
  title        = {Memory analysis of .NET and .Net Core applications},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301404},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301404},
  doi          = {10.1016/J.FSIDI.2022.301404},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MannaCAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Marshall22,
  author       = {Angus M. Marshall},
  title        = {The unwanted effects of imprecise language in forensic science standards},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301349},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301349},
  doi          = {10.1016/J.FSIDI.2022.301349},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Marshall22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NealeKPYN22,
  author       = {Christopher Neale and
                  Ian Kennedy and
                  Blaine A. Price and
                  Yijun Yu and
                  Bashar Nuseibeh},
  title        = {The case for Zero Trust Digital Forensics},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301352},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301352},
  doi          = {10.1016/J.FSIDI.2022.301352},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NealeKPYN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NguyenOA22,
  author       = {Thanh Nguyen and
                  Meni Orenbach and
                  Ahmad Atamli},
  title        = {Live system call trace reconstruction on Linux},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301398},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301398},
  doi          = {10.1016/J.FSIDI.2022.301398},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NguyenOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel22,
  author       = {Bruce J. Nikkel},
  title        = {Editorial},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301388},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301388},
  doi          = {10.1016/J.FSIDI.2022.301388},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkL22,
  author       = {Sungha Park and
                  Sangjin Lee},
  title        = {DiagAnalyzer: User behavior analysis and visualization using Windows
                  Diagnostics logs},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301450},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301450},
  doi          = {10.1016/J.FSIDI.2022.301450},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkLYK22,
  author       = {Myungseo Park and
                  Sehoon Lee and
                  Okyeon Yi and
                  Jongsung Kim},
  title        = {A study on data acquisition based on the Huawei smartphone backup
                  protocol},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301393},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301393},
  doi          = {10.1016/J.FSIDI.2022.301393},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkLYK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ProfTC22,
  author       = {Felix Olu Bankole and
                  Ayankunle A. Taiwo and
                  Ivan Claims},
  title        = {An extended digital forensic readiness and maturity model},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301348},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301348},
  doi          = {10.1016/J.FSIDI.2022.301348},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ProfTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RaisALA22,
  author       = {Muhammad Haris Rais and
                  Rima Asmar Awad and
                  Juan Lopez Jr. and
                  Irfan Ahmed},
  title        = {Memory forensic analysis of a programmable logic controller in industrial
                  control systems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301339},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301339},
  doi          = {10.1016/J.FSIDI.2022.301339},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RaisALA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Rana0R22,
  author       = {Md. Mehedi Rahman Rana and
                  Abul Hasnat and
                  G. M. Atiqur Rahaman},
  title        = {{SMIFD-1000:} Social media image forgery detection database},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301392},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301392},
  doi          = {10.1016/J.FSIDI.2022.301392},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Rana0R22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SadineniPB22,
  author       = {Lakshminarayana Sadineni and
                  Emmanuel S. Pilli and
                  Ramesh Babu Battula},
  title        = {ProvNet-IoT: Provenance based network layer forensics in Internet
                  of Things},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301441},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301441},
  doi          = {10.1016/J.FSIDI.2022.301441},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SadineniPB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SandvikFAA22,
  author       = {Jens{-}Petter Sandvik and
                  Katrin Franke and
                  Habtamu Abie and
                  Andr{\'{e}} {\AA}rnes},
  title        = {Quantifying data volatility for IoT forensics with examples from Contiki
                  {OS}},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301343},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301343},
  doi          = {10.1016/J.FSIDI.2022.301343},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SandvikFAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderDLDF22,
  author       = {Janine Schneider and
                  Linus D{\"{u}}sel and
                  Benedikt Lorch and
                  Julia Drafz and
                  Felix C. Freiling},
  title        = {Prudent design principles for digital tampering experiments},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301334},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301334},
  doi          = {10.1016/J.FSIDI.2022.301334},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderDLDF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderEF22,
  author       = {Janine Schneider and
                  Maximilian Eichhorn and
                  Felix C. Freiling},
  title        = {Ambiguous file system partitions},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301399},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301399},
  doi          = {10.1016/J.FSIDI.2022.301399},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderEF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SentanoeDR22,
  author       = {Stewart Sentanoe and
                  Thomas Dangl and
                  Hans P. Reiser},
  title        = {\emph{KVMIveggur}: Flexible, secure, and efficient support for self-service
                  virtual machine introspection},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301397},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301397},
  doi          = {10.1016/J.FSIDI.2022.301397},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SentanoeDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SentanoeR22,
  author       = {Stewart Sentanoe and
                  Hans P. Reiser},
  title        = {\emph{SSHkex}: Leveraging virtual machine introspection for extracting
                  {SSH} keys and decrypting {SSH} network traffic},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301337},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301337},
  doi          = {10.1016/J.FSIDI.2022.301337},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SentanoeR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SewakSR22,
  author       = {Mohit Sewak and
                  Sanjay K. Sahay and
                  Hemant Rathore},
  title        = {Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture
                  Search for malware detection and forensics},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301444},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301444},
  doi          = {10.1016/J.FSIDI.2022.301444},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SewakSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SewakSR22a,
  author       = {Mohit Sewak and
                  Sanjay K. Sahay and
                  Hemant Rathore},
  title        = {GreenForensics: Deep hybrid edge-cloud detection and forensics system
                  for battery-performance-balance conscious devices},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301445},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301445},
  doi          = {10.1016/J.FSIDI.2022.301445},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SewakSR22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShiCG22,
  author       = {Chen Shi and
                  Chris Chao{-}Chun Cheng and
                  Yong Guan},
  title        = {LibDroid: Summarizing information flow of android native libraries
                  via static analysis},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301405},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301405},
  doi          = {10.1016/J.FSIDI.2022.301405},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShiCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShinCS22,
  author       = {Jiho Shin and
                  Hyunpyo Choi and
                  Jung{-}Taek Seo},
  title        = {A study on command block collection and restoration techniques through
                  detection of project file manipulation on engineering workstation
                  of industrial control system},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301354},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301354},
  doi          = {10.1016/J.FSIDI.2022.301354},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShinCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShinKKK22,
  author       = {Sumin Shin and
                  Giyoon Kim and
                  Soram Kim and
                  Jongsung Kim},
  title        = {Forensic analysis of note and journal applications},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301355},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301355},
  doi          = {10.1016/J.FSIDI.2022.301355},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShinKKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SinghKGCS22,
  author       = {Monika Singh and
                  Anviksha Khunteta and
                  Mohona Ghosh and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {FbHash-E: {A} time and memory efficient version of FbHash similarity
                  hashing algorithm},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301375},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301375},
  doi          = {10.1016/J.FSIDI.2022.301375},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SinghKGCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Solanke22,
  author       = {Abiodun A. Solanke},
  title        = {Explainable digital forensics {AI:} Towards mitigating distrust in
                  AI-based digital forensics analysis using interpretable models},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301403},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301403},
  doi          = {10.1016/J.FSIDI.2022.301403},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Solanke22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sommer22,
  author       = {Peter Sommer},
  title        = {Evidence from hacking: {A} few tiresome problems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301333},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301333},
  doi          = {10.1016/J.FSIDI.2022.301333},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sommer22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SonKOK22,
  author       = {Jihun Son and
                  Yeong Woong Kim and
                  Dong Bin Oh and
                  Kyounggon Kim},
  title        = {Forensic analysis of instant messengers: Decrypt Signal, Wickr, and
                  Threema},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301347},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301347},
  doi          = {10.1016/J.FSIDI.2022.301347},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SonKOK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StoykovaAFA22,
  author       = {Radina Stoykova and
                  Stig Andersen and
                  Katrin Franke and
                  Stefan Axelsson},
  title        = {Reliability assessment of digital forensic investigations in the Norwegian
                  police},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301351},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301351},
  doi          = {10.1016/J.FSIDI.2022.301351},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/StoykovaAFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SumailaB22,
  author       = {Faisal Sumaila and
                  Hayretdin Bahsi},
  title        = {Digital forensic analysis of mobile automotive maintenance applications},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301440},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301440},
  doi          = {10.1016/J.FSIDI.2022.301440},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SumailaB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sunde22,
  author       = {Nina Sunde},
  title        = {Strategies for safeguarding examiner objectivity and evidence reliability
                  during digital forensic investigations},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301317},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301317},
  doi          = {10.1016/J.FSIDI.2021.301317},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sunde22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThierryM22,
  author       = {Aur{\'{e}}lien Thierry and
                  Tilo M{\"{u}}ller},
  title        = {A systematic approach to understanding {MACB} timestamps on Unix-like
                  systems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301338},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301338},
  doi          = {10.1016/J.FSIDI.2022.301338},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThierryM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThomasEB22,
  author       = {Tyler Thomas and
                  Tiffanie Edwards and
                  Ibrahim M. Baggili},
  title        = {BlockQuery: Toward forensically sound cryptocurrency investigation},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301340},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301340},
  doi          = {10.1016/J.FSIDI.2022.301340},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThomasEB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThorntonZ22,
  author       = {Greg Thornton and
                  Pooneh Bagheri Zadeh},
  title        = {An investigation into Unmanned Aerial System {(UAS)} forensics: Data
                  extraction {\&} analysis},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301379},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301379},
  doi          = {10.1016/J.FSIDI.2022.301379},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThorntonZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VasilarasDKR22,
  author       = {Alexandros Vasilaras and
                  Donatos Dosis and
                  Michael Kotsis and
                  Panagiotis Rizomiliotis},
  title        = {Retrieving deleted records from Telegram},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301447},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301447},
  doi          = {10.1016/J.FSIDI.2022.301447},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VasilarasDKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VinkSBZ22,
  author       = {Marouschka Vink and
                  Marjan Sjerps and
                  Abdul Boztas and
                  Jan Peter van Zandwijk},
  title        = {Likelihood ratio method for the interpretation of iPhone health app
                  data in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301389},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301389},
  doi          = {10.1016/J.FSIDI.2022.301389},
  timestamp    = {Mon, 11 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VinkSBZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WangLCC22,
  author       = {Tianyi Wang and
                  Ming Liu and
                  Wei Cao and
                  Kam{-}Pui Chow},
  title        = {Deepfake noise investigation and detection},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301395},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301395},
  doi          = {10.1016/J.FSIDI.2022.301395},
  timestamp    = {Mon, 28 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WangLCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WangZDTB22,
  author       = {Enoch Wang and
                  Samuel Zurowski and
                  Orion Duffy and
                  Tyler Thomas and
                  Ibrahim M. Baggili},
  title        = {Juicing {V8:} {A} primary account for the memory forensics of the
                  {V8} JavaScript engine},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301400},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301400},
  doi          = {10.1016/J.FSIDI.2022.301400},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WangZDTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WuSDL22,
  author       = {Songyang Wu and
                  Wenqi Sun and
                  Zhiguo Ding and
                  Shanjun Liu},
  title        = {Cloud Evidence Tracing System: An integrated forensics investigation
                  system for large-scale public cloud platform},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301391},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301391},
  doi          = {10.1016/J.FSIDI.2022.301391},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WuSDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YangKBLP22,
  author       = {Jihyeok Yang and
                  Jieon Kim and
                  Jewan Bang and
                  Sangjin Lee and
                  Jungheum Park},
  title        = {{CATCH:} Cloud Data Acquisition through Comprehensive and Hybrid Approaches},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301442},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301442},
  doi          = {10.1016/J.FSIDI.2022.301442},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/YangKBLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZubairAYA22,
  author       = {Nauman Zubair and
                  Adeen Ayub and
                  Hyunguk Yoo and
                  Irfan Ahmed},
  title        = {{PEM:} Remote forensic acquisition of {PLC} memory in industrial control
                  systems},
  journal      = {Digit. Investig.},
  volume       = {40},
  number       = {Supplement},
  pages        = {301336},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301336},
  doi          = {10.1016/J.FSIDI.2022.301336},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZubairAYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AbbasHSZ21,
  author       = {Syed Ghazanfar Abbas and
                  Fabiha Hashmat and
                  Ghalib A. Shah and
                  Kashif Zafar},
  title        = {Generic signature development for IoT Botnet families},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301224},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301224},
  doi          = {10.1016/J.FSIDI.2021.301224},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AbbasHSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AbrahamNMTR21,
  author       = {Joshua Abraham and
                  Ronnie Ng and
                  Marie Morelato and
                  Mark Tahtouh and
                  Claude Roux},
  title        = {Automatically classifying crime scene images using machine learning
                  methodologies},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301273},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301273},
  doi          = {10.1016/J.FSIDI.2021.301273},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AbrahamNMTR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AhmedKLB21,
  author       = {Farah Ahmed and
                  Fouad Khelifi and
                  Ashref Lawgaly and
                  Ahmed Bouridane},
  title        = {A machine learning-based approach for picture acquisition timeslot
                  prediction using defective pixels},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301311},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301311},
  doi          = {10.1016/J.FSIDI.2021.301311},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AhmedKLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AkinbiO21,
  author       = {Alex Akinbi and
                  Ehizojie Ojie},
  title        = {Forensic analysis of open-source {XMPP} multi-client social networking
                  apps on iOS devices},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301122},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301122},
  doi          = {10.1016/J.FSIDI.2021.301122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AkinbiO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Alam21,
  author       = {Shahid Alam},
  title        = {Applying Natural Language Processing for detecting malicious patterns
                  in Android applications},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301270},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301270},
  doi          = {10.1016/J.FSIDI.2021.301270},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Alam21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlendalAD21,
  author       = {Gunnar Alendal and
                  Stefan Axelsson and
                  Geir Olav Dyrkolbotn},
  title        = {Chip chop - smashing the mobile phone secure chip for fun and digital
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301191},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301191},
  doi          = {10.1016/J.FSIDI.2021.301191},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AlendalAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndaDBLS21,
  author       = {Felix Anda and
                  Edward Dixon and
                  Elias Bou{-}Harb and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Vec2UAge: Enhancing underage age estimation performance through facial
                  embeddings},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301119},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301119},
  doi          = {10.1016/J.FSIDI.2021.301119},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndaDBLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaracchiSIGP21,
  author       = {Daniele Baracchi and
                  Dasara Shullani and
                  Massimo Iuliani and
                  Damiano Giani and
                  Alessandro Piva},
  title        = {Camera Obscura: Exploiting in-camera processing for image counter
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301213},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301213},
  doi          = {10.1016/J.FSIDI.2021.301213},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaracchiSIGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Barr-SmithFLRRS21,
  author       = {Frederick Barr{-}Smith and
                  Thomas Farrant and
                  Benjamin Leonard{-}Lagarde and
                  Danny Rigby and
                  Sash Rigby and
                  Frederick Sibley{-}Calder},
  title        = {Dead Man's Switch: Forensic Autopsy of the Nintendo Switch},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301110},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301110},
  doi          = {10.1016/J.FSIDI.2021.301110},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Barr-SmithFLRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BotacinMCHG21,
  author       = {Marcus Botacin and
                  Vitor Hugo Galhardo Moia and
                  Fabricio Ceschin and
                  Marco Aur{\'{e}}lio Amaral Henriques and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {Understanding uses and misuses of similarity hashing functions for
                  malware detection and family clustering in actual scenarios},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301220},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301220},
  doi          = {10.1016/J.FSIDI.2021.301220},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BotacinMCHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BuquerinCH21,
  author       = {Kevin Klaus Gomez Buquerin and
                  Christopher Corbett and
                  Hans{-}Joachim Hof},
  title        = {A generalized approach to automotive forensics},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301111},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301111},
  doi          = {10.1016/J.FSIDI.2021.301111},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BuquerinCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChengSGG21,
  author       = {Chris Chao{-}Chun Cheng and
                  Chen Shi and
                  Neil Zhenqiang Gong and
                  Yong Guan},
  title        = {LogExtractor: Extracting digital evidence from android log messages
                  via string and taint analysis},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301193},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301193},
  doi          = {10.1016/J.FSIDI.2021.301193},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChengSGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChoiPL21,
  author       = {Jisung Choi and
                  Jungheum Park and
                  Sangjin Lee},
  title        = {Forensic exploration on windows File History},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301134},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301134},
  doi          = {10.1016/J.FSIDI.2021.301134},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChoiPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChopadeP21,
  author       = {Rupali M. Chopade and
                  Vinod Keshaorao Pachghare},
  title        = {A data recovery technique for Redis using internal dictionary structure},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301218},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301218},
  doi          = {10.1016/J.FSIDI.2021.301218},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChopadeP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DominguesAF21,
  author       = {Patr{\'{\i}}cio Domingues and
                  Lu{\'{\i}}s Miguel Andrade and
                  Miguel Frade},
  title        = {Microsoft's Your Phone environment from a digital forensic perspective},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301177},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301177},
  doi          = {10.1016/J.FSIDI.2021.301177},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DominguesAF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FaustTMF21,
  author       = {Fabian Faust and
                  Aur{\'{e}}lien Thierry and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Selective Imaging of File System Data on Live Systems},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301115},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301115},
  doi          = {10.1016/J.FSIDI.2021.301115},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FaustTMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FukamiSG21,
  author       = {Aya Fukami and
                  Radina Stoykova and
                  Zeno J. M. H. Geradts},
  title        = {A new model for forensic data extraction from encrypted mobile devices},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301169},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301169},
  doi          = {10.1016/J.FSIDI.2021.301169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FukamiSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GeXQZ21,
  author       = {Song Ge and
                  Ming Xu and
                  Tong Qiao and
                  Ning Zheng},
  title        = {A novel file carving algorithm for docker container logs recorded
                  by json-file logging driver},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301272},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301272},
  doi          = {10.1016/J.FSIDI.2021.301272},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GeXQZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GeradtsN21,
  author       = {Zeno J. M. H. Geradts and
                  Bruce J. Nikkel},
  title        = {Change and diversity},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301206},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301206},
  doi          = {10.1016/J.FSIDI.2021.301206},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GeradtsN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GomezMGM21,
  author       = {Juan Manuel Castelo G{\'{o}}mez and
                  Javier Carrillo Mond{\'{e}}jar and
                  Jos{\'{e}} Rold{\'{a}}n G{\'{o}}mez and
                  Jos{\'{e}} Luis Mart{\'{\i}}nez Mart{\'{\i}}nez},
  title        = {Developing an IoT forensic methodology. {A} concept proposal},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301114},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301114},
  doi          = {10.1016/J.FSIDI.2021.301114},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GomezMGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Gozukara21,
  author       = {Furkan G{\"{o}}z{\"{u}}kara},
  title        = {Challenges and possible severe legal consequences of application users
                  identification from CNG-Logs},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301312},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301312},
  doi          = {10.1016/J.FSIDI.2021.301312},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Gozukara21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrossBM21,
  author       = {Tobias Gro{\ss} and
                  Marcel Busch and
                  Tilo M{\"{u}}ller},
  title        = {One key to rule them all: Recovering the master key from {RAM} to
                  break Android's file-based encryption},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301113},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301113},
  doi          = {10.1016/J.FSIDI.2021.301113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GrossBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuarnieriFGCJ21,
  author       = {Gabriele Guarnieri and
                  Marco Fontani and
                  Francesco Guzzi and
                  Sergio Carrato and
                  Martino Jerian},
  title        = {Perspective registration and multi-frame super-resolution of license
                  plates in surveillance videos},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301087},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301087},
  doi          = {10.1016/J.FSIDI.2020.301087},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GuarnieriFGCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HabibniaH21,
  author       = {Babak Habibnia and
                  Jan{-}Niclas Hilgert},
  title        = {Selected Papers and Extended Abstracts of the Eighth Annual {DFRWS}
                  Europe Conference},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301148},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301148},
  doi          = {10.1016/J.FSIDI.2021.301148},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HabibniaH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HasanabadiLG21,
  author       = {Saeed Shafiee Hasanabadi and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {A memory-based game-theoretic defensive approach for digital forensic
                  investigators},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301214},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301214},
  doi          = {10.1016/J.FSIDI.2021.301214},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HasanabadiLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HauTTNT21,
  author       = {Nguyen Xuan Hau and
                  Thai Son Tran and
                  Le Van Thinh and
                  Kim Duy Nguyen and
                  Dinhtu Truong},
  title        = {Learning Spatio-temporal features to detect manipulated facial videos
                  created by the Deepfake techniques},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301108},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301108},
  doi          = {10.1016/J.FSIDI.2021.301108},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HauTTNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSSN21,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  Damien Sauveron and
                  David Naccache},
  title        = {Medical Equipment Used for Forensic Data Extraction: {A} low-cost
                  solution for forensic laboratories not provided with expensive diagnostic
                  or advanced repair equipment},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301092},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301092},
  doi          = {10.1016/J.FSIDI.2020.301092},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HoltD21,
  author       = {Thomas Holt and
                  Diana S. Dolliver},
  title        = {Exploring digital evidence recognition among front-line law enforcement
                  officers at fatal crash scenes},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301167},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301167},
  doi          = {10.1016/J.FSIDI.2021.301167},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HoltD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman21,
  author       = {Graeme Horsman},
  title        = {Contemporaneous notes for digital forensic examinations},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301173},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301173},
  doi          = {10.1016/J.FSIDI.2021.301173},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman21a,
  author       = {Graeme Horsman},
  title        = {Defining '\emph{service levels}' for digital forensic science organisations},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301178},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301178},
  doi          = {10.1016/J.FSIDI.2021.301178},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Horsman21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman21b,
  author       = {Graeme Horsman},
  title        = {Decision support for first responders and digital device prioritisation},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301219},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301219},
  doi          = {10.1016/J.FSIDI.2021.301219},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Horsman21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HorsmanL21,
  author       = {Graeme Horsman and
                  James R. Lyle},
  title        = {Dataset construction challenges for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301264},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301264},
  doi          = {10.1016/J.FSIDI.2021.301264},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HorsmanL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HranickyBRSSMM21,
  author       = {Radek Hranick{\'{y}} and
                  Frank Breitinger and
                  Ondrej Rysav{\'{y}} and
                  John Sheppard and
                  Florin Schaedler and
                  Holger Morgenstern and
                  Simon Malik},
  title        = {What do incident response practitioners need to know? {A} skillmap
                  for the years ahead},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301184},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301184},
  doi          = {10.1016/J.FSIDI.2021.301184},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HranickyBRSSMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HurPKPLK21,
  author       = {Uk Hur and
                  Myungseo Park and
                  Giyoon Kim and
                  Younjai Park and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Corrigendum to "Data acquisition methods using backup data decryption
                  of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 {(2019)}
                  200890]},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301180},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301180},
  doi          = {10.1016/J.FSIDI.2021.301180},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HurPKPLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JarrettM21,
  author       = {Matt Jarrett and
                  Sarah Morris},
  title        = {Purple dawn: Dead disk forensics on Google's Fuchsia operating system},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301269},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301269},
  doi          = {10.1016/J.FSIDI.2021.301269},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JarrettM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KangKPK21,
  author       = {Soojin Kang and
                  Giyoon Kim and
                  Myungseo Park and
                  Jongsung Kim},
  title        = {Methods for decrypting the data encrypted by the latest Samsung smartphone
                  backup programs in Windows and macOS},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301310},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301310},
  doi          = {10.1016/J.FSIDI.2021.301310},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KangKPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KantaCCS21,
  author       = {Aikaterini Kanta and
                  Sein Coray and
                  Iwen Coisel and
                  Mark Scanlon},
  title        = {How viable is password cracking in digital forensic investigation?
                  Analyzing the guessability of over 3.9 billion real-world accounts},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301186},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301186},
  doi          = {10.1016/J.FSIDI.2021.301186},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KantaCCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimKK21,
  author       = {Hyunmin Kim and
                  InSeok Kim and
                  Kyounggon Kim},
  title        = {{AIBFT:} Artificial Intelligence Browser Forensic Toolkit},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301091},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301091},
  doi          = {10.1016/J.FSIDI.2020.301091},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimKPPLK21,
  author       = {Giyoon Kim and
                  Soram Kim and
                  Myungseo Park and
                  Younjai Park and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Forensic analysis of instant messaging apps: Decrypting Wickr and
                  private text messaging data},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301138},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301138},
  doi          = {10.1016/J.FSIDI.2021.301138},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimKPPLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimPK21,
  author       = {Giyoon Kim and
                  Myungseo Park and
                  Jongsung Kim},
  title        = {A study on {LG} content lock and data acquisition from apps based
                  on content lock function},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301284},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301284},
  doi          = {10.1016/J.FSIDI.2021.301284},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KimPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KumarA21,
  author       = {Ravin Kumar and
                  Animesh Kumar Agrawal},
  title        = {Drone {GPS} data analysis for flight path reconstruction: {A} study
                  on DJI, Parrot {\&} Yuneec make drones},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301182},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301182},
  doi          = {10.1016/J.FSIDI.2021.301182},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KumarA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LanaganC21,
  author       = {Sean Lanagan and
                  Kim{-}Kwang Raymond Choo},
  title        = {On the need for {AI} to triage encrypted data containers in {U.S.}
                  law enforcement applications},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301217},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301217},
  doi          = {10.1016/J.FSIDI.2021.301217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LanaganC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeMD21,
  author       = {Anh Duc Le and
                  Justin P. L. McGuinness and
                  Edward Dixon},
  title        = {ChunkedHCs algorithm for authorship verification problems: Reddit
                  case study},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301185},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301185},
  doi          = {10.1016/J.FSIDI.2021.301185},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeMSLS21,
  author       = {Quan Le and
                  Luis Miralles{-}Pechu{\'{a}}n and
                  Asanka P. Sayakkara and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Identifying Internet of Things software activities using deep learning-based
                  electromagnetic side-channel analysis},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301308},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301308},
  doi          = {10.1016/J.FSIDI.2021.301308},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LeMSLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MaggioCAR21,
  author       = {Ryan D. Maggio and
                  Andrew Case and
                  Aisha I. Ali{-}Gombe and
                  Golden G. Richard III},
  title        = {Seance: Divination of tool-breaking changes in forensically important
                  binaries},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301189},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301189},
  doi          = {10.1016/J.FSIDI.2021.301189},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MaggioCAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MahrCMGB21,
  author       = {Andrew Mahr and
                  Meghan Cichon and
                  Sophia Mateo and
                  Cinthya Grajeda and
                  Ibrahim M. Baggili},
  title        = {Zooming into the pandemic! {A} forensic analysis of the Zoom Application},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301107},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301107},
  doi          = {10.1016/J.FSIDI.2021.301107},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MahrCMGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MannaCAR21,
  author       = {Modhuparna Manna and
                  Andrew Case and
                  Aisha I. Ali{-}Gombe and
                  Golden G. Richard III},
  title        = {Modern macOS userland runtime analysis},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301221},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301221},
  doi          = {10.1016/J.FSIDI.2021.301221},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MannaCAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ManralS21,
  author       = {Bharat Manral and
                  Gaurav Somani},
  title        = {Establishing forensics capabilities in the presence of superuser insider
                  threats},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301263},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301263},
  doi          = {10.1016/J.FSIDI.2021.301263},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ManralS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Mar-RaaveBMH21,
  author       = {Joanna Rose Del Mar{-}Raave and
                  Hayretdin Bahsi and
                  Leo Mrsic and
                  Kresimir Hausknecht},
  title        = {A machine learning-based forensic tool for image classification -
                  {A} design science approach},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301265},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301265},
  doi          = {10.1016/J.FSIDI.2021.301265},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Mar-RaaveBMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Marshall21,
  author       = {Angus M. Marshall},
  title        = {Digital forensic tool verification: An evaluation of options for establishing
                  trustworthiness},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301181},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301181},
  doi          = {10.1016/J.FSIDI.2021.301181},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Marshall21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Martin-PerezRB21,
  author       = {Miguel Mart{\'{\i}}n{-}P{\'{e}}rez and
                  Ricardo J. Rodr{\'{\i}}guez and
                  Frank Breitinger},
  title        = {Bringing order to approximate matching: Classification and attacks
                  on similarity digest algorithms},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301120},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301120},
  doi          = {10.1016/J.FSIDI.2021.301120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Martin-PerezRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MatthewsLS21,
  author       = {Richard Matthews and
                  Kieren Lovell and
                  Matthew Sorell},
  title        = {Ghost protocol - Snapchat as a method of surveillance},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301112},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301112},
  doi          = {10.1016/J.FSIDI.2021.301112},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MatthewsLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MaybirC21,
  author       = {James Maybir and
                  Brendan Chapman},
  title        = {Web scraping of ecstasy user reports as a novel tool for detecting
                  drug market trends},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301172},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301172},
  doi          = {10.1016/J.FSIDI.2021.301172},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MaybirC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MazzoliniMPV21,
  author       = {Daniela Mazzolini and
                  Paolo Mignone and
                  Patrizia Pavan and
                  Gennaro Vessio},
  title        = {An easy-to-explain decision support framework for forensic analysis
                  of dynamic signatures},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301216},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301216},
  doi          = {10.1016/J.FSIDI.2021.301216},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MazzoliniMPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McCulloughAOB21,
  author       = {Syria McCullough and
                  Stella Abudu and
                  Ebere Onwubuariri and
                  Ibrahim M. Baggili},
  title        = {Another brick in the wall: An exploratory analysis of digital forensics
                  programs in the United States},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301187},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301187},
  doi          = {10.1016/J.FSIDI.2021.301187},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/McCulloughAOB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NaikJSYBI21,
  author       = {Nitin Naik and
                  Paul Jenkins and
                  Nick Savage and
                  Longzhi Yang and
                  Tossapon Boongoen and
                  Natthakan Iam{-}On},
  title        = {Fuzzy-import hashing: {A} static analysis technique for malware detection},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301139},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301139},
  doi          = {10.1016/J.FSIDI.2021.301139},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NaikJSYBI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NegraoD21,
  author       = {Miguel Negr{\~{a}}o and
                  Patr{\'{\i}}cio Domingues},
  title        = {SpeechToText: An open-source software for automatic detection and
                  transcription of voice recordings in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301223},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301223},
  doi          = {10.1016/J.FSIDI.2021.301223},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NegraoD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NeshenkoBF21,
  author       = {Nataliia Neshenko and
                  Elias Bou{-}Harb and
                  Borko Furht},
  title        = {A behavioral-based forensic investigation approach for analyzing attacks
                  on water plants using GANs},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301198},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301198},
  doi          = {10.1016/J.FSIDI.2021.301198},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NeshenkoBF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NgejaneESM21,
  author       = {Cynthia H. Ngejane and
                  Jan H. P. Eloff and
                  Tshephisho J. Sefara and
                  Vukosi Ntsakisi Marivate},
  title        = {Digital forensics supported by machine learning for the detection
                  of online sexual predatory chats},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301109},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301109},
  doi          = {10.1016/J.FSIDI.2021.301109},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NgejaneESM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NikkelG21,
  author       = {Bruce J. Nikkel and
                  Zeno J. M. H. Geradts},
  title        = {Journal roles and responsibilities: Simplification and optimization},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301282},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301282},
  doi          = {10.1016/J.FSIDI.2021.301282},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NikkelG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NishshankaSAWP21,
  author       = {Bandula Nishshanka and
                  Chris Shepherd and
                  Randika Ariyarathna and
                  Lalindu Weerakkody and
                  Jayanga Palihena},
  title        = {An android-based field investigation tool to estimate the potential
                  trajectories of perforated {AK} bullets in 1 mm sheet metal surfaces},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301267},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301267},
  doi          = {10.1016/J.FSIDI.2021.301267},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NishshankaSAWP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NordvikSFAT21,
  author       = {Rune Nordvik and
                  Radina Stoykova and
                  Katrin Franke and
                  Stefan Axelsson and
                  Fergus Toolan},
  title        = {Reliability validation for file system interpretation},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301174},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301174},
  doi          = {10.1016/J.FSIDI.2021.301174},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NordvikSFAT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OShaughnessyB21,
  author       = {Stephen O'Shaughnessy and
                  Frank Breitinger},
  title        = {Malware family classification via efficient Huffman features},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301192},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301192},
  doi          = {10.1016/J.FSIDI.2021.301192},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OShaughnessyB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OhLH21,
  author       = {Junghoon Oh and
                  Sangjin Lee and
                  Hyunuk Hwang},
  title        = {{NTFS} Data Tracker: Tracking file data history based on {\textdollar}LogFile},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301309},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301309},
  doi          = {10.1016/J.FSIDI.2021.301309},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OhLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PantaleonSHJB21,
  author       = {Lutta Pantaleon and
                  Mohamed H. Sedky and
                  Mohamed Hassan and
                  Uchitha Jayawickrama and
                  Benhur Bakhtiari Bastaki},
  title        = {The complexity of internet of things forensics: {A} state-of-the-art
                  review},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301210},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301210},
  doi          = {10.1016/J.FSIDI.2021.301210},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PantaleonSHJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkKPLK21,
  author       = {Myungseo Park and
                  Giyoon Kim and
                  Younjai Park and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Corrigendum to "Decrypting password-based encrypted backup data for
                  Huawei smartphones" [Digital Investigation 28 {(2019)} 200890]},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301179},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301179},
  doi          = {10.1016/J.FSIDI.2021.301179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkKPLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkLLBNJL21,
  author       = {Nam In Park and
                  Ji Woo Lee and
                  Seong Ho Lim and
                  Jun Seok Byun and
                  Gi{-}Hyun Na and
                  Oc{-}Yeub Jeon and
                  Jung Hwan Lee},
  title        = {Energy-based linear {PCM} audio recovery method of impaired {MP4}
                  file stored in dashboard camera memory},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301274},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301274},
  doi          = {10.1016/J.FSIDI.2021.301274},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ParkLLBNJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PorterNTA21,
  author       = {Kyle Porter and
                  Rune Nordvik and
                  Fergus Toolan and
                  Stefan Axelsson},
  title        = {Timestamp prefix carving for filesystem metadata extraction},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301266},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301266},
  doi          = {10.1016/J.FSIDI.2021.301266},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PorterNTA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RaisALA21,
  author       = {Muhammad Haris Rais and
                  Rima Asmar Awad and
                  Juan Lopez Jr. and
                  Irfan Ahmed},
  title        = {JTAG-based {PLC} memory acquisition framework for industrial control
                  systems},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301196},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301196},
  doi          = {10.1016/J.FSIDI.2021.301196},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RaisALA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RakKF21,
  author       = {Roman Rak and
                  Dagmar Kopencova and
                  Miroslav Felcan},
  title        = {Digital vehicle identity - Digital {VIN} in forensic and technical
                  practice},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301307},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301307},
  doi          = {10.1016/J.FSIDI.2021.301307},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RakKF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RathoreSSS21,
  author       = {Hemant Rathore and
                  Adithya Samavedhi and
                  Sanjay K. Sahay and
                  Mohit Sewak},
  title        = {Robust Malware Detection Models: Learning from Adversarial Attacks
                  and Defenses},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301183},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301183},
  doi          = {10.1016/J.FSIDI.2021.301183},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RathoreSSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RouhiBM21,
  author       = {Rahimeh Rouhi and
                  Flavio Bertini and
                  Danilo Montesi},
  title        = {User profiles' image clustering for digital investigations},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301171},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301171},
  doi          = {10.1016/J.FSIDI.2021.301171},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RouhiBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SandvikFAA21,
  author       = {Jens{-}Petter Sandvik and
                  Katrin Franke and
                  Habtamu Abie and
                  Andr{\'{e}} {\AA}rnes},
  title        = {Coffee forensics - Reconstructing data in IoT devices running Contiki
                  {OS}},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301188},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301188},
  doi          = {10.1016/J.FSIDI.2021.301188},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SandvikFAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchipperSL21,
  author       = {Guido Cornelis Schipper and
                  Rudy Seelt and
                  Nhien{-}An Le{-}Khac},
  title        = {Forensic analysis of Matrix protocol and Riot.im application},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301118},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301118},
  doi          = {10.1016/J.FSIDI.2021.301118},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchipperSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SerhalL21,
  author       = {Cezar Serhal and
                  Nhien{-}An Le{-}Khac},
  title        = {Machine learning based approach to analyze file meta data for smart
                  phone file triage},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301194},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301194},
  doi          = {10.1016/J.FSIDI.2021.301194},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SerhalL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SesterHSL21,
  author       = {Joachim Sester and
                  Darren R. Hayes and
                  Mark Scanlon and
                  Nhien{-}An Le{-}Khac},
  title        = {A comparative study of support vector machine and neural networks
                  for file type identification using n-gram analysis},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301121},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301121},
  doi          = {10.1016/J.FSIDI.2021.301121},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SesterHSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SharmaKK21,
  author       = {Shweta Sharma and
                  C. Rama Krishna and
                  Rakesh Kumar},
  title        = {RansomDroid: Forensic analysis and detection of Android Ransomware
                  using unsupervised machine learning technique},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301168},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301168},
  doi          = {10.1016/J.FSIDI.2021.301168},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SharmaKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SihagVS21,
  author       = {Vikas Sihag and
                  Manu Vardhan and
                  Pradeep Singh},
  title        = {{BLADE:} Robust malware detection against obfuscation in android},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301176},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301176},
  doi          = {10.1016/J.FSIDI.2021.301176},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SihagVS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SilvaVSBACCSLJ21,
  author       = {Iaslan Silva and
                  Jo{\~{a}}o Marcos do Valle and
                  Gabriel Souza and
                  Jaine Budke and
                  Daniel Ara{\'{u}}jo and
                  Bruno Carvalho and
                  N{\'{e}}lio Cacho and
                  Henrique Sales and
                  Frederico Lopes and
                  Rivaldo Silva Junior},
  title        = {Using micro-services and artificial intelligence to analyze images
                  in criminal evidences},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301197},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301197},
  doi          = {10.1016/J.FSIDI.2021.301197},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SilvaVSBACCSLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sparling21,
  author       = {Aaron Sparling},
  title        = {Twenty first Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301262},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301262},
  doi          = {10.1016/J.FSIDI.2021.301262},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Sparling21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SteinebachZB21,
  author       = {Martin Steinebach and
                  Sascha Zenglein and
                  Katharina Brandl},
  title        = {Phishing detection on tor hidden services},
  journal      = {Digit. Investig.},
  volume       = {36 Supplement},
  pages        = {301117},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301117},
  doi          = {10.1016/J.FSIDI.2021.301117},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SteinebachZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SundeD21,
  author       = {Nina Sunde and
                  Itiel E. Dror},
  title        = {A hierarchy of expert performance {(HEP)} applied to digital forensics:
                  Reliability and biasability in digital forensics decision making},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301175},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301175},
  doi          = {10.1016/J.FSIDI.2021.301175},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SundeD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SundeH21,
  author       = {Nina Sunde and
                  Graeme Horsman},
  title        = {Part 2: The Phase-oriented Advice and Review Structure {(PARS)} for
                  digital forensic investigations},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301074},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301074},
  doi          = {10.1016/J.FSIDI.2020.301074},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SundeH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TartBPEWMH21,
  author       = {Matthew Tart and
                  Iain Brodie and
                  Nicholas Patrick{-}Gleed and
                  Brian Edwards and
                  Kevin Weeks and
                  Robert Moore and
                  Richard Haseler},
  title        = {Cell site analysis; use and reliability of survey methods},
  journal      = {Digit. Investig.},
  volume       = {38},
  pages        = {301222},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301222},
  doi          = {10.1016/J.FSIDI.2021.301222},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TartBPEWMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThomasPNB21,
  author       = {Tyler Thomas and
                  Mathew Piscitelli and
                  Bhavik Ashok Nahar and
                  Ibrahim M. Baggili},
  title        = {Duck Hunt: Memory forensics of {USB} attack platforms},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301190},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301190},
  doi          = {10.1016/J.FSIDI.2021.301190},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThomasPNB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ToffaliniOGZB21,
  author       = {Flavio Toffalini and
                  Andrea Oliveri and
                  Mariano Graziano and
                  Jianying Zhou and
                  Davide Balzarotti},
  title        = {The evidence beyond the wall: Memory forensics in {SGX} environments},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301313},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301313},
  doi          = {10.1016/J.FSIDI.2021.301313},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ToffaliniOGZB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TsuchiyaH21,
  author       = {Yoichi Tsuchiya and
                  Naoki Hiramoto},
  title        = {Dark web in the dark: Investigating when transactions take place on
                  cryptomarkets},
  journal      = {Digit. Investig.},
  volume       = {36},
  number       = {Supplement},
  pages        = {301093},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301093},
  doi          = {10.1016/J.FSIDI.2020.301093},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TsuchiyaH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/UmHL21,
  author       = {Minji Um and
                  Jaehyeok Han and
                  Sangjin Lee},
  title        = {File fingerprinting of the {ZIP} format for identifying and tracking
                  provenance},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301271},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301271},
  doi          = {10.1016/J.FSIDI.2021.301271},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/UmHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YehudaSGTZ21,
  author       = {Raz Ben Yehuda and
                  Erez Shlingbaum and
                  Yuval Gershfeld and
                  Shaked Tayouri and
                  Nezer Jacob Zaidenberg},
  title        = {Hypervisor memory acquisition for {ARM}},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301106},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301106},
  doi          = {10.1016/J.FSIDI.2020.301106},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YehudaSGTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZandwijkB21,
  author       = {Jan Peter van Zandwijk and
                  Abdul Boztas},
  title        = {The phone reveals your motion: Digital traces of walking, driving
                  and other movements on iPhones},
  journal      = {Digit. Investig.},
  volume       = {37},
  pages        = {301170},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301170},
  doi          = {10.1016/J.FSIDI.2021.301170},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZandwijkB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZenoB21,
  author       = {Zeno and
                  Bruce},
  title        = {Deep learning, bias and turnaround time},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301318},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301318},
  doi          = {10.1016/J.FSIDI.2021.301318},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZenoB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhangBLO21,
  author       = {Xiaolu Zhang and
                  Frank Breitinger and
                  Engelbert Luechinger and
                  Stephen O'Shaughnessy},
  title        = {Android application forensics: {A} survey of obfuscation, obfuscation
                  detection and deobfuscation techniques and their impact on investigations},
  journal      = {Digit. Investig.},
  volume       = {39},
  pages        = {301285},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301285},
  doi          = {10.1016/J.FSIDI.2021.301285},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZhangBLO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndaLS20,
  author       = {Felix Anda and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {DeepUAge: Improving Underage Age Estimation Accuracy to Aid {CSEM}
                  Investigation},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300921},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300921},
  doi          = {10.1016/J.FSIDI.2020.300921},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndaLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeekBBESU20,
  author       = {Harm M. A. van Beek and
                  Jeroen van den Bos and
                  Abdul Boztas and
                  E. J. van Eijk and
                  R. Schramp and
                  M. Ugen},
  title        = {Digital forensics as a service: Stepping up the game},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301021},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301021},
  doi          = {10.1016/J.FSIDI.2020.301021},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BeekBBESU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bernacki20,
  author       = {Jaroslaw Bernacki},
  title        = {A survey on digital camera identification methods},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {300983},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300983},
  doi          = {10.1016/J.FSIDI.2020.300983},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Bernacki20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Billard20,
  author       = {David Billard},
  title        = {Tainted Digital Evidence and Privacy Protection in Blockchain-Based
                  Systems},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300911},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300911},
  doi          = {10.1016/J.FSIDI.2020.300911},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Billard20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BolleCJ20,
  author       = {Timothy Boll{\'{e}} and
                  Eoghan Casey and
                  Ma{\"{e}}lig Jacquet},
  title        = {The role of evaluations in reaching decisions using automated systems
                  supporting forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {301016},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301016},
  doi          = {10.1016/J.FSIDI.2020.301016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BolleCJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BurriCBJ20,
  author       = {Xavier Burri and
                  Eoghan Casey and
                  Timothy Boll{\'{e}} and
                  David{-}Olivier Jaquet{-}Chiffelle},
  title        = {Chronological independently verifiable electronic chain of custody
                  ledger using blockchain technology},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300976},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300976},
  doi          = {10.1016/J.FSIDI.2020.300976},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BurriCBJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMMR20,
  author       = {Andrew Case and
                  Ryan D. Maggio and
                  Modhuparna Manna and
                  Golden G. Richard III},
  title        = {Memory Analysis of macOS Page Queues},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301004},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301004},
  doi          = {10.1016/J.FSIDI.2020.301004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey20,
  author       = {Eoghan Casey},
  title        = {Standardization of forming and expressing preliminary evaluative opinions
                  on digital evidence},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200888},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200888},
  doi          = {10.1016/J.FSIDI.2019.200888},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey20a,
  author       = {Eoghan Casey},
  title        = {Editorial - Crisis or opportunity?},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {300961},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300961},
  doi          = {10.1016/J.FSIDI.2020.300961},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey20b,
  author       = {Eoghan Casey},
  title        = {Strengthening trust: Integration of digital investigation and forensic
                  science},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {301000},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301000},
  doi          = {10.1016/J.FSIDI.2020.301000},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey20c,
  author       = {Eoghan Casey},
  title        = {Editorial: The epic story of scientific interpretation in digital
                  investigations},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {301063},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301063},
  doi          = {10.1016/J.FSIDI.2020.301063},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey20c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey20d,
  author       = {Eoghan Casey},
  title        = {Editorial - Delivering digital forensic science as a service},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301095},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301095},
  doi          = {10.1016/J.FSIDI.2020.301095},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey20d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyJSRS20,
  author       = {Eoghan Casey and
                  David{-}Olivier Jaquet{-}Chiffelle and
                  Hannes Spichiger and
                  El{\'{e}}nore Ryser and
                  Thomas R. Souvignet},
  title        = {Structuring the Evaluation of Location-Related Mobile Device Evidence},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300928},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300928},
  doi          = {10.1016/J.FSIDI.2020.300928},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyJSRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChenZHYL20,
  author       = {Shijie Chen and
                  Chengqiang Zhao and
                  Lingling Huang and
                  Jing Yuan and
                  Mingzhe Liu},
  title        = {Study and implementation on the application of blockchain in electronic
                  evidence generation},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301001},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301001},
  doi          = {10.1016/J.FSIDI.2020.301001},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChenZHYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CunhaSLR20,
  author       = {Daniel de Oliveira Cunha and
                  Edmar A. Silva and
                  Jorge Albuquerque Lambert and
                  Rafael O. Ribeiro},
  title        = {Peritus Framework: Towards multimedia evidence analysis uniformization
                  in brazilian distributed forensic model},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301089},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301089},
  doi          = {10.1016/J.FSIDI.2020.301089},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CunhaSLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DaviesMB20,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Evaluation of live forensic techniques in ransomware attack mitigation},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300979},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300979},
  doi          = {10.1016/J.FSIDI.2020.300979},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DaviesMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DolosMAS20,
  author       = {Klara Dolos and
                  Conrad Meyer and
                  Andreas Attenberger and
                  Jessica Steinberger},
  title        = {Driver identification using in-vehicle digital data in the forensic
                  context of a hit and run accident},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301090},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301090},
  doi          = {10.1016/J.FSIDI.2020.301090},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DolosMAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DoraiAPP20,
  author       = {Gokila Dorai and
                  Sudhir Aggarwal and
                  Neet Patel and
                  Charisa Powell},
  title        = {{VIDE} - Vault App Identification and Extraction System for iOS Devices},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301007},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301007},
  doi          = {10.1016/J.FSIDI.2020.301007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DoraiAPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DysonBB20,
  author       = {Simon Dyson and
                  William J. Buchanan and
                  Liam Bell},
  title        = {Scenario-based creation and digital investigation of ethereum {ERC20}
                  tokens},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200894},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200894},
  doi          = {10.1016/J.FSIDI.2019.200894},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DysonBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FangZHL20,
  author       = {Yong Fang and
                  Cuirong Zhao and
                  Cheng Huang and
                  Liang Liu},
  title        = {SankeyVis: Visualizing active relationship from emails based on multiple
                  dimensions and topic classification methods},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {300981},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300981},
  doi          = {10.1016/J.FSIDI.2020.300981},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FangZHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FranqueiraH20,
  author       = {Virginia N. L. Franqueira and
                  Graeme Horsman},
  title        = {Towards Sound Forensic Arguments: Structured Argumentation Applied
                  to Digital Forensics Practice},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300923},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300923},
  doi          = {10.1016/J.FSIDI.2020.300923},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FranqueiraH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FrowisGHRP20,
  author       = {Michael Fr{\"{o}}wis and
                  Thilo Gottschalk and
                  Bernhard Haslhofer and
                  Christian R{\"{u}}ckert and
                  Paulina Pesch},
  title        = {Safeguarding the evidential value of forensic cryptocurrency investigations},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200902},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200902},
  doi          = {10.1016/J.FSIDI.2019.200902},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FrowisGHRP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GalbraithSS20,
  author       = {Christopher Galbraith and
                  Padhraic Smyth and
                  Hal S. Stern},
  title        = {Statistical Methods for the Forensic Analysis of Geolocated Event
                  Data},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301009},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301009},
  doi          = {10.1016/J.FSIDI.2020.301009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GalbraithSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HarshanyBBG20,
  author       = {Edward Harshany and
                  Ryan Benton and
                  David Bourrie and
                  William Bradley Glisson},
  title        = {Big Data Forensics: Hadoop 3.2.0 Reconstruction},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300909},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300909},
  doi          = {10.1016/J.FSIDI.2020.300909},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HarshanyBBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HasanabadiLG20,
  author       = {Saeed Shafiee Hasanabadi and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {A game-theoretic defensive approach for forensic investigators against
                  rootkits},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200909},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.200909},
  doi          = {10.1016/J.FSIDI.2020.200909},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HasanabadiLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HasanabadiLG20a,
  author       = {Saeed Shafiee Hasanabadi and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  title        = {A survey and research challenges of anti-forensics: Evaluation of
                  game-theoretic models in simulation of forensic agents' behaviour},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301024},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301024},
  doi          = {10.1016/J.FSIDI.2020.301024},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HasanabadiLG20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HassenfeldtJB20,
  author       = {Courtney Hassenfeldt and
                  Jillian Jacques and
                  Ibrahim M. Baggili},
  title        = {Exploring the Learning Efficacy of Digital Forensics Concepts and
                  Bagging {\&} Tagging of Digital Devices in Immersive Virtual Reality},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301011},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301011},
  doi          = {10.1016/J.FSIDI.2020.301011},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HassenfeldtJB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HirabayashiKYIH20,
  author       = {Manato Hirabayashi and
                  Kenji Kurosawa and
                  Ryo Yokota and
                  Daisuke Imoto and
                  Yoshinori Hawai and
                  Norimitsu Akiba and
                  Ken'ichi Tsuchiya and
                  Hidetoshi Kakuda and
                  Kosuke Tanabe and
                  Masakatsu Honma},
  title        = {Flying object detection system using an omnidirectional camera},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301027},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301027},
  doi          = {10.1016/J.FSIDI.2020.301027},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HirabayashiKYIH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HiramotoT20,
  author       = {Naoki Hiramoto and
                  Yoichi Tsuchiya},
  title        = {Measuring dark web marketplaces via Bitcoin transactions: From birth
                  to independence},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301086},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301086},
  doi          = {10.1016/J.FSIDI.2020.301086},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HiramotoT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HoKCLL20,
  author       = {Shuyuan Mary Ho and
                  Da{-}Yu Kao and
                  Ming{-}Jung Chiu{-}Huang and
                  Wenyi Li and
                  Chung{-}Jui Lai},
  title        = {Detecting Cyberbullying "Hotspots" on Twitter: {A} Predictive Analytics
                  Approach},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300906},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300906},
  doi          = {10.1016/J.FSIDI.2020.300906},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HoKCLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman20,
  author       = {Graeme Horsman},
  title        = {Digital Evidence Certainty Descriptors (DECDs)},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200896},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200896},
  doi          = {10.1016/J.FSIDI.2019.200896},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Horsman20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman20a,
  author       = {Graeme Horsman},
  title        = {Opinion: Does the field of digital forensics have a consistency problem?},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300970},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300970},
  doi          = {10.1016/J.FSIDI.2020.300970},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Horsman20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman20b,
  author       = {Graeme Horsman},
  title        = {The challenge of identifying historic 'private browsing' sessions
                  on suspect devices},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {300980},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300980},
  doi          = {10.1016/J.FSIDI.2020.300980},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Horsman20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HorsmanS20,
  author       = {Graeme Horsman and
                  Nina Sunde},
  title        = {Part 1: The need for peer review in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301062},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301062},
  doi          = {10.1016/J.FSIDI.2020.301062},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HorsmanS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Jaquet-Chiffelle20,
  author       = {David{-}Olivier Jaquet{-}Chiffelle and
                  Eoghan Casey and
                  Jonathan Bourquenoud},
  title        = {Tamperproof timestamped provenance ledger using blockchain technology},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300977},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300977},
  doi          = {10.1016/J.FSIDI.2020.300977},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Jaquet-Chiffelle20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JeghamKAM20,
  author       = {Imen Jegham and
                  Anouar Ben Khalifa and
                  Ihsen Alouani and
                  Mohamed Ali Mahjoub},
  title        = {Vision-based human action recognition: An overview and real world
                  challenges},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200901},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200901},
  doi          = {10.1016/J.FSIDI.2019.200901},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JeghamKAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KantaCS20,
  author       = {Aikaterini Kanta and
                  Iwen Coisel and
                  Mark Scanlon},
  title        = {A survey exploring open source Intelligence for smarter password cracking},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301075},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301075},
  doi          = {10.1016/J.FSIDI.2020.301075},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KantaCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarafiliWL20,
  author       = {Erisa Karafili and
                  Linna Wang and
                  Emil C. Lupu},
  title        = {An Argumentation-Based Reasoner to Assist Digital Investigation and
                  Attribution of Cyber-Attacks},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300925},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300925},
  doi          = {10.1016/J.FSIDI.2020.300925},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarafiliWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarresandDA20,
  author       = {Martin Karresand and
                  Geir Olav Dyrkolbotn and
                  Stefan Axelsson},
  title        = {An Empirical Study of the {NTFS} Cluster Allocation Behavior Over
                  Time},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301008},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301008},
  doi          = {10.1016/J.FSIDI.2020.301008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarresandDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimL20,
  author       = {Dohyun Kim and
                  Sangjin Lee},
  title        = {Study of identifying and managing the potential evidence for effective
                  Android forensics},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200897},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200897},
  doi          = {10.1016/J.FSIDI.2019.200897},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimPLPLK20,
  author       = {Giyoon Kim and
                  Myungseo Park and
                  Sehoon Lee and
                  Younjai Park and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {A study on the decryption methods of telegram {X} and BBM-Enterprise
                  databases in mobile and {PC}},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {300998},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300998},
  doi          = {10.1016/J.FSIDI.2020.300998},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KimPLPLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KoerhuisKL20,
  author       = {Wiebe Koerhuis and
                  M. Tahar Kechadi and
                  Nhien{-}An Le{-}Khac},
  title        = {Forensic analysis of privacy-oriented cryptocurrencies},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200891},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200891},
  doi          = {10.1016/J.FSIDI.2019.200891},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KoerhuisKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lallie20,
  author       = {Harjinder Singh Lallie},
  title        = {Dashcam forensics: {A} preliminary analysis of 7 dashcam devices},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200910},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.200910},
  doi          = {10.1016/J.FSIDI.2020.200910},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Lallie20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LatzoBF20,
  author       = {Tobias Latzo and
                  Julian Brost and
                  Felix C. Freiling},
  title        = {BMCLeech: Introducing Stealthy Memory Forensics to {BMC}},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300919},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300919},
  doi          = {10.1016/J.FSIDI.2020.300919},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LatzoBF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeEVF20,
  author       = {Hee{-}Eun Lee and
                  Tatiana Ermakova and
                  Vasilis Ververis and
                  Benjamin Fabian},
  title        = {Detecting child sexual abuse material: {A} comprehensive survey},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {301022},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301022},
  doi          = {10.1016/J.FSIDI.2020.301022},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeEVF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LusettiSD20,
  author       = {Monia Lusetti and
                  Luca Salsi and
                  Andrea Dallatana},
  title        = {A blockchain based solution for the custody of digital files in forensic
                  medicine},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301017},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301017},
  doi          = {10.1016/J.FSIDI.2020.301017},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LusettiSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MatthewsFS20,
  author       = {Richard Matthews and
                  Nick Falkner and
                  Matthew Sorell},
  title        = {Reverse engineering the Raspberry Pi Camera {V2:} {A} study of pixel
                  non-uniformity using a scanning electron microscope},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200900},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200900},
  doi          = {10.1016/J.FSIDI.2019.200900},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MatthewsFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MothiJW20,
  author       = {Dinesh Mothi and
                  Helge Janicke and
                  Isabel Wagner},
  title        = {A novel principle to validate digital forensic models},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200904},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.200904},
  doi          = {10.1016/J.FSIDI.2020.200904},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MothiJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MullanRF20,
  author       = {Patrick Mullan and
                  Christian Riess and
                  Felix C. Freiling},
  title        = {Towards Open-Set Forensic Source Grouping on {JPEG} Header Information},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300916},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300916},
  doi          = {10.1016/J.FSIDI.2020.300916},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MullanRF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nelson20a,
  author       = {Alex Nelson},
  title        = {Twentieth Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301028},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301028},
  doi          = {10.1016/J.FSIDI.2020.301028},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Nelson20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel20,
  author       = {Bruce J. Nikkel},
  title        = {Fintech forensics: Criminal investigation and digital evidence in
                  financial technologies},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200908},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.200908},
  doi          = {10.1016/J.FSIDI.2020.200908},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NordvikPTAF20,
  author       = {Rune Nordvik and
                  Kyle Porter and
                  Fergus Toolan and
                  Stefan Axelsson and
                  Katrin Franke},
  title        = {Generic Metadata Time Carving},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301005},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301005},
  doi          = {10.1016/J.FSIDI.2020.301005},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NordvikPTAF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OdogwuGH20,
  author       = {Kingson Chinedu Odogwu and
                  Pavel Gladyshev and
                  Babak Habibnia},
  title        = {{PNG} Data Detector for {DECA}},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300910},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300910},
  doi          = {10.1016/J.FSIDI.2020.300910},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OdogwuGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OliveiraJrZN20,
  author       = {Edson OliveiraJr and
                  Avelino F. Zorzo and
                  Charles Varlei Neu},
  title        = {Towards a conceptual model for promoting digital forensics experiments},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301014},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301014},
  doi          = {10.1016/J.FSIDI.2020.301014},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OliveiraJrZN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PalmbachB20,
  author       = {David Palmbach and
                  Frank Breitinger},
  title        = {Artifacts for Detecting Timestamp Manipulation in {NTFS} on Windows
                  and Their Reliability},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300920},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300920},
  doi          = {10.1016/J.FSIDI.2020.300920},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PalmbachB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PalutkeBRS20,
  author       = {Ralph Palutke and
                  Frank Block and
                  Patrick Reichenberger and
                  Dominik Stripeika},
  title        = {Hiding Process Memory Via Anti-Forensic Techniques},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301012},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301012},
  doi          = {10.1016/J.FSIDI.2020.301012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PalutkeBRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkYK20,
  author       = {Myungseo Park and
                  Okyeon Yi and
                  Jongsung Kim},
  title        = {A methodology for the decryption of encrypted smartphone backup data
                  on android platform: {A} case study on the latest samsung smartphone
                  backup system},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301026},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301026},
  doi          = {10.1016/J.FSIDI.2020.301026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkYK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PetroniGIRM20,
  author       = {Benedito Cristiano Aparecido Petroni and
                  Rodrigo Franco Gon{\c{c}}alves and
                  Paulo S{\'{e}}rgio de Arruda Ign{\'{a}}cio and
                  Jacqueline Zonichenn Reis and
                  Geraldo Jose Dolce Uzum Martins},
  title        = {Smart contracts applied to a functional architecture for storage and
                  maintenance of digital chain of custody using blockchain},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {300985},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300985},
  doi          = {10.1016/J.FSIDI.2020.300985},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PetroniGIRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PluskalBR20,
  author       = {Jan Pluskal and
                  Frank Breitinger and
                  Ondrej Rysav{\'{y}}},
  title        = {Netfox detective: {A} novel open-source network forensics analysis
                  tool},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301019},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301019},
  doi          = {10.1016/J.FSIDI.2020.301019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PluskalBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PradeGD20,
  author       = {Paul Prade and
                  Tobias Gro{\ss} and
                  Andreas Dewald},
  title        = {Forensic Analysis of the Resilient File System (ReFS) Version 3.4},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300915},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300915},
  doi          = {10.1016/J.FSIDI.2020.300915},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PradeGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/QasimSA20,
  author       = {Syed Ali Qasim and
                  Jared M. Smith and
                  Irfan Ahmed},
  title        = {Control Logic Forensics Framework using Built-in Decompiler of Engineering
                  Software in Industrial Control Systems},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301013},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301013},
  doi          = {10.1016/J.FSIDI.2020.301013},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/QasimSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/QuanWYZP20,
  author       = {Weize Quan and
                  Kai Wang and
                  Dong{-}Ming Yan and
                  Xiaopeng Zhang and
                  Denis Pellerin},
  title        = {Learn with diversity and from harder samples: Improving the generalization
                  of CNN-Based detection of computer-generated images},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301023},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301023},
  doi          = {10.1016/J.FSIDI.2020.301023},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/QuanWYZP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RahmanT20,
  author       = {Rizwan Ur Rahman and
                  Deepak Singh Tomar},
  title        = {A new web forensic framework for bot crime investigation},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300943},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300943},
  doi          = {10.1016/J.FSIDI.2020.300943},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RahmanT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RibauxS20,
  author       = {Olivier Ribaux and
                  Thomas R. Souvignet},
  title        = {"Hello are you available?" Dealing with online frauds and the role
                  of forensic science},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300978},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300978},
  doi          = {10.1016/J.FSIDI.2020.300978},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RibauxS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RyserSC20,
  author       = {El{\'{e}}nore Ryser and
                  Hannes Spichiger and
                  Eoghan Casey},
  title        = {Structured decision making in investigations involving digital and
                  multimedia evidence},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {301015},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301015},
  doi          = {10.1016/J.FSIDI.2020.301015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RyserSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SaleemSNBI20,
  author       = {Sajid Saleem and
                  Fazli Subhan and
                  Noman Naseer and
                  Abdul Bais and
                  Ammara Imtiaz},
  title        = {Forensic speaker recognition: {A} new method based on extracting accent
                  and language information from short utterances},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {300982},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300982},
  doi          = {10.1016/J.FSIDI.2020.300982},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SaleemSNBI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SampaioN20,
  author       = {Jose F. P. Sampaio and
                  Francisco Assis de Oliveira Nascimento},
  title        = {Detection of {AMR} double compression using compressed-domain speech
                  features},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200907},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.200907},
  doi          = {10.1016/J.FSIDI.2020.200907},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SampaioN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SayakkaraLS20,
  author       = {Asanka P. Sayakkara and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {EMvidence: {A} Framework for Digital Evidence Acquisition from IoT
                  Devices through Electromagnetic Side-Channel Analysis},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300907},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300907},
  doi          = {10.1016/J.FSIDI.2020.300907},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SayakkaraLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SayakkaraLS20a,
  author       = {Asanka P. Sayakkara and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation:
                  Evaluating the EMvidence Framework},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301003},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301003},
  doi          = {10.1016/J.FSIDI.2020.301003},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SayakkaraLS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SayakkaraMLS20,
  author       = {Asanka P. Sayakkara and
                  Luis Miralles{-}Pechu{\'{a}}n and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Cutting Through the Emissions: Feature Selection from Electromagnetic
                  Side-Channel Data for Activity Detection},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300927},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300927},
  doi          = {10.1016/J.FSIDI.2020.300927},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SayakkaraMLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderDMF20,
  author       = {Janine Schneider and
                  Hans{-}Peter Deifel and
                  Stefan Milius and
                  Felix C. Freiling},
  title        = {Unifying Metadata-Based Storage Reconstruction and Carving with {LAYR}},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301006},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301006},
  doi          = {10.1016/J.FSIDI.2020.301006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderDMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderWF20,
  author       = {Janine Schneider and
                  Julian Wolf and
                  Felix C. Freiling},
  title        = {Tampering with Digital Evidence is Hard: The Case of Main Memory Images},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300924},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300924},
  doi          = {10.1016/J.FSIDI.2020.300924},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SeyyarG20,
  author       = {M. Bas Seyyar and
                  Zeno J. M. H. Geradts},
  title        = {Privacy impact assessment in large-scale digital forensic investigations},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {200906},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.200906},
  doi          = {10.1016/J.FSIDI.2020.200906},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SeyyarG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShinKKYJS20,
  author       = {Yeonghun Shin and
                  Hyungchan Kim and
                  Sungbum Kim and
                  Dongkyun Yoo and
                  Wooyeon Jo and
                  Taeshik Shon},
  title        = {Certificate Injection-Based Encrypted Traffic Forensics in {AI} Speaker
                  Ecosystem},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301010},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301010},
  doi          = {10.1016/J.FSIDI.2020.301010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShinKKYJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sikos20,
  author       = {Leslie F. Sikos},
  title        = {Packet analysis for network forensics: {A} comprehensive survey},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200892},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200892},
  doi          = {10.1016/J.FSIDI.2019.200892},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sikos20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SinghS20,
  author       = {Gurinder Singh and
                  Kulbir Singh},
  title        = {Digital image forensic approach based on the second-order statistical
                  analysis of {CFA} artifacts},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200899},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200899},
  doi          = {10.1016/J.FSIDI.2019.200899},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SinghS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SokolRLH20,
  author       = {Pavol Sokol and
                  Laura R{\'{o}}zenfeldov{\'{a}} and
                  Katar{\'{\i}}na Lucivjansk{\'{a}} and
                  Jakub Harasta},
  title        = {{IP} Addresses in the Context of Digital Evidence in the Criminal
                  and Civil Case Law of the Slovak Republic},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300918},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300918},
  doi          = {10.1016/J.FSIDI.2020.300918},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SokolRLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SteelNOQ20,
  author       = {Chad M. S. Steel and
                  Emily Newman and
                  Suzanne O'Rourke and
                  Ethel Quayle},
  title        = {An integrative review of historical technology and countermeasure
                  usage trends in online child sexual exploitation material offenders},
  journal      = {Digit. Investig.},
  volume       = {33},
  pages        = {300971},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300971},
  doi          = {10.1016/J.FSIDI.2020.300971},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SteelNOQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThomasPSB20,
  author       = {Tyler Thomas and
                  Mathew Piscitelli and
                  Ilya Shavrov and
                  Ibrahim M. Baggili},
  title        = {Memory {FORESHADOW:} Memory FOREnSics of HArDware CryptOcurrency wallets
                  - {A} Tool and Visualization Framework},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301002},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301002},
  doi          = {10.1016/J.FSIDI.2020.301002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThomasPSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TokWC20,
  author       = {Yee Ching Tok and
                  Chundong Wang and
                  Sudipta Chattopadhyay},
  title        = {Stitcher: Correlating digital forensic evidence on internet-of-things
                  devices},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301071},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301071},
  doi          = {10.1016/J.FSIDI.2020.301071},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TokWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TorabiBAD20,
  author       = {Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Chadi Assi and
                  Mourad Debbabi},
  title        = {A Scalable Platform for Enabling the Forensic Investigation of Exploited
                  IoT Devices and Their Generated Unsolicited Activities},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300922},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300922},
  doi          = {10.1016/J.FSIDI.2020.300922},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TorabiBAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TullyCCDIW20,
  author       = {Gillian Tully and
                  Neil Cohen and
                  David Compton and
                  Gareth Davies and
                  Roy Isbell and
                  Tim Watson},
  title        = {Quality standards for digital forensics: Learning from experience
                  in England {\&} Wales},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200905},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.200905},
  doi          = {10.1016/J.FSIDI.2020.200905},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TullyCCDIW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/UrozR20,
  author       = {Daniel Uroz and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {On Challenges in Verifying Trusted Executable Files in Memory Forensics},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300917},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300917},
  doi          = {10.1016/J.FSIDI.2020.300917},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/UrozR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WuBO20,
  author       = {Tina Wu and
                  Frank Breitinger and
                  Stephen O'Shaughnessy},
  title        = {Digital forensic tools: Recent advances and enhancing the status quo},
  journal      = {Digit. Investig.},
  volume       = {34},
  pages        = {300999},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300999},
  doi          = {10.1016/J.FSIDI.2020.300999},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WuBO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YokotaHTIHAKTHK20,
  author       = {Ryo Yokota and
                  Yoshinori Hawai and
                  Ken'ichi Tsuchiya and
                  Daisuke Imoto and
                  Manato Hirabayashi and
                  Norimitsu Akiba and
                  Hidetoshi Kakuda and
                  Kosuke Tanabe and
                  Masakatsu Honma and
                  Kenji Kurosawa},
  title        = {A revisited visual-based geolocalization framework for forensic investigation
                  support tools},
  journal      = {Digit. Investig.},
  volume       = {35},
  pages        = {301088},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301088},
  doi          = {10.1016/J.FSIDI.2020.301088},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YokotaHTIHAKTHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YucelK20,
  author       = {Cagatay Yucel and
                  Ahmet Koltuksuz},
  title        = {Imaging and evaluating the memory access for malware},
  journal      = {Digit. Investig.},
  volume       = {32},
  pages        = {200903},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200903},
  doi          = {10.1016/J.FSIDI.2019.200903},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YucelK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhangUBC20,
  author       = {Xiaolu Zhang and
                  Oren Upton and
                  Nicole Lang Beebe and
                  Kim{-}Kwang Raymond Choo},
  title        = {IoT Botnet Forensics: {A} Comprehensive Digital Forensic Case Study
                  on Mirai Botnet Servers},
  journal      = {Digit. Investig.},
  volume       = {32 Supplement},
  pages        = {300926},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.300926},
  doi          = {10.1016/J.FSIDI.2020.300926},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZhangUBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeDW19,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the feasibility of binary authorship characterization},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S3--S11},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.028},
  doi          = {10.1016/J.DIIN.2019.01.028},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndaLKBBLS19,
  author       = {Felix Anda and
                  David Lillis and
                  Aikaterini Kanta and
                  Brett A. Becker and
                  Elias Bou{-}Harb and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Improving the accuracy of automated facial age estimation to aid {CSEM}
                  investigations},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S142},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.024},
  doi          = {10.1016/J.DIIN.2019.01.024},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndaLKBBLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArshadJHB19,
  author       = {Humaira Arshad and
                  Aman Jantan and
                  Gan Keng Hoon and
                  Anila Sahar Butt},
  title        = {A multilayered semantic framework for integrated forensic acquisition
                  on social media},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {147--158},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.002},
  doi          = {10.1016/J.DIIN.2019.04.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ArshadJHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArshadJO19,
  author       = {Humaira Arshad and
                  Aman Jantan and
                  Esther Omolara},
  title        = {Evidence collection and forensics on social networks: Research challenges
                  and directions},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {126--138},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.02.001},
  doi          = {10.1016/J.DIIN.2019.02.001},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ArshadJO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AtwalSL19,
  author       = {Tajvinder Singh Atwal and
                  Mark Scanlon and
                  Nhien{-}An Le{-}Khac},
  title        = {Shining a light on Spotlight: Leveraging Apple's desktop search utility
                  to recover deleted file metadata on macOS},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S105--S115},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.019},
  doi          = {10.1016/J.DIIN.2019.01.019},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AtwalSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BahjatJ19,
  author       = {Ahmed A. Bahjat and
                  Jim Jones},
  title        = {Deleted file fragment dating by analysis of allocated neighbors},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S60--S67},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.015},
  doi          = {10.1016/J.DIIN.2019.01.015},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BahjatJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BlockD19,
  author       = {Frank Block and
                  Andreas Dewald},
  title        = {Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected
                  Code by Examining Page Table Entries},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S3--S12},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.008},
  doi          = {10.1016/J.DIIN.2019.04.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BlockD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ButkovicMUT19,
  author       = {Asmir Butkovic and
                  Sasa Mrdovic and
                  Suleyman Uludag and
                  Anel Tanovic},
  title        = {Geographic profiling for serial cybercrime investigation},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {176--182},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2018.12.001},
  doi          = {10.1016/J.DIIN.2018.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ButkovicMUT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Carnovale19,
  author       = {Catherine Carnovale},
  title        = {Publisher's note},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {174},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.08.003},
  doi          = {10.1016/J.DIIN.2019.08.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Carnovale19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseJFMASR19,
  author       = {Andrew Case and
                  Mohammad M. Jalalzai and
                  Md Firoz{-}Ul{-}Amin and
                  Ryan D. Maggio and
                  Aisha I. Ali{-}Gombe and
                  Mingxuan Sun and
                  Golden G. Richard III},
  title        = {HookTracer: {A} System for Automated and Accessible {API} Hooks Analysis},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S104--S112},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.011},
  doi          = {10.1016/J.DIIN.2019.04.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseJFMASR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey19,
  author       = {Eoghan Casey},
  title        = {Interrelations between digital investigation and forensic science},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.008},
  doi          = {10.1016/J.DIIN.2019.03.008},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey19a,
  author       = {Eoghan Casey},
  title        = {Maturation of digital forensics},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.05.002},
  doi          = {10.1016/J.DIIN.2019.05.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey19b,
  author       = {Eoghan Casey},
  title        = {Trust in digital evidence},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200898},
  doi          = {10.1016/J.FSIDI.2019.200898},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyBGSBN19,
  author       = {Eoghan Casey and
                  Sean Barnum and
                  Ryan Griffith and
                  Jonathan Snyder and
                  Harm M. A. van Beek and
                  Alex J. Nelson},
  title        = {Corrigendum to 'Advancing coordinated cyber-investigations and tool
                  interoperability using a community developed specification language'
                  [Digital Investigation 22C {(2017)} 14-45]},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {183--187},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2018.10.001},
  doi          = {10.1016/J.DIIN.2018.10.001},
  timestamp    = {Sun, 22 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyBGSBN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyGN19,
  author       = {Eoghan Casey and
                  Zeno J. M. H. Geradts and
                  Bruce J. Nikkel},
  title        = {Panoramic perspective of Digital Investigation},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {173},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.100886},
  doi          = {10.1016/J.DIIN.2019.100886},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyGN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyLBB19,
  author       = {Peter Casey and
                  Rebecca Lindsay{-}Decusati and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Inception: Virtual Space in Memory Space in Real Space - Memory Forensics
                  of Immersive Virtual Reality with the {HTC} Vive},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S13--S21},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.007},
  doi          = {10.1016/J.DIIN.2019.04.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CaseyLBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyNH19,
  author       = {Eoghan Casey and
                  Alex J. Nelson and
                  Jessica Hyde},
  title        = {Standardization of file recovery classification and authentication},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.06.004},
  doi          = {10.1016/J.DIIN.2019.06.004},
  timestamp    = {Sun, 22 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyNH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChangGSSW19,
  author       = {Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya and
                  Monika Singh and
                  Douglas R. White},
  title        = {FbHash: {A} New Similarity Hashing Scheme for Digital Forensics},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S113--S123},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.006},
  doi          = {10.1016/J.DIIN.2019.04.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChangGSSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChoiYHK19,
  author       = {Jusop Choi and
                  Jaegwan Yu and
                  Sangwon Hyun and
                  Hyoungshick Kim},
  title        = {Digital forensic analysis of encrypted database files in instant messaging
                  applications on Windows operating systems: Case study with KakaoTalk,
                  NateOn and {QQ} messenger},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S50--S59},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.011},
  doi          = {10.1016/J.DIIN.2019.01.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChoiYHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChopadeP19,
  author       = {Rupali M. Chopade and
                  Vinod Keshaorao Pachghare},
  title        = {Ten years of critical review on database forensics research},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {180--197},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.001},
  doi          = {10.1016/J.DIIN.2019.04.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChopadeP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DebinskiBM19,
  author       = {Mark Debinski and
                  Frank Breitinger and
                  Parvathy Mohan},
  title        = {Timeline2GUI: {A} Log2Timeline {CSV} parser and training scenarios},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {34--43},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2018.12.004},
  doi          = {10.1016/J.DIIN.2018.12.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DebinskiBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DominguesFAS19,
  author       = {Patr{\'{\i}}cio Domingues and
                  Miguel Frade and
                  Lu{\'{\i}}s Miguel Andrade and
                  Jo{\~{a}}o Victor Silva},
  title        = {Digital forensic artifacts of the Your Phone application in Windows
                  10},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {32--42},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.06.003},
  doi          = {10.1016/J.DIIN.2019.06.003},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DominguesFAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FidalgoAFG19,
  author       = {Eduardo Fidalgo and
                  Enrique Alegre and
                  Laura Fern{\'{a}}ndez{-}Robles and
                  V{\'{\i}}ctor Gonz{\'{a}}lez{-}Castro},
  title        = {Classifying suspicious content in tor darknet through Semantic Attention
                  Keypoint Filtering},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {12--22},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.05.004},
  doi          = {10.1016/J.DIIN.2019.05.004},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FidalgoAFG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FukamiN19,
  author       = {Aya Fukami and
                  Kazuhiro Nishimura},
  title        = {Forensic Analysis of Water Damaged Mobile Devices},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S71--S79},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.009},
  doi          = {10.1016/J.DIIN.2019.04.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FukamiN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GregorioAV19,
  author       = {Jes{\'{u}}s Gregorio and
                  Bernardo Alarcos and
                  Alfredo Gardel Vicente},
  title        = {Forensic analysis of Nucleus {RTOS} on {MTK} smartwatches},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {55--66},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.007},
  doi          = {10.1016/J.DIIN.2019.03.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GregorioAV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrivnaD19,
  author       = {Tom{\'{a}}s Grivna and
                  Jakub Dr{\'{a}}pal},
  title        = {Attacks on the confidentiality, integrity and availability of data
                  and computer systems in the criminal case law of the Czech Republic},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {1--13},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2018.12.002},
  doi          = {10.1016/J.DIIN.2018.12.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GrivnaD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Habibnia19,
  author       = {Babak Habibnia},
  title        = {The proceedings of the Sixth Annual {DFRWS} Europe Conference},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S1--S2},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.001},
  doi          = {10.1016/J.DIIN.2019.03.001},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Habibnia19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HadgkissMP19,
  author       = {Melissa Hadgkiss and
                  Sarah Morris and
                  S. Paget},
  title        = {Sifting through the ashes: Amazon Fire {TV} stick acquisition and
                  analysis},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {112--118},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.003},
  doi          = {10.1016/J.DIIN.2019.01.003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HadgkissMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HargreavesM19,
  author       = {Christopher James Hargreaves and
                  Angus M. Marshall},
  title        = {SyncTriage: Using synchronisation artefacts to optimise acquisition
                  order},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S134--S140},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.022},
  doi          = {10.1016/J.DIIN.2019.01.022},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HargreavesM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannMMAN19,
  author       = {Thibaut Heckmann and
                  James P. McEvoy and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  David Naccache},
  title        = {Removing epoxy underfill between neighbouring components using acid
                  for component chip-off},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {198--209},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.003},
  doi          = {10.1016/J.DIIN.2019.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannMMAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSN19,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  David Naccache},
  title        = {Decrease of energy deposited during laser decapsulation attacks by
                  dyeing and pigmenting the {ECA:} Application to the forensic micro-repair
                  of wire bonding},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {210--218},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.004},
  doi          = {10.1016/J.DIIN.2019.04.004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeoSYYY19,
  author       = {Hee{-}Soo Heo and
                  Byung{-}Min So and
                  Il{-}Ho Yang and
                  Sung{-}Hyun Yoon and
                  Ha{-}Jin Yu},
  title        = {Automated recovery of damaged audio files using deep neural networks},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {117--126},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.007},
  doi          = {10.1016/J.DIIN.2019.07.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeoSYYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HilgertLRS19,
  author       = {Jan{-}Niclas Hilgert and
                  Martin Lambertz and
                  Mariia Rybalka and
                  Roman Schell},
  title        = {Syntactical Carving of PNGs and Automated Generation of Reproducible
                  Datasets},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S22--S30},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.014},
  doi          = {10.1016/J.DIIN.2019.04.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HilgertLRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HongYO19,
  author       = {Jin Hyung Hong and
                  Yoonmo Yang and
                  Byung Tae Oh},
  title        = {Detection of frame deletion in HEVC-Coded video in the compressed
                  domain},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {23--31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.06.002},
  doi          = {10.1016/J.DIIN.2019.06.002},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HongYO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman19,
  author       = {Graeme Horsman},
  title        = {Formalising investigative decision making in digital forensics: Proposing
                  the Digital Evidence Reporting and Decision Support {(DERDS)} framework},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {146--151},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.007},
  doi          = {10.1016/J.DIIN.2019.01.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman19a,
  author       = {Graeme Horsman},
  title        = {Tool testing and reliability issues in the field of digital forensics},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {163--175},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.009},
  doi          = {10.1016/J.DIIN.2019.01.009},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman19b,
  author       = {Graeme Horsman},
  title        = {Reconstructing cached video stream content: - Part 2},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200893},
  doi          = {10.1016/J.FSIDI.2019.200893},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HorsmanFJ19,
  author       = {Graeme Horsman and
                  Benjamin Findlay and
                  Tim James},
  title        = {Developing a 'router examination at scene' standard operating procedure
                  for crime scene investigators in the United Kingdom},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {152--162},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.010},
  doi          = {10.1016/J.DIIN.2019.01.010},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HorsmanFJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HranickyZRK19,
  author       = {Radek Hranick{\'{y}} and
                  Luk{\'{a}}s Zobal and
                  Ondrej Rysav{\'{y}} and
                  Dusan Kol{\'{a}}r},
  title        = {Distributed password cracking with {BOINC} and hashcat},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {161--172},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.08.001},
  doi          = {10.1016/J.DIIN.2019.08.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HranickyZRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HurPKPLK19,
  author       = {Uk Hur and
                  Myungseo Park and
                  Giyoon Kim and
                  Younjai Park and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Data acquisition methods using backup data decryption of Sony smartphones},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200890},
  doi          = {10.1016/J.FSIDI.2019.200890},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HurPKPLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IkuesanV19,
  author       = {Adeyemi R. Ikuesan and
                  Hein S. Venter},
  title        = {Digital behavioral-fingerprint for user attribution in digital forensics:
                  Are we there yet?},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {73--89},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.003},
  doi          = {10.1016/J.DIIN.2019.07.003},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IkuesanV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JeongL19,
  author       = {Doowon Jeong and
                  Sangjin Lee},
  title        = {Forensic signature for tracking storage devices: Analysis of {UEFI}
                  firmware image, disk signature and windows artifacts},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {21--27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.02.004},
  doi          = {10.1016/J.DIIN.2019.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JeongL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JinWY19,
  author       = {Chao Jin and
                  Rangding Wang and
                  Diqun Yan},
  title        = {Source smartphone identification by exploiting encoding characteristics
                  of recorded speech},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {129--146},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.003},
  doi          = {10.1016/J.DIIN.2019.03.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JinWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JoSKYKKJONS19,
  author       = {Wooyeon Jo and
                  Yeonghun Shin and
                  Hyungchan Kim and
                  Dongkyun Yoo and
                  Donghyun Kim and
                  Cheulhoon Kang and
                  Jongmin Jin and
                  Jungkyung Oh and
                  Bitna Na and
                  Taeshik Shon},
  title        = {Digital Forensic Practices and Methodologies for {AI} Speaker Ecosystems},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S80--S93},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.013},
  doi          = {10.1016/J.DIIN.2019.04.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JoSKYKKJONS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JohnstonE19,
  author       = {Pamela Johnston and
                  Eyad Elyan},
  title        = {A review of digital video tampering: From simple editing to full synthesis},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {67--81},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.006},
  doi          = {10.1016/J.DIIN.2019.03.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JohnstonE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarakucukD19,
  author       = {Ahmet Karak{\"{u}}{\c{c}}{\"{u}}k and
                  Ahmet Emir Dirik},
  title        = {{PRNU} based source camera attribution for image sets anonymized with
                  patch-match algorithm},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {43--51},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.06.001},
  doi          = {10.1016/J.DIIN.2019.06.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarakucukD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarbabD19,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {MalDy: Portable, data-driven malware detection using natural language
                  processing and machine learning techniques on behavioral analysis
                  reports},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S77--S87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.017},
  doi          = {10.1016/J.DIIN.2019.01.017},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarbabD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarresandAD19,
  author       = {Martin Karresand and
                  Stefan Axelsson and
                  Geir Olav Dyrkolbotn},
  title        = {Using {NTFS} Cluster Allocation Behavior to Find the Location of User
                  Data},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S51--S60},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.018},
  doi          = {10.1016/J.DIIN.2019.04.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarresandAD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Khatri19,
  author       = {Yogesh Khatri},
  title        = {Investigating spotlight internals to extract metadata},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {96--103},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.005},
  doi          = {10.1016/J.DIIN.2019.01.005},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Khatri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KouokamD19,
  author       = {Emmanuel Kiegaing Kouokam and
                  Ahmet Emir Dirik},
  title        = {PRNU-based source device attribution for YouTube videos},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {91--100},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.005},
  doi          = {10.1016/J.DIIN.2019.03.005},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KouokamD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LatzoPF19,
  author       = {Tobias Latzo and
                  Ralph Palutke and
                  Felix C. Freiling},
  title        = {A universal taxonomy and survey of forensic memory acquisition techniques},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {56--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.001},
  doi          = {10.1016/J.DIIN.2019.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LatzoPF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LieblerB19,
  author       = {Lorenz Liebler and
                  Harald Baier},
  title        = {Towards exact and inexact approximate matching of executable binaries},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S12--S21},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.027},
  doi          = {10.1016/J.DIIN.2019.01.027},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LieblerB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LieblerSBB19,
  author       = {Lorenz Liebler and
                  Patrick Schmitt and
                  Harald Baier and
                  Frank Breitinger},
  title        = {On efficiency of artifact lookup strategies in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S116--S125},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.020},
  doi          = {10.1016/J.DIIN.2019.01.020},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LieblerSBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LimSRK19,
  author       = {Charles Lim and
                  Suryadi and
                  Kalamullah Ramli and
                  Yohanes Syailendra Kotualubun},
  title        = {Mal-Flux: Rendering hidden code of packed binary executable},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {83--95},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.004},
  doi          = {10.1016/J.DIIN.2019.01.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LimSRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LoneM19,
  author       = {Auqib Hamid Lone and
                  Roohie Naaz Mir},
  title        = {Forensic-chain: Blockchain based digital forensics chain of custody
                  with PoC in Hyperledger Composer},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {44--55},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.002},
  doi          = {10.1016/J.DIIN.2019.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LoneM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Macia-Fernandez19,
  author       = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Jos{\'{e}} Antonio G{\'{o}}mez{-}Hern{\'{a}}ndez and
                  Margarita Robles and
                  Pedro Garc{\'{\i}}a{-}Teodoro},
  title        = {Blockchain-based forensic system for collection and preservation of
                  network service evidences},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S141},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.023},
  doi          = {10.1016/J.DIIN.2019.01.023},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Macia-Fernandez19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MargagliottiBR19,
  author       = {Giulia Margagliotti and
                  Timothy Boll{\'{e}} and
                  Quentin Rossy},
  title        = {Worldwide analysis of crimes by the traces of their online media coverage:
                  The case of jewellery store robberies},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200889},
  doi          = {10.1016/J.FSIDI.2019.200889},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MargagliottiBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MarshallM19,
  author       = {Angus M. Marshall and
                  Peter Miller},
  title        = {CaseNote: Mobile phone call data obfuscation {\&} techniques for
                  call correlation},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {82--90},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.004},
  doi          = {10.1016/J.DIIN.2019.03.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MarshallM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MatthewsSF19,
  author       = {Richard Matthews and
                  Matthew Sorell and
                  Nickolas J. G. Falkner},
  title        = {An analysis of optical contributions to a photo-sensor's ballistic
                  fingerprints},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {139--145},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.02.002},
  doi          = {10.1016/J.DIIN.2019.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MatthewsSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McLarenRBT19,
  author       = {Peter McLaren and
                  Gordon Russell and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {Decrypting live {SSH} traffic in virtual environments},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {109--117},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.010},
  doi          = {10.1016/J.DIIN.2019.03.010},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/McLarenRBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MengB19,
  author       = {Christian Meng and
                  Harald Baier},
  title        = {bring2lite: {A} Structural Concept and Tool for Forensic Data Analysis
                  and Recovery of Deleted SQLite Records},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S31--S41},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.017},
  doi          = {10.1016/J.DIIN.2019.04.017},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MengB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MuirLB19,
  author       = {Matt Muir and
                  Petra Leimich and
                  William J. Buchanan},
  title        = {A Forensic Audit of the Tor Browser Bundle},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {118--128},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.009},
  doi          = {10.1016/J.DIIN.2019.03.009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MuirLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MullanRF19,
  author       = {Patrick Mullan and
                  Christian Riess and
                  Felix C. Freiling},
  title        = {Forensic source identification using {JPEG} image headers: The case
                  of smartphones},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S68--S76},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.016},
  doi          = {10.1016/J.DIIN.2019.01.016},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MullanRF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Murphy19,
  author       = {William F. Murphy},
  title        = {Investigating the incidence of sexual assault in martial arts coaching
                  using media reports},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {90--93},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.001},
  doi          = {10.1016/J.DIIN.2019.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Murphy19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MutawaBFMR19,
  author       = {Noora Al Mutawa and
                  Joanne Bryce and
                  Virginia N. L. Franqueira and
                  Andrew Marrington and
                  Janet C. Read},
  title        = {Behavioural Digital Forensics Model: Embedding Behavioural Evidence
                  Analysis into the Investigation of Digital Crimes},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {70--82},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2018.12.003},
  doi          = {10.1016/J.DIIN.2018.12.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MutawaBFMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NicolettiB19,
  author       = {Marco Nicoletti and
                  Massimo Bernaschi},
  title        = {Forensic analysis of Microsoft Skype for Business},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {159--179},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.012},
  doi          = {10.1016/J.DIIN.2019.03.012},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NicolettiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NordvikGTA19,
  author       = {Rune Nordvik and
                  Henry Georges and
                  Fergus Toolan and
                  Stefan Axelsson},
  title        = {Reverse engineering of ReFS},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {127--147},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.004},
  doi          = {10.1016/J.DIIN.2019.07.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NordvikGTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NordvikTA19,
  author       = {Rune Nordvik and
                  Fergus Toolan and
                  Stefan Axelsson},
  title        = {Using the object {ID} index as an investigative approach for {NTFS}
                  file systems},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S30--S39},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.013},
  doi          = {10.1016/J.DIIN.2019.01.013},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NordvikTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkKPLK19,
  author       = {Myungseo Park and
                  Giyoon Kim and
                  Younjai Park and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Decrypting password-based encrypted backup data for Huawei smartphones},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {119--125},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.008},
  doi          = {10.1016/J.DIIN.2019.01.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkKPLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PessolanoRSX19,
  author       = {Gus Pessolano and
                  Huw Read and
                  Iain Sutherland and
                  Konstantinos Xynos},
  title        = {Forensic Analysis of the Nintendo 3DS {NAND}},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S61--S70},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.015},
  doi          = {10.1016/J.DIIN.2019.04.015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PessolanoRSX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PontoST19,
  author       = {Kevin Ponto and
                  Simon Smith and
                  Ross Tredinnick},
  title        = {Methods for detecting manipulations in 3D scan data},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {101--107},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.009},
  doi          = {10.1016/J.DIIN.2019.07.009},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PontoST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PortoLFVIPV19,
  author       = {Lucas Faria Porto and
                  Laise Nascimento Correia Lima and
                  Marta Regina Pinheiro Flores and
                  Andrea Valsecchi and
                  {\'{O}}scar Ib{\'{a}}{\~{n}}ez and
                  Carlos Eduardo Machado Palhares and
                  Flavio de Barros Vidal},
  title        = {Automatic cephalometric landmarks detection on frontal faces: An approach
                  based on supervised learning techniques},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {108--116},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.008},
  doi          = {10.1016/J.DIIN.2019.07.008},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PortoLFVIPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PourBVNPC19,
  author       = {Morteza Safaei Pour and
                  Elias Bou{-}Harb and
                  Kavita Varma and
                  Nataliia Neshenko and
                  Dimitris A. Pados and
                  Kim{-}Kwang Raymond Choo},
  title        = {Comprehending the IoT cyber threat landscape: {A} data dimensionality
                  reduction technique to infer and characterize Internet-scale IoT probing
                  campaigns},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S40--S49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.014},
  doi          = {10.1016/J.DIIN.2019.01.014},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PourBVNPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RenduchintalaJK19,
  author       = {Ankit Renduchintala and
                  Farha Jahan and
                  Raghav Khanna and
                  Ahmad Y. Javaid},
  title        = {A comprehensive micro unmanned aerial vehicle (UAV/Drone) forensic
                  framework},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {52--72},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.002},
  doi          = {10.1016/J.DIIN.2019.07.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RenduchintalaJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SanchezGBH19,
  author       = {Laura S{\'{a}}nchez and
                  Cinthya Grajeda and
                  Ibrahim M. Baggili and
                  Cory Lloyd Hall},
  title        = {A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering,
                  {\&} Safer Presentation for Investigating Child Sexual Abuse Material
                  {(CSAM)}},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S124--S142},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.005},
  doi          = {10.1016/J.DIIN.2019.04.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SanchezGBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SayakkaraLS19,
  author       = {Asanka P. Sayakkara and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {A survey of electromagnetic side-channel attacks and discussion on
                  their case-progressing potential for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {43--54},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.002},
  doi          = {10.1016/J.DIIN.2019.03.002},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SayakkaraLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SayakkaraLS19a,
  author       = {Asanka P. Sayakkara and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Leveraging Electromagnetic Side-Channel Analysis for the Investigation
                  of IoT Devices},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S94--S103},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.012},
  doi          = {10.1016/J.DIIN.2019.04.012},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SayakkaraLS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schatz19,
  author       = {Bradley L. Schatz},
  title        = {{AFF4-L:} {A} Scalable Open Logical Evidence Container},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S143--S149},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.016},
  doi          = {10.1016/J.DIIN.2019.04.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schatz19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ServidaC19,
  author       = {Francesco Servida and
                  Eoghan Casey},
  title        = {IoT forensic challenges and opportunities for digital traces},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S22--S29},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.012},
  doi          = {10.1016/J.DIIN.2019.01.012},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ServidaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShielO19,
  author       = {Ian Shiel and
                  Stephen O'Shaughnessy},
  title        = {Improving file-level fuzzy hashes for malware variant classification},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S88--S94},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.018},
  doi          = {10.1016/J.DIIN.2019.01.018},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShielO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShukanAOA19,
  author       = {Aliya Shukan and
                  Aitugan Abdizhami and
                  Gulnar Ospanova and
                  Dana Abdakimova},
  title        = {Crime control in the sphere of information technologies in the Republic
                  of Turkey},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {94--100},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.005},
  doi          = {10.1016/J.DIIN.2019.07.005},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShukanAOA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SinghSK19,
  author       = {Manmeet Singh and
                  Maninder Singh and
                  Sanmeet Kaur},
  title        = {Detecting bot-infected machines using {DNS} fingerprinting},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {14--33},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2018.12.005},
  doi          = {10.1016/J.DIIN.2018.12.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SinghSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SitaraM19,
  author       = {K. Sitara and
                  Babu M. Mehtre},
  title        = {Differentiating synthetic and optical zooming for passive video forgery
                  detection: An anti-forensic perspective},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {1--11},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.05.001},
  doi          = {10.1016/J.DIIN.2019.05.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SitaraM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SoltaniH19,
  author       = {Somayeh Soltani and
                  Seyed{-}Amin Hosseini{-}Seno},
  title        = {A formal model for event reconstruction in digital forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {30},
  pages        = {148--160},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.07.006},
  doi          = {10.1016/J.DIIN.2019.07.006},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SoltaniH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StudiawanSP19,
  author       = {Hudan Studiawan and
                  Ferdous Sohel and
                  Christian Payne},
  title        = {A survey on forensic investigation of operating system logs},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {1--20},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.02.005},
  doi          = {10.1016/J.DIIN.2019.02.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/StudiawanSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SundeD19,
  author       = {Nina Sunde and
                  Itiel E. Dror},
  title        = {Cognitive and human factors in digital forensics: Problems, challenges,
                  and the way forward},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {101--108},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.03.011},
  doi          = {10.1016/J.DIIN.2019.03.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SundeD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThreadgallH19,
  author       = {Ruth Threadgall and
                  Graeme Horsman},
  title        = {An examination of gaming platform policies for law enforcement support},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200887},
  doi          = {10.1016/J.FSIDI.2019.200887},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThreadgallH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/UrozR19,
  author       = {Daniel Uroz and
                  Ricardo J. Rodr{\'{\i}}guez},
  title        = {Characteristics and detectability of Windows auto-start extensibility
                  points in memory forensics},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S95--S104},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.026},
  doi          = {10.1016/J.DIIN.2019.01.026},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/UrozR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VeselyZ19,
  author       = {Vladim{\'{\i}}r Vesel{\'{y}} and
                  Martin Z{\'{a}}dn{\'{\i}}k},
  title        = {How to detect cryptocurrency miners? By traffic forensics!},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.08.002},
  doi          = {10.1016/J.DIIN.2019.08.002},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VeselyZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRHJG19,
  author       = {James Wagner and
                  Alexander Rasin and
                  Karen Heart and
                  Rebecca Jacob and
                  Jonathan Grier},
  title        = {{DB3F} {\&} DF-Toolkit: The Database Forensic File Format and
                  the Database Forensic Toolkit},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S42--S50},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.010},
  doi          = {10.1016/J.DIIN.2019.04.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRHJG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WuLX19,
  author       = {Yan Wu and
                  Anthony Luo and
                  Dianxiang Xu},
  title        = {Identifying suspicious addresses in Bitcoin thefts},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200895},
  doi          = {10.1016/J.FSIDI.2019.200895},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WuLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZandwijkB19,
  author       = {Jan Peter van Zandwijk and
                  Abdul Boztas},
  title        = {The iPhone Health App from a forensic perspective: can steps and distances
                  registered during walking and running be used as digital evidence?},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S126--S133},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.021},
  doi          = {10.1016/J.DIIN.2019.01.021},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZandwijkB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhangGBB19,
  author       = {Xiaolu Zhang and
                  Justin Grannis and
                  Ibrahim M. Baggili and
                  Nicole Lang Beebe},
  title        = {Frameup: An incriminatory attack on Storj: {A} peer to peer blockchain
                  enabled distributed storage system},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {28--42},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.02.003},
  doi          = {10.1016/J.DIIN.2019.02.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZhangGBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhaoKGLXBZLW19,
  author       = {Lu Zhao and
                  Yanrong Kang and
                  Lili Guo and
                  Yuan Long and
                  Guidong Xing and
                  Menghu Bao and
                  Yaoguo Zhang and
                  Siqi Liu and
                  Chunlu Wang},
  title        = {The Research of Alcohol Drinking State Analyzing Based on Smart Watch
                  Data},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S143},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.025},
  doi          = {10.1016/J.DIIN.2019.01.025},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZhaoKGLXBZLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/issaIA19,
  author       = {Hamzeh Abu Issa and
                  Mahmoud Ismail and
                  Omar Aamar},
  title        = {Unauthorized access crime in Jordanian law (comparative study)},
  journal      = {Digit. Investig.},
  volume       = {28},
  number       = {Supplement},
  pages        = {104--111},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.006},
  doi          = {10.1016/J.DIIN.2019.01.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/issaIA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/0002HZXLC18,
  author       = {Na Huang and
                  Jingsha He and
                  Nafei Zhu and
                  Xinggang Xuan and
                  Gongzheng Liu and
                  Chengyue Chang},
  title        = {Identification of the source camera of images based on convolutional
                  neural network},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {72--80},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.08.001},
  doi          = {10.1016/J.DIIN.2018.08.001},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/0002HZXLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AbooraigAKHAH18,
  author       = {Raddad Abooraig and
                  Shadi AlZu'bi and
                  Tarek Kanan and
                  Bilal Hawashin and
                  Mahmoud Al{-}Ayyoub and
                  Ismail Hmeidi},
  title        = {Automatic categorization of Arabic articles based on their political
                  orientation},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {24--41},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.003},
  doi          = {10.1016/J.DIIN.2018.04.003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AbooraigAKHAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AhmedI18,
  author       = {Sajjad Ahmed and
                  Saiful Islam},
  title        = {Median filter detection through streak area analysis},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {100--106},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.08.002},
  doi          = {10.1016/J.DIIN.2018.08.002},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AhmedI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-kawazCFL18,
  author       = {Hiba Al{-}Kawaz and
                  Nathan L. Clarke and
                  Steven Furnell and
                  Fudong Li},
  title        = {Facial-Forensic Analysis Tool},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S136},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.008},
  doi          = {10.1016/J.DIIN.2018.04.008},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Al-kawazCFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlendalDA18,
  author       = {Gunnar Alendal and
                  Geir Olav Dyrkolbotn and
                  Stefan Axelsson},
  title        = {Forensics acquisition - Analysis and circumvention of samsung secure
                  boot enforced common criteria mode},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S60--S67},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.008},
  doi          = {10.1016/J.DIIN.2018.01.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AlendalDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AwasthiRXS18,
  author       = {Akshay Awasthi and
                  Huw Read and
                  Konstantinos Xynos and
                  Iain Sutherland},
  title        = {Welcome pwn: Almond smart home hub forensics},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S38--S46},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.014},
  doi          = {10.1016/J.DIIN.2018.04.014},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AwasthiRXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaninD18,
  author       = {Sergii Banin and
                  Geir Olav Dyrkolbotn},
  title        = {Multinomial malware classification via low-level features},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S107--S117},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.019},
  doi          = {10.1016/J.DIIN.2018.04.019},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaninD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BayneFS18,
  author       = {Ethan Bayne and
                  R. Ian Ferguson and
                  Adam T. Sampson},
  title        = {OpenForensics: {A} digital forensics {GPU} pattern matching approach
                  for the 21st century},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S29--S37},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.005},
  doi          = {10.1016/J.DIIN.2018.01.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BayneFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BharadwajS18,
  author       = {Nitesh K. Bharadwaj and
                  Upasna Singh},
  title        = {Efficiently searching target data traces in storage devices with region
                  based random sector sampling approach},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {128--141},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.02.004},
  doi          = {10.1016/J.DIIN.2018.02.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BharadwajS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BhatW18,
  author       = {Wasim Ahmad Bhat and
                  Mohamad Ahtisham Wani},
  title        = {Forensic analysis of B-tree file system (Btrfs)},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {57--70},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.09.001},
  doi          = {10.1016/J.DIIN.2018.09.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BhatW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BhattA18,
  author       = {Manish Bhatt and
                  Irfan Ahmed},
  title        = {Leveraging relocations in ELF-binaries for Linux kernel version identification},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S12--S20},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.022},
  doi          = {10.1016/J.DIIN.2018.04.022},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BhattA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BolleC18,
  author       = {Timothy Boll{\'{e}} and
                  Eoghan Casey},
  title        = {Using computed similarity of distinctive digital traces to evaluate
                  non-obvious links and repetitions in cyber-investigations},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S2--S9},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.002},
  doi          = {10.1016/J.DIIN.2018.01.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BolleC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BordjibaKD18,
  author       = {Houssem Eddine Bordjiba and
                  ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {Data-driven approach for automatic telephony threat analysis and campaign
                  detection},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S131--S141},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.016},
  doi          = {10.1016/J.DIIN.2018.01.016},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BordjibaKD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BoucherL18,
  author       = {Jacques Boucher and
                  Nhien{-}An Le{-}Khac},
  title        = {Forensic framework to identify local vs synced artefacts},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S68--S75},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.009},
  doi          = {10.1016/J.DIIN.2018.01.009},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BoucherL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey18,
  author       = {Eoghan Casey},
  title        = {The knowledge management gap in digital investigations},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.11.001},
  doi          = {10.1016/J.DIIN.2018.11.001},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey18a,
  author       = {Eoghan Casey},
  title        = {Clearly conveying digital forensic results},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {1--3},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.03.001},
  doi          = {10.1016/J.DIIN.2018.03.001},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey18b,
  author       = {Eoghan Casey},
  title        = {The need for translational research in digital investigation},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.09.003},
  doi          = {10.1016/J.DIIN.2018.09.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyGN18,
  author       = {Eoghan Casey and
                  Zeno J. M. H. Geradts and
                  Bruce J. Nikkel},
  title        = {Transdisciplinary strategies for digital investigation challenges},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {1--4},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.05.002},
  doi          = {10.1016/J.DIIN.2018.05.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyGN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChauJ18,
  author       = {Ngoc{-}Tu Chau and
                  Souhwan Jung},
  title        = {Dynamic analysis with Android container: Challenges and opportunities},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {38--46},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.09.007},
  doi          = {10.1016/J.DIIN.2018.09.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChauJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Chivers18,
  author       = {Howard Chivers},
  title        = {Navigating the Windows Mail database},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {92--99},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.02.001},
  doi          = {10.1016/J.DIIN.2018.02.001},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Chivers18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DaiLQL18,
  author       = {Yusheng Dai and
                  Hui Li and
                  Yekui Qian and
                  Xidong Lu},
  title        = {A malware classification method based on memory dump grayscale image},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {30--37},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.09.006},
  doi          = {10.1016/J.DIIN.2018.09.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DaiLQL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DalinsTWCB18,
  author       = {Janis Dalins and
                  Yuriy Tyshetskiy and
                  Campbell Wilson and
                  Mark J. Carman and
                  Douglas Boudry},
  title        = {Laying foundations for effective machine learning in law enforcement.
                  Majura - {A} labelling schema for child exploitation materials},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {40--54},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.05.004},
  doi          = {10.1016/J.DIIN.2018.05.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DalinsTWCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DalinsWC18,
  author       = {Janis Dalins and
                  Campbell Wilson and
                  Mark J. Carman},
  title        = {Criminal motivation on the dark web: {A} categorisation model for
                  law enforcement},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {62--71},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2017.12.003},
  doi          = {10.1016/J.DIIN.2017.12.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DalinsWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FengLZC18,
  author       = {Peijun Feng and
                  Qingbao Li and
                  Ping Zhang and
                  Zhifeng Chen},
  title        = {Logical acquisition method based on data migration for Android mobile
                  devices},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {55--62},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.05.003},
  doi          = {10.1016/J.DIIN.2018.05.003},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FengLZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FranqueiraBMM18,
  author       = {Virginia N. L. Franqueira and
                  Joanne Bryce and
                  Noora Al Mutawa and
                  Andrew Marrington},
  title        = {Investigation of Indecent Images of Children cases: Challenges and
                  suggestions collected from the trenches},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {95--105},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2017.11.002},
  doi          = {10.1016/J.DIIN.2017.11.002},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FranqueiraBMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FreilingH18,
  author       = {Felix C. Freiling and
                  Leonhard H{\"{o}}sch},
  title        = {Controlled experiments in digital evidence tampering},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S83--S92},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.011},
  doi          = {10.1016/J.DIIN.2018.01.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FreilingH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GobelB18,
  author       = {Thomas G{\"{o}}bel and
                  Harald Baier},
  title        = {Anti-forensics in ext4: On secrecy and usability of timestamp-based
                  data hiding},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S111--S120},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.014},
  doi          = {10.1016/J.DIIN.2018.01.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GobelB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Gokce18,
  author       = {Yasir Gokce},
  title        = {The Bylock fallacy: An In-depth Analysis of the Bylock Investigations
                  in Turkey},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {81--91},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.06.002},
  doi          = {10.1016/J.DIIN.2018.06.002},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Gokce18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrajedaSBCB18,
  author       = {Cinthya Grajeda and
                  Laura S{\'{a}}nchez and
                  Ibrahim M. Baggili and
                  Devon Clark and
                  Frank Breitinger},
  title        = {Experience constructing the Artifact Genome Project {(AGP):} Managing
                  the domain's knowledge one artifact at a time},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S47--S58},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.021},
  doi          = {10.1016/J.DIIN.2018.04.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GrajedaSBCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Gupta018,
  author       = {Bhupendra Gupta and
                  Mayank Tiwari},
  title        = {Improving source camera identification performance using {DCT} based
                  image frequency components dependent sensor pattern noise extraction
                  method},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {121--127},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.02.003},
  doi          = {10.1016/J.DIIN.2018.02.003},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Gupta018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannMNS18,
  author       = {Thibaut Heckmann and
                  Konstantinos Markantonakis and
                  David Naccache and
                  Thomas R. Souvignet},
  title        = {Forensic smartphone analysis using adhesives: Transplantation of Package
                  on Package components},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {29--39},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.05.005},
  doi          = {10.1016/J.DIIN.2018.05.005},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannMNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HenselerL18,
  author       = {Hans Henseler and
                  Sophie van Loenhout},
  title        = {Educating judges, prosecutors and lawyers in the use of digital forensic
                  experts},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S76--S82},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.010},
  doi          = {10.1016/J.DIIN.2018.01.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HenselerL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HilgertLY18,
  author       = {Jan{-}Niclas Hilgert and
                  Martin Lambertz and
                  Shujian Yang},
  title        = {Forensic analysis of multiple device {BTRFS} configurations using
                  The Sleuth Kit},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S21--S29},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.020},
  doi          = {10.1016/J.DIIN.2018.04.020},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HilgertLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HoKW18,
  author       = {Shuyuan Mary Ho and
                  Da{-}Yu Kao and
                  Wen{-}Ying Wu},
  title        = {Following the breadcrumbs: Timestamp pattern identification for cloud
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {79--94},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2017.12.001},
  doi          = {10.1016/J.DIIN.2017.12.001},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HoKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman18,
  author       = {Graeme Horsman},
  title        = {I didn't see that! An examination of internet browser cache behaviour
                  following website visits},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {105--113},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.02.006},
  doi          = {10.1016/J.DIIN.2018.02.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman18a,
  author       = {Graeme Horsman},
  title        = {Reconstructing streamed video content: {A} case study on YouTube and
                  Facebook Live stream content in the Chrome web browser cache},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S30--S37},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.017},
  doi          = {10.1016/J.DIIN.2018.04.017},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Horsman18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HorsmanPB18,
  author       = {Graeme Horsman and
                  Helen Page and
                  Peter Beveridge},
  title        = {A preliminary assessment of latent fingerprint evidence damage on
                  mobile device screens caused by digital forensic extractions},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {47--56},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.10.002},
  doi          = {10.1016/J.DIIN.2018.10.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HorsmanPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KabakusD18,
  author       = {Abdullah Talha Kabakus and
                  Ibrahim Alper Dogru},
  title        = {An in-depth analysis of Android malware using hybrid techniques},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {25--33},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.001},
  doi          = {10.1016/J.DIIN.2018.01.001},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KabakusD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KaoCS18,
  author       = {Da{-}Yu Kao and
                  Yuanpei Chen and
                  Neng{-}Hsin Shih},
  title        = {Reconstructing {ADS} data hiding in windows {NTFS:} {A} temporal analysis},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S137},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.009},
  doi          = {10.1016/J.DIIN.2018.04.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KaoCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarbabDDM18,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {MalDozer: Automatic framework for android malware detection using
                  deep learning},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S48--S59},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.007},
  doi          = {10.1016/J.DIIN.2018.01.007},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarbabDDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhaderHA18,
  author       = {Mariam Khader and
                  Ali Hadi and
                  Ghazi Al{-}Naymat},
  title        = {{HDFS} file operation fingerprints for forensic investigations},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {50--61},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2017.11.004},
  doi          = {10.1016/J.DIIN.2017.11.004},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KhaderHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KouwenSCL18,
  author       = {Arie Kouwen and
                  Mark Scanlon and
                  Kim{-}Kwang Raymond Choo and
                  Nhien{-}An Le{-}Khac},
  title        = {Digital forensic investigation of two-way radio communication equipment
                  and services},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S77--S86},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.007},
  doi          = {10.1016/J.DIIN.2018.04.007},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KouwenSCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LambertzHS18,
  author       = {Martin Lambertz and
                  Jan{-}Niclas Hilgert and
                  Roman Schell},
  title        = {Resurrecting Portable Network Graphics using block generators},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S138},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.010},
  doi          = {10.1016/J.DIIN.2018.04.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LambertzHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeBNS18,
  author       = {Quan Le and
                  Ois{\'{\i}}n Boydell and
                  Brian Mac Namee and
                  Mark Scanlon},
  title        = {Deep learning at the shallow end: Malware classification for non-domain
                  experts},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S118--S126},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.024},
  doi          = {10.1016/J.DIIN.2018.04.024},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeBNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LewisCAR18,
  author       = {Nathan Lewis and
                  Andrew Case and
                  Aisha I. Ali{-}Gombe and
                  Golden G. Richard III},
  title        = {Memory forensics and the Windows Subsystem for Linux},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S3--S11},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.018},
  doi          = {10.1016/J.DIIN.2018.04.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LewisCAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LinCZYW18,
  author       = {Xiaodong Lin and
                  Ting Chen and
                  Tong Zhu and
                  Kun Yang and
                  Fengguo Wei},
  title        = {Automated forensic analysis of mobile applications on Android devices},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S59--S66},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.012},
  doi          = {10.1016/J.DIIN.2018.04.012},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LinCZYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MarshallP18,
  author       = {Angus M. Marshall and
                  Richard F. Paige},
  title        = {Requirements in digital forensics method definition: Observations
                  from a {UK} study},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {23--29},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.09.004},
  doi          = {10.1016/J.DIIN.2018.09.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MarshallP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MeijG18,
  author       = {Christiaan Meij and
                  Zeno J. M. H. Geradts},
  title        = {Source camera identification using Photo Response Non-Uniformity on
                  WhatsApp},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {142--154},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.02.005},
  doi          = {10.1016/J.DIIN.2018.02.005},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MeijG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MosliYP18,
  author       = {Rayan Mosli and
                  Bo Yuan and
                  Yin Pan},
  title        = {On the viability of data collection using Google Rapid Response for
                  enterprise-level malware research},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S139},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.011},
  doi          = {10.1016/J.DIIN.2018.04.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MosliYP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NemetzSF18,
  author       = {Sebastian Nemetz and
                  Sven Schmitt and
                  Felix C. Freiling},
  title        = {A standardized corpus for SQLite database forensics},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S121--S130},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.015},
  doi          = {10.1016/J.DIIN.2018.01.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NemetzSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NikasAP18,
  author       = {Alexios Nikas and
                  Efthimios Alepis and
                  Constantinos Patsakis},
  title        = {I know what you streamed last night: On the security and privacy of
                  streaming},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {78--89},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.03.004},
  doi          = {10.1016/J.DIIN.2018.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NikasAP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OrrS18,
  author       = {Douglas A. Orr and
                  Laura S{\'{a}}nchez},
  title        = {\emph{Alexa, did you get that?} Determining the evidentiary value
                  of data stored by the Amazon{\textregistered} Echo},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {72--78},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2017.12.002},
  doi          = {10.1016/J.DIIN.2017.12.002},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OrrS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OtsukiKIMO18,
  author       = {Yuto Otsuki and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Jun Miyoshi and
                  Kazuhiko Ohkubo},
  title        = {Building stack traces from memory dump of Windows x64},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S101--S110},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.013},
  doi          = {10.1016/J.DIIN.2018.01.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OtsukiKIMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OwensonCL18,
  author       = {Gareth Owenson and
                  Sarah Cortes and
                  Andrew Lewman},
  title        = {The darknet's smaller than we thought: The life cycle of Tor Hidden
                  Services},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {17--22},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.09.005},
  doi          = {10.1016/J.DIIN.2018.09.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OwensonCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OzelBYB18,
  author       = {Mesut Ozel and
                  H. Ibrahim Bulbul and
                  H. Guclu Yavuzcan and
                  {\"{O}}mer Faruk Bay},
  title        = {An analytical analysis of Turkish digital forensics},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {55--69},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.001},
  doi          = {10.1016/J.DIIN.2018.04.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OzelBYB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PalutkeF18,
  author       = {Ralph Palutke and
                  Felix C. Freiling},
  title        = {Styx: Countering robust memory acquisition},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S18--S28},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.004},
  doi          = {10.1016/J.DIIN.2018.01.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PalutkeF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Park18,
  author       = {Jungheum Park},
  title        = {{TREDE} and {VMPOP:} Cultivating multi-purpose datasets for digital
                  forensics - {A} Windows registry corpus as an example},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {3--18},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.025},
  doi          = {10.1016/J.DIIN.2018.04.025},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Park18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkAJHKYSHK18,
  author       = {Sungmi Park and
                  Nikolay Akatyev and
                  Yunsik Jang and
                  Jisoo Hwang and
                  Donghyun Kim and
                  Woonseon Yu and
                  Hyunwoo Shin and
                  Changhee Han and
                  Jonghyun Kim},
  title        = {A comparative study on data protection legislations and government
                  standards to implement Digital Forensic Readiness as mandatory requirement},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S93--S100},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.012},
  doi          = {10.1016/J.DIIN.2018.01.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkAJHKYSHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkJP18,
  author       = {Juhyun Park and
                  Yun{-}Hwan Jang and
                  Yongsu Park},
  title        = {New flash memory acquisition methods based on firmware update protocols
                  for {LG} Android smartphones},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {42--54},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.002},
  doi          = {10.1016/J.DIIN.2018.04.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkKK18,
  author       = {Myungseo Park and
                  Hangi Kim and
                  Jongsung Kim},
  title        = {How to decrypt PIN-Based encrypted backup data of Samsung smartphones},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {63--71},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.05.006},
  doi          = {10.1016/J.DIIN.2018.05.006},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ParkKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Pieterse0H18,
  author       = {Heloise Pieterse and
                  Martin Olivier and
                  Renier van Heerden},
  title        = {Smartphone data evaluation model: Identifying authentic smartphone
                  data},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {11--24},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.017},
  doi          = {10.1016/J.DIIN.2018.01.017},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Pieterse0H18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Porter18,
  author       = {Kyle Porter},
  title        = {Analyzing the DarkNetMarkets subreddit for evolutions of tools and
                  trends using {LDA} topic modeling},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S87--S97},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.023},
  doi          = {10.1016/J.DIIN.2018.04.023},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Porter18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RaffN18,
  author       = {Edward Raff and
                  Charles Nicholas},
  title        = {Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and
                  sdhash},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {34--49},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2017.12.004},
  doi          = {10.1016/J.DIIN.2017.12.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RaffN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SS18,
  author       = {Athulya M. S. and
                  Sathidevi Puthumangalathu Savithri},
  title        = {Speaker verification from codec distorted speech for forensic investigation
                  through serial combination of classifiers},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {70--77},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.03.005},
  doi          = {10.1016/J.DIIN.2018.03.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SandvikA18,
  author       = {Jens{-}Petter Sandvik and
                  Andr{\'{e}} {\AA}rnes},
  title        = {The reliability of clocks as digital evidence under low voltage conditions},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S10--S17},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.003},
  doi          = {10.1016/J.DIIN.2018.01.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SandvikA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SinhaGM18,
  author       = {Vijay Kumar Sinha and
                  Anuj Kumar Gupta and
                  Manish Mahajan},
  title        = {Detecting fake iris in iris bio-metric system},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {97--104},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.03.002},
  doi          = {10.1016/J.DIIN.2018.03.002},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SinhaGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SloanH18,
  author       = {Thomas Sloan and
                  Julio C. Hernandez{-}Castro},
  title        = {Dismantling OpenPuff {PDF} steganography},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {90--96},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.03.003},
  doi          = {10.1016/J.DIIN.2018.03.003},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SloanH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sommer18,
  author       = {Peter Sommer},
  title        = {Accrediting digital forensics: What are the choices?},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {116--120},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.004},
  doi          = {10.1016/J.DIIN.2018.04.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sommer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StellyR18,
  author       = {Christopher Stelly and
                  Vassil Roussev},
  title        = {Nugget: {A} digital forensics language},
  journal      = {Digit. Investig.},
  volume       = {24 Supplement},
  pages        = {S38--S47},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.006},
  doi          = {10.1016/J.DIIN.2018.01.006},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StellyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SudozaiSBHZ18,
  author       = {M. A. K. Sudozai and
                  Shahzad Saleem and
                  William J. Buchanan and
                  Nisar Habib and
                  Haleemah Zia},
  title        = {Forensics study of {IMO} call and chat app},
  journal      = {Digit. Investig.},
  volume       = {25},
  pages        = {5--23},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.006},
  doi          = {10.1016/J.DIIN.2018.04.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SudozaiSBHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TaubmannAR18,
  author       = {Benjamin Taubmann and
                  Omar Alabduljaleel and
                  Hans P. Reiser},
  title        = {DroidKex: Fast extraction of ephemeral {TLS} keys from the memory
                  of Android apps},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S67--S76},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.013},
  doi          = {10.1016/J.DIIN.2018.04.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TaubmannAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThompsonV18,
  author       = {Michael F. Thompson and
                  Timothy Vidas},
  title        = {Cyber Grand Challenge {(CGC)} monitor: {A} vetting system for the
                  {DARPA} cyber grand challenge},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S127--S135},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.016},
  doi          = {10.1016/J.DIIN.2018.04.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThompsonV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TsimperidisAK18,
  author       = {Ioannis Tsimperidis and
                  Avi Arampatzis and
                  Alexandros Karakos},
  title        = {Keystroke dynamics features for gender recognition},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {4--10},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.01.018},
  doi          = {10.1016/J.DIIN.2018.01.018},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TsimperidisAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TuzelBZLT18,
  author       = {Tomasz Tuzel and
                  Mark P. Bridgman and
                  Joshua Zepf and
                  Tamas K. Lengyel and
                  Kyle J. Temkin},
  title        = {Who watches the watcher? Detecting hypervisor introspection from unprivileged
                  guests},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S98--S106},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.015},
  doi          = {10.1016/J.DIIN.2018.04.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TuzelBZLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WerkhovenHJMGB18,
  author       = {Ben van Werkhoven and
                  Pieter Hijma and
                  Ceriel J. H. Jacobs and
                  Jason Maassen and
                  Zeno J. M. H. Geradts and
                  Henri E. Bal},
  title        = {A Jungle Computing approach to common image source identification
                  in large collections of images},
  journal      = {Digit. Investig.},
  volume       = {27},
  pages        = {3--16},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.09.002},
  doi          = {10.1016/J.DIIN.2018.09.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WerkhovenHJMGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Xie0LQ18,
  author       = {Yulai Xie and
                  Dan Feng and
                  Xuelong Liao and
                  Leihua Qin},
  title        = {Efficient monitoring and forensic analysis via accurate network-attached
                  provenance collection with minimal storage overhead},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {19--28},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.05.001},
  doi          = {10.1016/J.DIIN.2018.05.001},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Xie0LQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YoonL18,
  author       = {Jongseong Yoon and
                  Sangjin Lee},
  title        = {A method and tool to recover data deleted from a MongoDB},
  journal      = {Digit. Investig.},
  volume       = {24},
  pages        = {106--120},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2017.11.001},
  doi          = {10.1016/J.DIIN.2017.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/YoonL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AD17,
  author       = {Ajay Kumara M. A. and
                  Jaidhar C. D.},
  title        = {Leveraging virtual machine introspection with memory forensics to
                  detect and characterize unknown malware using machine learning techniques
                  at hypervisor},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {99--123},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.10.004},
  doi          = {10.1016/J.DIIN.2017.10.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSPWD17,
  author       = {Saed Alrabaee and
                  Noman Saleem and
                  Stere Preda and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Corrigendum to 'OBA2: An Onion approach to Binary code Authorship
                  Attribution' [Digit Investig 11 {(2014)} {S94-S103]}},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {89},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.004},
  doi          = {10.1016/J.DIIN.2017.02.004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSPWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AnglanoCG17,
  author       = {Cosimo Anglano and
                  Massimo Canonico and
                  Marco Guazzone},
  title        = {Forensic analysis of Telegram Messenger on Android smartphones},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {31--49},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.09.002},
  doi          = {10.1016/J.DIIN.2017.09.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AnglanoCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaigSVRHCJKISFP17,
  author       = {Zubair A. Baig and
                  Patryk Szewczyk and
                  Craig Valli and
                  Priya Rabadia and
                  Peter Hannay and
                  Maxim Chernyshev and
                  Mike Johnstone and
                  Paresh Kerai and
                  Ahmed Ibrahim and
                  Krishnun Sansurooah and
                  Syed Naeem Firdous and
                  Matthew Peacock},
  title        = {Future challenges for smart cities: Cyber-security and digital forensics},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {3--13},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.015},
  doi          = {10.1016/J.DIIN.2017.06.015},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaigSVRHCJKISFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BlockD17,
  author       = {Frank Block and
                  Andreas Dewald},
  title        = {Linux memory forensics: Dissecting the user space process heap},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S66--S75},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.002},
  doi          = {10.1016/J.DIIN.2017.06.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BlockD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bou-HarbS17,
  author       = {Elias Bou{-}Harb and
                  Mark Scanlon},
  title        = {Behavioral Service Graphs: {A} formal data-driven approach for prompt
                  investigation of enterprise and internet-wide infections},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S47--S55},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.002},
  doi          = {10.1016/J.DIIN.2017.02.002},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Bou-HarbS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bridge17,
  author       = {Adam Bridge},
  title        = {Obtaining forensic value from the cbWndExtra structures as used by
                  Windows Common Controls, specifically for the Editbox control},
  journal      = {Digit. Investig.},
  volume       = {20},
  pages        = {54--60},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.007},
  doi          = {10.1016/J.DIIN.2017.02.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Bridge17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BuchananCM17,
  author       = {William J. Buchanan and
                  Simone Chiale and
                  Richard Macfarlane},
  title        = {A methodology for the security evaluation within third-party Android
                  Marketplaces},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {88--98},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.10.002},
  doi          = {10.1016/J.DIIN.2017.10.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BuchananCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseDPRR17,
  author       = {Andrew Case and
                  Arghya Kusum Das and
                  Seung{-}Jong Park and
                  J. Ramanujam and
                  Golden G. Richard III},
  title        = {Gaslight: {A} comprehensive fuzzing architecture for memory forensics
                  frameworks},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S86--S93},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.011},
  doi          = {10.1016/J.DIIN.2017.06.011},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CaseDPRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseR17,
  author       = {Andrew Case and
                  Golden G. Richard III},
  title        = {Memory forensics: The path forward},
  journal      = {Digit. Investig.},
  volume       = {20},
  pages        = {23--33},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2016.12.004},
  doi          = {10.1016/J.DIIN.2016.12.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey17,
  author       = {Eoghan Casey},
  title        = {The broadening horizons of digital investigation},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.05.002},
  doi          = {10.1016/J.DIIN.2017.05.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey17a,
  author       = {Eoghan Casey},
  title        = {The value of forensic preparedness and digital-identification expertise
                  in smart society},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.09.001},
  doi          = {10.1016/J.DIIN.2017.09.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey17b,
  author       = {Eoghan Casey},
  title        = {Editorial - {A} sm{\"{o}}rg{\aa}sbord of digital evidence},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.11.003},
  doi          = {10.1016/J.DIIN.2017.11.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyBGSBN17,
  author       = {Eoghan Casey and
                  Sean Barnum and
                  Ryan Griffith and
                  Jonathan Snyder and
                  Harm M. A. van Beek and
                  Alex J. Nelson},
  title        = {Advancing coordinated cyber-investigations and tool interoperability
                  using a community developed specification language},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {14--45},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.08.002},
  doi          = {10.1016/J.DIIN.2017.08.002},
  timestamp    = {Sun, 22 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyBGSBN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChungPL17,
  author       = {Hyunji Chung and
                  Jungheum Park and
                  Sangjin Lee},
  title        = {Digital forensic approaches for Amazon Alexa ecosystem},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S15--S25},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.010},
  doi          = {10.1016/J.DIIN.2017.06.010},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChungPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ClarkMBB17,
  author       = {Devon Clark and
                  Christopher Meffert and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {{DROP} (DRone Open source Parser) your drone: Forensic analysis of
                  the {DJI} Phantom {III}},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S3--S14},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.013},
  doi          = {10.1016/J.DIIN.2017.06.013},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ClarkMBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Cohen17,
  author       = {Michael Cohen},
  title        = {Scanning memory with Yara},
  journal      = {Digit. Investig.},
  volume       = {20},
  pages        = {34--43},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.005},
  doi          = {10.1016/J.DIIN.2017.02.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Cohen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DentonKBB17,
  author       = {George Denton and
                  Filip Karp{\'{\i}}sek and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Leveraging the {SRTP} protocol for over-the-network memory acquisition
                  of a {GE} Fanuc Series 90-30},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S26--S38},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.005},
  doi          = {10.1016/J.DIIN.2017.06.005},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DentonKBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DewaldS17,
  author       = {Andreas Dewald and
                  Sabine Seufert},
  title        = {{AFEIC:} Advanced forensic Ext4 inode carving},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S83--S91},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.003},
  doi          = {10.1016/J.DIIN.2017.01.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DewaldS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DivakaranWNT17,
  author       = {Dinil Mon Divakaran and
                  Fok Kar Wai and
                  Ido Nevat and
                  Vrizlynn L. L. Thing},
  title        = {Evidence gathering for network security and forensics},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S56--S65},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.001},
  doi          = {10.1016/J.DIIN.2017.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DivakaranWNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DolliverCS17,
  author       = {Diana S. Dolliver and
                  Carson Collins and
                  Beau Sams},
  title        = {Hybrid approaches to digital forensic investigations: {A} comparative
                  analysis in an institutional context},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {124--137},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.10.005},
  doi          = {10.1016/J.DIIN.2017.10.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DolliverCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/EllouzeRBA17,
  author       = {Nourhene Ellouze and
                  Slim Rekhis and
                  Noureddine Boudriga and
                  Mohamed Allouche},
  title        = {Cardiac Implantable Medical Devices forensics: Postmortem analysis
                  of lethal attacks scenarios},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {11--30},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2016.12.001},
  doi          = {10.1016/J.DIIN.2016.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/EllouzeRBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FreilingGR17,
  author       = {Felix C. Freiling and
                  Thomas Glanzmann and
                  Hans P. Reiser},
  title        = {Characterizing loss of digital evidence due to abstraction layers},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S107--S115},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.012},
  doi          = {10.1016/J.DIIN.2017.01.012},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FreilingGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FreilingZ17,
  author       = {Felix C. Freiling and
                  Christian Zoubek},
  title        = {Do digital investigators have to program? {A} controlled experiment
                  in digital investigation},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S37--S46},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.004},
  doi          = {10.1016/J.DIIN.2017.01.004},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FreilingZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FukamiGLCM17,
  author       = {Aya Fukami and
                  Saugata Ghose and
                  Yixin Luo and
                  Yu Cai and
                  Onur Mutlu},
  title        = {Improving the reliability of chip-off forensic analysis of {NAND}
                  flash memory devices},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S1--S11},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.011},
  doi          = {10.1016/J.DIIN.2017.01.011},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FukamiGLCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GalbraithS17,
  author       = {Christopher Galbraith and
                  Padhraic Smyth},
  title        = {Analyzing user-event data using score-based likelihood ratios with
                  marked point processes},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S106--S114},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.009},
  doi          = {10.1016/J.DIIN.2017.06.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GalbraithS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GeorgievskaBGSW17,
  author       = {Sonja Georgievska and
                  Rena Bakhshi and
                  Anand Gavai and
                  Alessio Sclocco and
                  Ben van Werkhoven},
  title        = {Clustering image noise patterns by embedding and visualization for
                  common source camera detection},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {22--30},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.08.005},
  doi          = {10.1016/J.DIIN.2017.08.005},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GeorgievskaBGSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GladyshevJ17,
  author       = {Pavel Gladyshev and
                  Joshua I. James},
  title        = {Decision-theoretic file carving},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {46--61},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.08.001},
  doi          = {10.1016/J.DIIN.2017.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GladyshevJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrajedaBB17,
  author       = {Cinthya Grajeda and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Availability of datasets for digital forensics - And what is missing},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S94--S105},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.004},
  doi          = {10.1016/J.DIIN.2017.06.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrajedaBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GregorioVA17,
  author       = {Jes{\'{u}}s Gregorio and
                  Alfredo Gardel Vicente and
                  Bernardo Alarcos},
  title        = {Forensic analysis of Telegram Messenger for Windows Phone},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {88--106},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.07.004},
  doi          = {10.1016/J.DIIN.2017.07.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GregorioVA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrisposGS17,
  author       = {George Grispos and
                  William Bradley Glisson and
                  Tim Storer},
  title        = {Enhancing security incident response follow-up efforts with lightweight
                  agile retrospectives},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {62--73},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.07.006},
  doi          = {10.1016/J.DIIN.2017.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GrisposGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Gruhn17,
  author       = {Michael Gruhn},
  title        = {Forensic limbo: Towards subverting hard disk firmware bootkits},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {138--150},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.10.003},
  doi          = {10.1016/J.DIIN.2017.10.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Gruhn17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HansenT17,
  author       = {Kurt H. Hansen and
                  Fergus Toolan},
  title        = {Decoding the {APFS} file system},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {107--132},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.07.003},
  doi          = {10.1016/J.DIIN.2017.07.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HansenT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSN17,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  David Naccache},
  title        = {Electrically conductive adhesives, thermally conductive adhesives
                  and {UV} adhesives in data extraction forensics},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {53--64},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.009},
  doi          = {10.1016/J.DIIN.2017.02.009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HilgertLP17,
  author       = {Jan{-}Niclas Hilgert and
                  Martin Lambertz and
                  Daniel Plohmann},
  title        = {Extending The Sleuth Kit and its underlying model for pooled storage
                  file system forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S76--S85},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.003},
  doi          = {10.1016/J.DIIN.2017.06.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HilgertLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman17,
  author       = {Graeme Horsman},
  title        = {A survey of current social network and online communication provision
                  policies to support law enforcement identify offenders},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {65--75},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.03.001},
  doi          = {10.1016/J.DIIN.2017.03.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HorsmanGC17,
  author       = {Graeme Horsman and
                  Kevin Ginty and
                  Paul Cranner},
  title        = {Identifying offenders on Twitter: {A} law enforcement practitioner
                  guide},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {63--74},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.09.004},
  doi          = {10.1016/J.DIIN.2017.09.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HorsmanGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JeongL17,
  author       = {Doowon Jeong and
                  Sangjin Lee},
  title        = {Study on the tracking revision history of {MS} Word files for forensic
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {3--10},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.08.003},
  doi          = {10.1016/J.DIIN.2017.08.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JeongL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LanternaB17,
  author       = {Dario Lanterna and
                  Antonio Barili},
  title        = {Forensic analysis of deduplicated file systems},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S99--S106},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.008},
  doi          = {10.1016/J.DIIN.2017.01.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LanternaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LapsoPO17,
  author       = {Joshua A. Lapso and
                  Gilbert L. Peterson and
                  James S. Okolica},
  title        = {Whitelisting system state in windows forensic memory visualizations},
  journal      = {Digit. Investig.},
  volume       = {20},
  pages        = {2--15},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2016.12.002},
  doi          = {10.1016/J.DIIN.2016.12.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LapsoPO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MillerGCDLP17,
  author       = {Cody Miller and
                  Dae Glendowne and
                  Henry Cook and
                  Thomas DeMarcus and
                  Chris Lanclos and
                  Patrick Pape},
  title        = {Insights gained from constructing a large scale dynamic analysis platform},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S48--S56},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.007},
  doi          = {10.1016/J.DIIN.2017.06.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MillerGCDLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel17,
  author       = {Bruce J. Nikkel},
  title        = {Registration Data Access Protocol {(RDAP)} for digital forensic investigators},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {133--141},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.07.002},
  doi          = {10.1016/J.DIIN.2017.07.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PridgenGW17,
  author       = {Adam Pridgen and
                  Simson L. Garfinkel and
                  Dan S. Wallach},
  title        = {Picking up the trash: Exploiting generational {GC} for memory analysis},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S20--S28},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.002},
  doi          = {10.1016/J.DIIN.2017.01.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PridgenGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SaleemPB17,
  author       = {Shahzad Saleem and
                  Oliver Popov and
                  Ibrahim M. Baggili},
  title        = {Comments on "A method and a case study for the selection of the best
                  available tool for mobile device forensics using decision analysis"
                  [Digit Investig 16S, {S55-S64]}},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {88},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.003},
  doi          = {10.1016/J.DIIN.2017.02.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SaleemPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ScanlonDL17,
  author       = {Mark Scanlon and
                  Xiaoyu Du and
                  David Lillis},
  title        = {EviPlant: An efficient digital forensic challenge creation, manipulation
                  and distribution solution},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S29--S36},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.010},
  doi          = {10.1016/J.DIIN.2017.01.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ScanlonDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchatzC17,
  author       = {Bradley L. Schatz and
                  Michael Cohen},
  title        = {Advances in volatile memory forensics},
  journal      = {Digit. Investig.},
  volume       = {20},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.008},
  doi          = {10.1016/J.DIIN.2017.02.008},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchatzC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schramp17,
  author       = {R. Schramp},
  title        = {Live transportation and {RAM} acquisition proficiency test},
  journal      = {Digit. Investig.},
  volume       = {20},
  pages        = {44--53},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.006},
  doi          = {10.1016/J.DIIN.2017.02.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Schramp17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SenthivelAR17,
  author       = {Saranyan Senthivel and
                  Irfan Ahmed and
                  Vassil Roussev},
  title        = {{SCADA} network forensics of the {PCCC} protocol},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S57--S65},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.012},
  doi          = {10.1016/J.DIIN.2017.06.012},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SenthivelAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShawPS17,
  author       = {Eric Shaw and
                  Maria Payri and
                  Ilene Shaw},
  title        = {The use of communicated negative sentiment and victimization for locating
                  authors at-risk for, or having committed, insider actions},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {142--146},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.014},
  doi          = {10.1016/J.DIIN.2017.06.014},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShawPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShiLLS17,
  author       = {Chao Shi and
                  Ngai{-}Fong Law and
                  Frank Hung{-}Fat Leung and
                  Wan{-}Chi Siu},
  title        = {A local variance based approach to alleviate the scene content interference
                  for source camera identification},
  journal      = {Digit. Investig.},
  volume       = {22},
  pages        = {74--87},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.07.005},
  doi          = {10.1016/J.DIIN.2017.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShiLLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShiXJQYZXC17,
  author       = {Kai Shi and
                  Ming Xu and
                  Haoxia Jin and
                  Tong Qiao and
                  Xue Yang and
                  Ning Zheng and
                  Jian Xu and
                  Kim{-}Kwang Raymond Choo},
  title        = {A novel file carving algorithm for National Marine Electronics Association
                  {(NMEA)} logs in {GPS} forensics},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {11--21},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.08.004},
  doi          = {10.1016/J.DIIN.2017.08.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShiXJQYZXC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SinghA17,
  author       = {Raahat Devender Singh and
                  Naveen Aggarwal},
  title        = {Detection of upscale-crop and splicing for digital video authentication},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {31--52},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.001},
  doi          = {10.1016/J.DIIN.2017.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SinghA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Spiekermann0E17,
  author       = {Daniel Spiekermann and
                  J{\"{o}}rg Keller and
                  Tobias Eggendorfer},
  title        = {Network forensic investigation in OpenFlow networks with ForCon},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S66--S74},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.007},
  doi          = {10.1016/J.DIIN.2017.01.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Spiekermann0E17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StellyR17,
  author       = {Christopher Stelly and
                  Vassil Roussev},
  title        = {{SCARF:} {A} container-based approach to cloud-scale digital forensic
                  processing},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S39--S47},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.008},
  doi          = {10.1016/J.DIIN.2017.06.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StellyR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StudiawanPS17,
  author       = {Hudan Studiawan and
                  Christian Payne and
                  Ferdous Sohel},
  title        = {Graph clustering and anomaly detection of access control log for forensic
                  purposes},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {76--87},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.05.001},
  doi          = {10.1016/J.DIIN.2017.05.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/StudiawanPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SylveMR17,
  author       = {Joe Sylve and
                  Lodovico Marziale and
                  Golden G. Richard III},
  title        = {Modern windows hibernation file analysis},
  journal      = {Digit. Investig.},
  volume       = {20},
  pages        = {16--22},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2016.12.003},
  doi          = {10.1016/J.DIIN.2016.12.003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SylveMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRGHFBG17,
  author       = {James Wagner and
                  Alexander Rasin and
                  Boris Glavic and
                  Karen Heart and
                  Jacob D. Furst and
                  Lucas Bressan and
                  Jonathan Grier},
  title        = {Carving database storage to detect and trace security breaches},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S127--S136},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.006},
  doi          = {10.1016/J.DIIN.2017.06.006},
  timestamp    = {Thu, 14 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRGHFBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Wang17,
  author       = {Kai Wang},
  title        = {A simple and effective image-statistics-based approach to detecting
                  recaptured images from {LCD} screens},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {75--87},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.10.001},
  doi          = {10.1016/J.DIIN.2017.10.001},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Wang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WuZWXD17,
  author       = {Songyang Wu and
                  Yong Zhang and
                  Xupeng Wang and
                  Xiong Xiong and
                  Lin Du},
  title        = {Forensic analysis of WeChat on Android smartphones},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {3--10},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2016.11.002},
  doi          = {10.1016/J.DIIN.2016.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WuZWXD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WustTRD17,
  author       = {Karl W{\"{u}}st and
                  Petar Tsankov and
                  Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  title        = {Force Open: Lightweight black box file repair},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S75--S82},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.009},
  doi          = {10.1016/J.DIIN.2017.01.009},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WustTRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YangCKBSX17,
  author       = {Seung Jei Yang and
                  Jung Ho Choi and
                  Ki Bom Kim and
                  Rohit Bhatia and
                  Brendan Saltaformaggio and
                  Dongyan Xu},
  title        = {Live acquisition of main memory data from Android smartphones and
                  smartwatches},
  journal      = {Digit. Investig.},
  volume       = {23},
  pages        = {50--62},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.09.003},
  doi          = {10.1016/J.DIIN.2017.09.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/YangCKBSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Zandwijk17,
  author       = {Jan Peter van Zandwijk},
  title        = {Bit-errors as a source of forensic information in NAND-flash memory},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S12--S19},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.005},
  doi          = {10.1016/J.DIIN.2017.01.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Zandwijk17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Zheng0LT17,
  author       = {Lilei Zheng and
                  Ying Zhang and
                  Chien Eao Lee and
                  Vrizlynn L. L. Thing},
  title        = {Time-of-recording estimation for audio recordings},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S115--S126},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.001},
  doi          = {10.1016/J.DIIN.2017.06.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Zheng0LT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZoubekS17,
  author       = {Christian Zoubek and
                  Konstantin Sack},
  title        = {Selective deletion of non-relevant data},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S92--S98},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.006},
  doi          = {10.1016/J.DIIN.2017.01.006},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZoubekS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/0004GF16,
  author       = {Johannes Bauer and
                  Michael Gruhn and
                  Felix C. Freiling},
  title        = {Lest we forget: Cold-boot attacks on scrambled {DDR3} memory},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S65--S74},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.009},
  doi          = {10.1016/J.DIIN.2016.01.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/0004GF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AkshathaKARS16,
  author       = {K. R. Akshatha and
                  A. Kotegar Karunakar and
                  H. Anitha and
                  U. Raghavendra and
                  Dinesh Shetty},
  title        = {Digital camera identification using {PRNU:} {A} feature based approach},
  journal      = {Digit. Investig.},
  volume       = {19},
  pages        = {69--77},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.10.002},
  doi          = {10.1016/J.DIIN.2016.10.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AkshathaKARS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Alrabaee0D16,
  author       = {Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics
                  of binary code as semantic flow graphs (SFGs)},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S11--S22},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.002},
  doi          = {10.1016/J.DIIN.2016.04.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AnglanoCG16,
  author       = {Cosimo Anglano and
                  Massimo Canonico and
                  Marco Guazzone},
  title        = {Forensic analysis of the ChatSecure instant messaging application
                  on android smartphones},
  journal      = {Digit. Investig.},
  volume       = {19},
  pages        = {44--59},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.10.001},
  doi          = {10.1016/J.DIIN.2016.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AnglanoCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BadenhopRMM16,
  author       = {Christopher W. Badenhop and
                  Benjamin W. P. Ramsey and
                  Barry E. Mullins and
                  Logan O. Mailloux},
  title        = {Extraction and analysis of non-volatile memory of the {ZW0301} module,
                  a Z-Wave transceiver},
  journal      = {Digit. Investig.},
  volume       = {17},
  pages        = {14--27},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.02.002},
  doi          = {10.1016/J.DIIN.2016.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BadenhopRMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BagiwaWIKC16,
  author       = {Mustapha Aminu Bagiwa and
                  Ainuddin Wahid Abdul Wahab and
                  Mohd Yamani Idna Bin Idris and
                  Suleman Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Chroma key background detection for digital video using statistical
                  correlation of blurring artifact},
  journal      = {Digit. Investig.},
  volume       = {19},
  pages        = {29--43},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.09.001},
  doi          = {10.1016/J.DIIN.2016.09.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BagiwaWIKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BiedermannV16,
  author       = {Alex Biedermann and
                  Jo{\"{e}}lle Vuille},
  title        = {Digital evidence, 'absence' of data and ambiguous patterns of reasoning},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S86--S95},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.011},
  doi          = {10.1016/J.DIIN.2016.01.011},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BiedermannV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseR16,
  author       = {Andrew Case and
                  Golden G. Richard III},
  title        = {Detecting objective-C malware through memory forensics},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S3--S10},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.017},
  doi          = {10.1016/J.DIIN.2016.04.017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey16,
  author       = {Eoghan Casey},
  title        = {Editorial from my iPhone},
  journal      = {Digit. Investig.},
  volume       = {16},
  pages        = {A1--A2},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.03.001},
  doi          = {10.1016/J.DIIN.2016.03.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey16a,
  author       = {Eoghan Casey},
  title        = {Editorial - {A} sea change in digital forensics and incident response},
  journal      = {Digit. Investig.},
  volume       = {17},
  pages        = {A1--A2},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.05.002},
  doi          = {10.1016/J.DIIN.2016.05.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey16b,
  author       = {Eoghan Casey},
  title        = {Focused digital evidence analysis and forensic distinguishers},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {A1--A3},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.08.004},
  doi          = {10.1016/J.DIIN.2016.08.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey16c,
  author       = {Eoghan Casey},
  title        = {Differentiating the phases of digital investigations},
  journal      = {Digit. Investig.},
  volume       = {19},
  pages        = {A1--A3},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.11.001},
  doi          = {10.1016/J.DIIN.2016.11.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChooHIM16,
  author       = {Kim{-}Kwang Raymond Choo and
                  Martin Herman and
                  Michaela Iorga and
                  Ben Martini},
  title        = {Cloud forensics: State-of-the-art and future directions},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {77--78},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.08.003},
  doi          = {10.1016/J.DIIN.2016.08.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChooHIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ConlanBB16,
  author       = {Kevin J. Conlan and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Anti-forensics: Furthering digital forensic science through a new
                  extended, granular taxonomy},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S66--S75},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.006},
  doi          = {10.1016/J.DIIN.2016.04.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ConlanBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/EbrahimiSO16,
  author       = {Mohammad Reza Ebrahimi and
                  Ching Y. Suen and
                  Olga Ormandjieva},
  title        = {Detecting predatory conversations in social media by deep Convolutional
                  Neural Networks},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {33--49},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.07.001},
  doi          = {10.1016/J.DIIN.2016.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/EbrahimiSO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ElstnerR16,
  author       = {Jens Elstner and
                  Mark Roeloffs},
  title        = {Forensic analysis of newer TomTom devices},
  journal      = {Digit. Investig.},
  volume       = {16},
  pages        = {29--37},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.016},
  doi          = {10.1016/J.DIIN.2016.01.016},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ElstnerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FahdiCLF16,
  author       = {M. Al Fahdi and
                  Nathan L. Clarke and
                  Fudong Li and
                  Steven M. Furnell},
  title        = {A suspect-oriented intelligent and automated computer forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {65--76},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.08.001},
  doi          = {10.1016/J.DIIN.2016.08.001},
  timestamp    = {Fri, 19 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FahdiCLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrestyGLI16,
  author       = {David W. Gresty and
                  Diane Gan and
                  George Loukas and
                  Constantinos Ierotheou},
  title        = {Facilitating forensic examinations of multi-user computer environments
                  through session-to-session analysis of Internet history},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S124--S133},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.015},
  doi          = {10.1016/J.DIIN.2016.01.015},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrestyGLI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GruhnF16,
  author       = {Michael Gruhn and
                  Felix C. Freiling},
  title        = {Evaluating atomicity, and integrity of correct memory acquisition
                  methods},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S1--S10},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.003},
  doi          = {10.1016/J.DIIN.2016.01.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GruhnF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuidoBG16,
  author       = {Mark D. Guido and
                  Jonathan Buttner and
                  Justin Grover},
  title        = {Rapid differential forensic imaging of mobile devices},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S46--S54},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.012},
  doi          = {10.1016/J.DIIN.2016.04.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuidoBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Halvani0P16,
  author       = {Oren Halvani and
                  Christian Winter and
                  Anika Pflug},
  title        = {Authorship verification for different languages, genres and topics},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S33--S43},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.006},
  doi          = {10.1016/J.DIIN.2016.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Halvani0P16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HarichandranWBB16,
  author       = {Vikram S. Harichandran and
                  Daniel Walnycky and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {CuFA: {A} more formal definition for digital forensic artifacts},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S125--S137},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.005},
  doi          = {10.1016/J.DIIN.2016.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HarichandranWBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannSLN16,
  author       = {Thibaut Heckmann and
                  Thomas R. Souvignet and
                  S. Lepeer and
                  David Naccache},
  title        = {Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling
                  and re-soldering},
  journal      = {Digit. Investig.},
  volume       = {19},
  pages        = {60--68},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.10.003},
  doi          = {10.1016/J.DIIN.2016.10.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannSLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HitchcockLS16,
  author       = {Ben Hitchcock and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Tiered forensic methodology model for Digital Field Triage by non-digital
                  evidence specialists},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S75--S85},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.010},
  doi          = {10.1016/J.DIIN.2016.01.010},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HitchcockLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman16,
  author       = {Graeme Horsman},
  title        = {Unmanned aerial vehicles: {A} preliminary analysis of forensic challenges},
  journal      = {Digit. Investig.},
  volume       = {16},
  pages        = {1--11},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2015.11.002},
  doi          = {10.1016/J.DIIN.2015.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JamesG16,
  author       = {Joshua I. James and
                  Pavel Gladyshev},
  title        = {A survey of mutual legal assistance involving digital evidence},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {23--32},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.06.004},
  doi          = {10.1016/J.DIIN.2016.06.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JamesG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarbabDM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Djedjiga Mouheb},
  title        = {Fingerprinting Android packaging: Generating DNAs for malware detection},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S33--S45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.013},
  doi          = {10.1016/J.DIIN.2016.04.013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarbabDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimPL16,
  author       = {Jeonghyeon Kim and
                  Aran Park and
                  Sangjin Lee},
  title        = {Recovery method of deleted records and tables from {ESE} database},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S118--S124},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.003},
  doi          = {10.1016/J.DIIN.2016.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KovenBDM16,
  author       = {Jay Koven and
                  Enrico Bertini and
                  R. Luke DuBois and
                  Nasir D. Memon},
  title        = {InVEST: Intelligent visual email search and triage},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S138--S148},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.008},
  doi          = {10.1016/J.DIIN.2016.04.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KovenBDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeHKN16,
  author       = {Kyoungho Lee and
                  Hyunuk Hwang and
                  Kibom Kim and
                  BongNam Noh},
  title        = {Robust bootstrapping memory analysis against anti-forensics},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S23--S32},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.009},
  doi          = {10.1016/J.DIIN.2016.04.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeHKN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lees16,
  author       = {Christopher Lees},
  title        = {{GVFS} metadata: Shellbags for Linux},
  journal      = {Digit. Investig.},
  volume       = {16},
  pages        = {12--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2015.11.001},
  doi          = {10.1016/J.DIIN.2015.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Lees16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeimichHB16,
  author       = {Petra Leimich and
                  Josh Harrison and
                  William J. Buchanan},
  title        = {A {RAM} triage methodology for Hadoop {HDFS} forensics},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {96--109},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.07.003},
  doi          = {10.1016/J.DIIN.2016.07.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LeimichHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MabeyD0A16,
  author       = {Mike Mabey and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {dbling: Identifying extensions installed on encrypted web thin clients},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S55--S65},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.007},
  doi          = {10.1016/J.DIIN.2016.04.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MabeyD0A16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McGrath16,
  author       = {Niall McGrath},
  title        = {Forensically extracting file encrypted contents on {OS} {X} using
                  {HFS+} journal file},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S157},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.014},
  doi          = {10.1016/J.DIIN.2016.04.014},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/McGrath16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MeffertBB16,
  author       = {Christopher Meffert and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Deleting collected digital evidence by exploiting a widely adopted
                  hardware write blocker},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S87--S96},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.004},
  doi          = {10.1016/J.DIIN.2016.04.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MeffertBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MutawaBFM16,
  author       = {Noora Al Mutawa and
                  Joanne Bryce and
                  Virginia N. L. Franqueira and
                  Andrew Marrington},
  title        = {Forensic investigation of cyberstalking cases using Behavioural Evidence
                  Analysis},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S96--S103},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.012},
  doi          = {10.1016/J.DIIN.2016.01.012},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MutawaBFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NeunerSW16,
  author       = {Sebastian Neuner and
                  Martin Schmiedecker and
                  Edgar R. Weippl},
  title        = {\emph{PeekaTorrent}: Leveraging {P2P} hash values for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S149--S156},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.011},
  doi          = {10.1016/J.DIIN.2016.04.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NeunerSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NeunerVSB0W16,
  author       = {Sebastian Neuner and
                  Artemios G. Voyiatzis and
                  Martin Schmiedecker and
                  Stefan Brunthaler and
                  Stefan Katzenbeisser and
                  Edgar R. Weippl},
  title        = {Time is on my side: Steganography in filesystem metadata},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S76--S86},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.010},
  doi          = {10.1016/J.DIIN.2016.04.010},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NeunerVSB0W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel16,
  author       = {Bruce J. Nikkel},
  title        = {{NVM} express drives and digital forensics},
  journal      = {Digit. Investig.},
  volume       = {16},
  pages        = {38--45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.001},
  doi          = {10.1016/J.DIIN.2016.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OvensM16,
  author       = {Kenneth M. Ovens and
                  Gordon Morison},
  title        = {Forensic analysis of Kik messenger on iOS devices},
  journal      = {Digit. Investig.},
  volume       = {17},
  pages        = {40--52},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.001},
  doi          = {10.1016/J.DIIN.2016.04.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OvensM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PandeySS16,
  author       = {Ramesh Chand Pandey and
                  Sanjay Kumar Singh and
                  Kaushal K. Shukla},
  title        = {Passive forensics in image and video using noise features: {A} review},
  journal      = {Digit. Investig.},
  volume       = {19},
  pages        = {1--28},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.08.002},
  doi          = {10.1016/J.DIIN.2016.08.002},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PandeySS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PeersmanSRBF16,
  author       = {Claudia Peersman and
                  Christian Schulze and
                  Awais Rashid and
                  Margaret Brennan and
                  Carl Fischer},
  title        = {iCOP: Live forensics to reveal previously unknown criminal media on
                  {P2P} networks},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {50--64},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.07.002},
  doi          = {10.1016/J.DIIN.2016.07.002},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PeersmanSRBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevABMS16,
  author       = {Vassil Roussev and
                  Irfan Ahmed and
                  Andres Barreto and
                  Shane McCulley and
                  Vivek Shanmughan},
  title        = {Cloud forensics-Tool development studies {\&} future outlook},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {79--95},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.05.001},
  doi          = {10.1016/J.DIIN.2016.05.001},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevABMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevM16,
  author       = {Vassil Roussev and
                  Shane McCulley},
  title        = {Forensic analysis of cloud-native artifacts},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S104--S113},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.013},
  doi          = {10.1016/J.DIIN.2016.01.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SaleemPB16,
  author       = {Shahzad Saleem and
                  Oliver Popov and
                  Ibrahim M. Baggili},
  title        = {A method and a case study for the selection of the best available
                  tool for mobile device forensics using decision analysis},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S55--S64},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.008},
  doi          = {10.1016/J.DIIN.2016.01.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SaleemPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SinghS16,
  author       = {Bhupendra Singh and
                  Upasna Singh},
  title        = {A forensic insight into Windows 10 Jump Lists},
  journal      = {Digit. Investig.},
  volume       = {17},
  pages        = {1--13},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.02.001},
  doi          = {10.1016/J.DIIN.2016.02.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SinghS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SitaraM16,
  author       = {K. Sitara and
                  Babu M. Mehtre},
  title        = {Digital video tampering detection: An overview of passive techniques},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {8--22},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.06.003},
  doi          = {10.1016/J.DIIN.2016.06.003},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SitaraM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SocalaC16,
  author       = {Arkadiusz Socala and
                  Michael Cohen},
  title        = {Automatic profile generation for live Linux Memory analysis},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S11--S24},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.004},
  doi          = {10.1016/J.DIIN.2016.01.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SocalaC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SongLLL16,
  author       = {Ji Eun Song and
                  Kiryong Lee and
                  Wan Yeon Lee and
                  Heejo Lee},
  title        = {Integrity verification of the ordered data structures in manipulated
                  video content},
  journal      = {Digit. Investig.},
  volume       = {18},
  pages        = {1--7},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.06.001},
  doi          = {10.1016/J.DIIN.2016.06.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SongLLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SylveMR16,
  author       = {Joe Sylve and
                  Lodovico Marziale and
                  Golden G. Richard III},
  title        = {Pool tag quick scanning for windows memory analysis},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S25--S32},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.005},
  doi          = {10.1016/J.DIIN.2016.01.005},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SylveMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TangFCYXFL016,
  author       = {Yanbin Tang and
                  Junbin Fang and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Jun Xu and
                  Bo Feng and
                  Qiong Li and
                  Qi Han},
  title        = {Recovery of heavily fragmented {JPEG} files},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S108--S117},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.016},
  doi          = {10.1016/J.DIIN.2016.04.016},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TangFCYXFL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TaubmannFDR16,
  author       = {Benjamin Taubmann and
                  Christoph Fr{\"{a}}drich and
                  Dominik Dusold and
                  Hans P. Reiser},
  title        = {TLSkex: Harnessing virtual machine introspection for decrypting {TLS}
                  communication},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S114--S123},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.014},
  doi          = {10.1016/J.DIIN.2016.01.014},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TaubmannFDR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRG16,
  author       = {James Wagner and
                  Alexander Rasin and
                  Jonathan Grier},
  title        = {Database image content explorer: Carving data that does not officially
                  exist},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S97--S107},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.015},
  doi          = {10.1016/J.DIIN.2016.04.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YoonJKL16,
  author       = {Jongseong Yoon and
                  Doowon Jeong and
                  Chulhoon Kang and
                  Sangjin Lee},
  title        = {Forensic investigation framework for the document store NoSQL {DBMS:}
                  MongoDB as a case study},
  journal      = {Digit. Investig.},
  volume       = {17},
  pages        = {53--65},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.03.003},
  doi          = {10.1016/J.DIIN.2016.03.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/YoonJKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhangBB16,
  author       = {Xiaolu Zhang and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Rapid Android Parser for Investigating {DEX} files {(RAPID)}},
  journal      = {Digit. Investig.},
  volume       = {17},
  pages        = {28--39},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.03.002},
  doi          = {10.1016/J.DIIN.2016.03.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZhangBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhuTZLZ16,
  author       = {Ruijin Zhu and
                  Yu{-}an Tan and
                  Quan{-}Xin Zhang and
                  Yuanzhang Li and
                  Jun Zheng},
  title        = {Determining image base of firmware for {ARM} devices by matching literal
                  pools},
  journal      = {Digit. Investig.},
  volume       = {16},
  pages        = {19--28},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.002},
  doi          = {10.1016/J.DIIN.2016.01.002},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZhuTZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZoubekSD16,
  author       = {Christian Zoubek and
                  Sabine Seufert and
                  Andreas Dewald},
  title        = {Generic {RAID} reassembly using block-level entropy},
  journal      = {Digit. Investig.},
  volume       = {16 Supplement},
  pages        = {S44--S54},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.01.007},
  doi          = {10.1016/J.DIIN.2016.01.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZoubekSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AdedayoO15,
  author       = {Oluwasola Mary Adedayo and
                  Martin S. Olivier},
  title        = {Ideal log setting for database forensics reconstruction},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {27--40},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2014.12.002},
  doi          = {10.1016/J.DIIN.2014.12.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AdedayoO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-RowailyAHA15,
  author       = {Khalid Al{-}Rowaily and
                  Muhammad Abulaish and
                  Nur Al Hasan Haldar and
                  Majed A. AlRubaian},
  title        = {BiSAL - {A} bilingual sentiment analysis lexicon to analyze Dark Web
                  forums for cyber security},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {53--62},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.006},
  doi          = {10.1016/J.DIIN.2015.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Al-RowailyAHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSWD15,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{SIGMA:} {A} Semantic Integrated Graph Matching Approach for identifying
                  reused functions in binary code},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S61--S71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.011},
  doi          = {10.1016/J.DIIN.2015.01.011},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AmannJ15,
  author       = {Philipp Amann and
                  Joshua I. James},
  title        = {Designing robustness and resilience in digital investigation laboratories},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S111--S120},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.015},
  doi          = {10.1016/J.DIIN.2015.01.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AmannJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArmknechtD15,
  author       = {Frederik Armknecht and
                  Andreas Dewald},
  title        = {Privacy-preserving email forensics},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S127--S136},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.003},
  doi          = {10.1016/J.DIIN.2015.05.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ArmknechtD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BalzarottiPV15,
  author       = {Davide Balzarotti and
                  Roberto Di Pietro and
                  Antonio Villani},
  title        = {The impact of GPU-assisted malware on memory forensics: {A} case study},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S16--S24},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.010},
  doi          = {10.1016/J.DIIN.2015.05.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeekEBUBS15,
  author       = {Harm M. A. van Beek and
                  E. J. van Eijk and
                  Ruud B. van Baar and
                  M. Ugen and
                  J. N. C. Bodde and
                  A. J. Siemelink},
  title        = {Digital forensics as a service: Game on},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {20--38},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.004},
  doi          = {10.1016/J.DIIN.2015.07.004},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeekEBUBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BoukhtoutaMDAIB15,
  author       = {Amine Boukhtouta and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Omar Alfandi and
                  Farkhund Iqbal and
                  May El Barachi},
  title        = {Graph-theoretic characterization of cyber-threat infrastructures},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S3--S15},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.002},
  doi          = {10.1016/J.DIIN.2015.05.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BoztasRR15,
  author       = {Abdul Boztas and
                  A. R. J. Riethoven and
                  Mark Roeloffs},
  title        = {Smart {TV} forensics: Digital traces on televisions},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S72--S80},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.012},
  doi          = {10.1016/J.DIIN.2015.01.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BoztasRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BradyOK15,
  author       = {Owen Brady and
                  Richard E. Overill and
                  Jeroen Keppens},
  title        = {{DESO:} Addressing volume and variety in large-scale criminal cases},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {72--82},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.10.002},
  doi          = {10.1016/J.DIIN.2015.10.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BradyOK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseR15,
  author       = {Andrew Case and
                  Golden G. Richard III},
  title        = {Advancing Mac {OS} {X} rootkit detection},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S25--S33},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.005},
  doi          = {10.1016/J.DIIN.2015.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey15,
  author       = {Eoghan Casey},
  title        = {Smart home forensics},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {A1--A2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.017},
  doi          = {10.1016/J.DIIN.2015.05.017},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey15a,
  author       = {Eoghan Casey},
  title        = {Strengthening forensic science},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {A1--A2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.03.001},
  doi          = {10.1016/J.DIIN.2015.03.001},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey15b,
  author       = {Eoghan Casey},
  title        = {The growing importance of data science in digital investigations},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {1},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.09.004},
  doi          = {10.1016/J.DIIN.2015.09.004},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Casey15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyBB15,
  author       = {Eoghan Casey and
                  Greg Back and
                  Sean Barnum},
  title        = {Leveraging CybOX{\texttrademark} to standardize representation and
                  exchange of digital forensic information},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S102--S110},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.014},
  doi          = {10.1016/J.DIIN.2015.01.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CaseyBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChabotBNK15,
  author       = {Yoan Chabot and
                  Aur{\'{e}}lie Bertaux and
                  Christophe Nicolle and
                  M. Tahar Kechadi},
  title        = {An ontology-based approach for the reconstruction and analysis of
                  digital incidents timelines},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {83--100},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.005},
  doi          = {10.1016/J.DIIN.2015.07.005},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChabotBNK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Clemens15,
  author       = {John Clemens},
  title        = {Automatic classification of object code using machine learning},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S156--S162},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.007},
  doi          = {10.1016/J.DIIN.2015.05.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Clemens15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Cohen15,
  author       = {Michael I. Cohen},
  title        = {Characterization of the windows kernel version variability for accurate
                  memory analysis},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S38--S49},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.009},
  doi          = {10.1016/J.DIIN.2015.01.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Cohen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CruzMC15,
  author       = {Fl{\'{a}}vio Cruz and
                  Andreas Moser and
                  Michael I. Cohen},
  title        = {A scalable file based data store for forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S90--S101},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.016},
  doi          = {10.1016/J.DIIN.2015.01.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CruzMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DalinsWC15,
  author       = {Janis Dalins and
                  Campbell Wilson and
                  Mark James Carman},
  title        = {Monte-Carlo Filesystem Search - {A} crawl strategy for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {58--71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.04.002},
  doi          = {10.1016/J.DIIN.2015.04.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DalinsWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DaviesRXS15,
  author       = {Matthew Davies and
                  Huw Read and
                  Konstantinos Xynos and
                  Iain Sutherland},
  title        = {Forensic analysis of a Sony PlayStation 4: {A} first look},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S81--S89},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.013},
  doi          = {10.1016/J.DIIN.2015.01.013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DaviesRXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DietrichA15,
  author       = {Dianne Dietrich and
                  Frank Adelstein},
  title        = {Archival science, digital forensics, and new media art},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S137--S145},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.004},
  doi          = {10.1016/J.DIIN.2015.05.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DietrichA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DinhAFMD15,
  author       = {Son Dinh and
                  Taher Azeb and
                  Francis Fortin and
                  Djedjiga Mouheb and
                  Mourad Debbabi},
  title        = {Spam campaign detection, analysis, and investigation},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S12--S21},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.006},
  doi          = {10.1016/J.DIIN.2015.01.006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DinhAFMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DuijnS15,
  author       = {P. A. C. Duijn and
                  Peter M. A. Sloot},
  title        = {From data to disruption},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {39--45},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.09.005},
  doi          = {10.1016/J.DIIN.2015.09.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DuijnS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FarhadiFFCPD15,
  author       = {Mohammad Reza Farhadi and
                  Benjamin C. M. Fung and
                  Yin Bun Fung and
                  Philippe Charland and
                  Stere Preda and
                  Mourad Debbabi},
  title        = {Scalable code clone search for malware analysis},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {46--60},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.06.001},
  doi          = {10.1016/J.DIIN.2015.06.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FarhadiFFCPD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FeizollahASW15,
  author       = {Ali Feizollah and
                  Nor Badrul Anuar and
                  Rosli Salleh and
                  Ainuddin Wahid Abdul Wahab},
  title        = {A review on feature selection in mobile malware detection},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {22--37},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.02.001},
  doi          = {10.1016/J.DIIN.2015.02.001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FeizollahASW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelM15,
  author       = {Simson L. Garfinkel and
                  Michael McCarrin},
  title        = {Hash-based carving: Searching media for complete files and file fragments
                  with sector hashing and hashdb},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S95--S105},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.001},
  doi          = {10.1016/J.DIIN.2015.05.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GeradtsF15,
  author       = {Zeno J. M. H. Geradts and
                  Katrin Franke},
  title        = {Editorial for big data issue},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {18--19},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.10.003},
  doi          = {10.1016/J.DIIN.2015.10.003},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GeradtsF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrierR15,
  author       = {Jonathan Grier and
                  Golden G. Richard III},
  title        = {Rapid forensic imaging of large disks with sifting collectors},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S34--S44},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.006},
  doi          = {10.1016/J.DIIN.2015.05.006},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrierR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GugelmannGAL15,
  author       = {David Gugelmann and
                  Fabian Gasser and
                  Bernhard Ager and
                  Vincent Lenders},
  title        = {Hviz: {HTTP(S)} traffic aggregation and visualization for network
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S1--S11},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.005},
  doi          = {10.1016/J.DIIN.2015.01.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GugelmannGAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HorsmanC15,
  author       = {Graeme Horsman and
                  Lynne R. Conniss},
  title        = {Investigating evidence of mobile phone usage by drivers in road traffic
                  accidents},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S30--S37},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.008},
  doi          = {10.1016/J.DIIN.2015.01.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HorsmanC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HorsmanC15a,
  author       = {Graeme Horsman and
                  Lynne R. Conniss},
  title        = {An investigation of anonymous and spoof {SMS} resources used for the
                  purposes of cyberstalking},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {80--93},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.04.001},
  doi          = {10.1016/J.DIIN.2015.04.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HorsmanC15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JangKWMK15,
  author       = {Jae{-}wook Jang and
                  Hyunjae Kang and
                  Jiyoung Woo and
                  Aziz Mohaisen and
                  Huy Kang Kim},
  title        = {Andro-AutoPsy: Anti-malware system based on similarity matching of
                  malware and malware creator-centric information},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {17--35},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.06.002},
  doi          = {10.1016/J.DIIN.2015.06.002},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JangKWMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KabakusDC15,
  author       = {Abdullah Talha Kabakus and
                  Ibrahim Alper Dogru and
                  Aydin {\c{C}}etin},
  title        = {{APK} Auditor: Permission-based Android malware detection system},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.001},
  doi          = {10.1016/J.DIIN.2015.01.001},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KabakusDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarakucukD15,
  author       = {Ahmet Karak{\"{u}}{\c{c}}{\"{u}}k and
                  Ahmet Emir Dirik},
  title        = {Adaptive photo-response non-uniformity noise removal against image
                  source attribution},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {66--76},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.017},
  doi          = {10.1016/J.DIIN.2015.01.017},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KarakucukD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarpisekBB15,
  author       = {Filip Karp{\'{\i}}sek and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {WhatsApp network forensics: Decrypting and understanding the WhatsApp
                  call signaling messages},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {110--118},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.09.002},
  doi          = {10.1016/J.DIIN.2015.09.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarpisekBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Khatri15,
  author       = {Yogesh Khatri},
  title        = {Forensic implications of System Resource Usage Monitor {(SRUM)} data
                  in Windows 8},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {53--65},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.002},
  doi          = {10.1016/J.DIIN.2015.01.002},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Khatri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LarbanetLD15,
  author       = {Adrien Larbanet and
                  Jonas Lerebours and
                  J. P. David},
  title        = {Detecting very large sets of referenced files at 40/100 GbE, especially
                  {MP4} files},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S85--S94},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.011},
  doi          = {10.1016/J.DIIN.2015.05.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LarbanetLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeKL15,
  author       = {Wan Yeon Lee and
                  Hyuckmin Kwon and
                  Heejo Lee},
  title        = {Comments on the Linux {FAT32} allocator and file creation order reconstruction
                  [Digit Investig 11(4), 224-233]},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {119--123},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.09.003},
  doi          = {10.1016/J.DIIN.2015.09.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LeeKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lim15,
  author       = {Sung Ryel Lim},
  title        = {Identifying management factors for digital incident responses on Machine-to-Machine
                  services},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {46--52},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.003},
  doi          = {10.1016/J.DIIN.2015.07.003},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Lim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LuLL15,
  author       = {Jicang Lu and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {A study on {JPEG} steganalytic features: Co-occurrence matrix vs.
                  Markov transition probability matrix},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2014.12.001},
  doi          = {10.1016/J.DIIN.2014.12.001},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LuLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MagalingamDR15,
  author       = {Pritheega Magalingam and
                  Stephen Davis and
                  Asha Rao},
  title        = {Using shortest path to discover criminal community},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {1--17},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.08.002},
  doi          = {10.1016/J.DIIN.2015.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MagalingamDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ManteleroV15,
  author       = {Alessandro Mantelero and
                  Giuseppe Vaciago},
  title        = {Data protection in a big data society. Ideas for a future regulation},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {104--109},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.09.006},
  doi          = {10.1016/J.DIIN.2015.09.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ManteleroV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MendozaKMCV15,
  author       = {Abner Mendoza and
                  Avinash Kumar and
                  David Midcap and
                  Hyuk Cho and
                  Cihan Varol},
  title        = {BrowStEx: {A} tool to aggregate browser storage artifacts for forensic
                  analysis},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {63--75},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.08.001},
  doi          = {10.1016/J.DIIN.2015.08.001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MendozaKMCV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MunozUAS15,
  author       = {Alfonso Mu{\~{n}}oz and
                  Manuel Urue{\~{n}}a and
                  Raquel Aparicio and
                  Gerson Rodr{\'{\i}}guez de los Santos},
  title        = {Digital Wiretap Warrant: Improving the security of {ETSI} Lawful Interception},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {1--16},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.04.005},
  doi          = {10.1016/J.DIIN.2015.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MunozUAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PenroseBM15,
  author       = {Philip Penrose and
                  William J. Buchanan and
                  Richard Macfarlane},
  title        = {Fast contraband detection in large capacity disk drives},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S22--S29},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.007},
  doi          = {10.1016/J.DIIN.2015.01.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PenroseBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PichanLS15,
  author       = {Ameer Pichan and
                  Mihai M. Lazarescu and
                  Sieteng Soh},
  title        = {Cloud forensics: Technical challenges, solutions and comparative analysis},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {38--57},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.03.002},
  doi          = {10.1016/J.DIIN.2015.03.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PichanLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RahimianSAWD15,
  author       = {Ashkan Rahimian and
                  Paria Shirani and
                  Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {BinComp: {A} stratified approach to compiler provenance Attribution},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S146--S155},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.015},
  doi          = {10.1016/J.DIIN.2015.05.015},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schatz15,
  author       = {Bradley L. Schatz},
  title        = {Wirespeed: Extending the {AFF4} forensic container format for scalable
                  acquisition and live analysis},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S45--S54},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.016},
  doi          = {10.1016/J.DIIN.2015.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schatz15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchmidIF15,
  author       = {Michael R. Schmid and
                  Farkhund Iqbal and
                  Benjamin C. M. Fung},
  title        = {E-mail authorship attribution using customized associative classification},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S116--S126},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.012},
  doi          = {10.1016/J.DIIN.2015.05.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SchmidIF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schweinsberg15,
  author       = {Elizabeth Schweinsberg},
  title        = {Fifteenth Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S1--S2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.001},
  doi          = {10.1016/J.DIIN.2015.07.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schweinsberg15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Seebruck15,
  author       = {Ryan Seebruck},
  title        = {A typology of hackers: Classifying cyber malfeasance using a weighted
                  arc circumplex model},
  journal      = {Digit. Investig.},
  volume       = {14},
  pages        = {36--45},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.002},
  doi          = {10.1016/J.DIIN.2015.07.002},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Seebruck15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Seigfried-Spellar15,
  author       = {Kathryn C. Seigfried{-}Spellar},
  title        = {Erratum to "Distinguishing the viewers, downloaders, and exchangers
                  of internet child pornography by individual differences: Preliminary
                  findings" [Digit. Invest 11 (4), 252-260]},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {88},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.004},
  doi          = {10.1016/J.DIIN.2015.01.004},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Seigfried-Spellar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SharifnyaA15,
  author       = {Reza Sharifnya and
                  Mahdi Abadi},
  title        = {DFBotKiller: Domain-flux botnet detection based on the history of
                  group activities and failures in {DNS} traffic},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {15--26},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2014.11.001},
  doi          = {10.1016/J.DIIN.2014.11.001},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SharifnyaA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SloanH15,
  author       = {Thomas Sloan and
                  Julio C. Hernandez{-}Castro},
  title        = {Steganalysis of OpenPuff through atomic concatenation of {MP4} flags},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {15--21},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.02.002},
  doi          = {10.1016/J.DIIN.2015.02.002},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SloanH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sommer15,
  author       = {Peter Sommer},
  title        = {{DI} commentary: Big Data and privacy},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {101--103},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.10.001},
  doi          = {10.1016/J.DIIN.2015.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sommer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StuttgenVD15,
  author       = {Johannes St{\"{u}}ttgen and
                  Stefan V{\"{o}}mel and
                  Michael Denzel},
  title        = {Acquisition and analysis of compromised firmware using memory forensics},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S50--S60},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.010},
  doi          = {10.1016/J.DIIN.2015.01.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StuttgenVD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TurnbullR15,
  author       = {Benjamin P. Turnbull and
                  Suneel Randhawa},
  title        = {Automated event and social network extraction from digital evidence
                  sources with ontological mapping},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {94--106},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.04.004},
  doi          = {10.1016/J.DIIN.2015.04.004},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TurnbullR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRG15,
  author       = {James Wagner and
                  Alexander Rasin and
                  Jonathan Grier},
  title        = {Database forensic analysis through internal structure carving},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S106--S115},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.013},
  doi          = {10.1016/J.DIIN.2015.05.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WalnyckyBMMB15,
  author       = {Daniel Walnycky and
                  Ibrahim M. Baggili and
                  Andrew Marrington and
                  Jason Moore and
                  Frank Breitinger},
  title        = {Network and device forensic analysis of Android social-messaging applications},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S77--S84},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.009},
  doi          = {10.1016/J.DIIN.2015.05.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WalnyckyBMMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WisseV15,
  author       = {Wilco Wisse and
                  Cor J. Veenman},
  title        = {Scripting {DNA:} Identifying the JavaScript programmer},
  journal      = {Digit. Investig.},
  volume       = {15},
  pages        = {61--71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.09.001},
  doi          = {10.1016/J.DIIN.2015.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WisseV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YangCKC15,
  author       = {Seung Jei Yang and
                  Jung Ho Choi and
                  Ki Bom Kim and
                  Taejoo Chang},
  title        = {New acquisition method based on firmware update protocols for Android
                  smartphones},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S68--S76},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.008},
  doi          = {10.1016/J.DIIN.2015.05.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YangCKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Yu15,
  author       = {Szde Yu},
  title        = {Covert communication by means of email spam: {A} challenge for digital
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {13},
  pages        = {72--79},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.04.003},
  doi          = {10.1016/J.DIIN.2015.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Yu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Zandwijk15,
  author       = {Jan Peter van Zandwijk},
  title        = {A mathematical approach to {NAND} flash-memory descrambling and decoding},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {41--52},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.003},
  doi          = {10.1016/J.DIIN.2015.01.003},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Zandwijk15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZawoadHG15,
  author       = {Shams Zawoad and
                  Ragib Hasan and
                  John Grimes},
  title        = {{LINCS:} Towards building a trustworthy litigation hold enabled cloud
                  storage system},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S55--S67},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.014},
  doi          = {10.1016/J.DIIN.2015.05.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZawoadHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhangHZTZL15,
  author       = {Li Zhang and
                  Shen{-}Gang Hao and
                  Jun Zheng and
                  Yu{-}an Tan and
                  Quan{-}xin Zhang and
                  Yuan{-}zhang Li},
  title        = {Descrambling data on solid-state disks by reverse-engineering the
                  firmware},
  journal      = {Digit. Investig.},
  volume       = {12},
  pages        = {77--87},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2014.12.003},
  doi          = {10.1016/J.DIIN.2014.12.003},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZhangHZTZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSPWD14,
  author       = {Saed Alrabaee and
                  Noman Saleem and
                  Stere Preda and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{OBA2:} An Onion approach to Binary code Authorship Attribution},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S94--S103},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.012},
  doi          = {10.1016/J.DIIN.2014.03.012},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSPWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Anglano14,
  author       = {Cosimo Anglano},
  title        = {Forensic analysis of WhatsApp Messenger on Android smartphones},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {201--213},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.04.003},
  doi          = {10.1016/J.DIIN.2014.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Anglano14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AnwarA14,
  author       = {Tarique Anwar and
                  Muhammad Abulaish},
  title        = {A social graph based text mining framework for chat log investigation},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {349--362},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.10.001},
  doi          = {10.1016/J.DIIN.2014.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AnwarA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Aziz14,
  author       = {Benjamin Aziz},
  title        = {Modelling and refinement of forensic data acquisition specifications},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {2},
  pages        = {90--101},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.04.001},
  doi          = {10.1016/J.DIIN.2014.04.001},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Aziz14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaarBE14,
  author       = {Ruud B. van Baar and
                  Harm M. A. van Beek and
                  E. J. van Eijk},
  title        = {Digital Forensics as a Service: {A} game changer},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S54--S62},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.007},
  doi          = {10.1016/J.DIIN.2014.03.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaarBE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeebeL14,
  author       = {Nicole Lang Beebe and
                  Lishu Liu},
  title        = {Clustering digital forensic string search output},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {314--322},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.10.002},
  doi          = {10.1016/J.DIIN.2014.10.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BeebeL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeebeL14a,
  author       = {Nicole Lang Beebe and
                  Lishu Liu},
  title        = {Ranking algorithms for digital forensic string search hits},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S124--S132},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.007},
  doi          = {10.1016/J.DIIN.2014.05.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeebeL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BjellandFA14,
  author       = {Petter Christian Bjelland and
                  Katrin Franke and
                  Andr{\'{e}} {\AA}rnes},
  title        = {Practical use of Approximate Hash Based Matching in digital investigations},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S18--S26},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.003},
  doi          = {10.1016/J.DIIN.2014.03.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BjellandFA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bou-HarbLBD14,
  author       = {Elias Bou{-}Harb and
                  Nour{-}Eddine Lakhdari and
                  Hamad Binsalleeh and
                  Mourad Debbabi},
  title        = {Multidimensional investigation of source port 0 probing},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S114--S123},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.012},
  doi          = {10.1016/J.DIIN.2014.05.012},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BreitingerBW14,
  author       = {Frank Breitinger and
                  Harald Baier and
                  Douglas White},
  title        = {On the database lookup problem of approximate matching},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S1--S9},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.001},
  doi          = {10.1016/J.DIIN.2014.03.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BreitingerBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BreitingerR14,
  author       = {Frank Breitinger and
                  Vassil Roussev},
  title        = {Automated evaluation of approximate matching algorithms on real data},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S10--S17},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.002},
  doi          = {10.1016/J.DIIN.2014.03.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BreitingerR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BreitingerSR14,
  author       = {Frank Breitinger and
                  Georgios Stivaktakis and
                  Vassil Roussev},
  title        = {Evaluating detection error trade-offs for bytewise approximate matching
                  algorithms},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {2},
  pages        = {81--89},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.002},
  doi          = {10.1016/J.DIIN.2014.05.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BreitingerSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BreitingerSR14a,
  author       = {Frank Breitinger and
                  Georgios Stivaktakis and
                  Vassil Roussev},
  title        = {Erratum to "Evaluating detection error trade-offs for bytewise approximate
                  matching algorithms" [Digit Invest 11 {(2)} 81-89]},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {363},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.07.001},
  doi          = {10.1016/J.DIIN.2014.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BreitingerSR14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey14,
  author       = {Eoghan Casey},
  title        = {Growing societal impact of digital forensics and incident response},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.015},
  doi          = {10.1016/J.DIIN.2014.03.015},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey14a,
  author       = {Eoghan Casey},
  title        = {What constitutes a proper education?},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {2},
  pages        = {79--80},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.002},
  doi          = {10.1016/J.DIIN.2014.06.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyZ14,
  author       = {Eoghan Casey and
                  Rikkert Zoun},
  title        = {Design tradeoffs for developing fragmented video carving tools},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S30--S39},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.010},
  doi          = {10.1016/J.DIIN.2014.05.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CaseyZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChabotBNK14,
  author       = {Yoan Chabot and
                  Aur{\'{e}}lie Bertaux and
                  Christophe Nicolle and
                  M. Tahar Kechadi},
  title        = {A complete formalized knowledge representation model for advanced
                  digital forensics timeline analysis},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S95--S105},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.009},
  doi          = {10.1016/J.DIIN.2014.05.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChabotBNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Chivers14,
  author       = {Howard Chivers},
  title        = {Private browsing: {A} window of forensic opportunity},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {20--29},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2013.11.002},
  doi          = {10.1016/J.DIIN.2013.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Chivers14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FarinaSK14,
  author       = {Jason Farina and
                  Mark Scanlon and
                  M. Tahar Kechadi},
  title        = {BitTorrent Sync: First Impressions and Digital Forensic Implications},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S77--S86},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.010},
  doi          = {10.1016/J.DIIN.2014.03.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FarinaSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Federici14,
  author       = {Corrado Federici},
  title        = {Cloud Data Imager: {A} unified answer to remote acquisition of cloud
                  storage areas},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {30--42},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.02.002},
  doi          = {10.1016/J.DIIN.2014.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Federici14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FruhwirtKKW14,
  author       = {Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Katharina Krombholz and
                  Edgar R. Weippl},
  title        = {Towards a forensic-aware database solution: Using a secured database
                  replication protocol and transaction management for digital investigations},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {336--348},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.09.003},
  doi          = {10.1016/J.DIIN.2014.09.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FruhwirtKKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GloeFK14,
  author       = {Thomas Gloe and
                  Andr{\'{e}} Fischer and
                  Matthias Kirchner},
  title        = {Forensic analysis of video file formats},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S68--S76},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.009},
  doi          = {10.1016/J.DIIN.2014.03.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GloeFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalOMJ14,
  author       = {Asif Iqbal and
                  Hanan Al Obaidli and
                  Andrew Marrington and
                  Andy Jones},
  title        = {Windows Surface {RT} tablet forensics},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S87--S93},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.011},
  doi          = {10.1016/J.DIIN.2014.03.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/IqbalOMJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KaartL14,
  author       = {Marnix Kaart and
                  Susan Laraghy},
  title        = {Android forensics: Interpretation of timestamps},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {234--248},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.001},
  doi          = {10.1016/J.DIIN.2014.05.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KaartL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KangHKI14,
  author       = {Boojoong Kang and
                  Kyoung{-}Soo Han and
                  Byeongho Kang and
                  Eul Gyu Im},
  title        = {Malware categorization using dynamic mnemonic frequency analysis with
                  redundancy filtering},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {323--335},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.003},
  doi          = {10.1016/J.DIIN.2014.06.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KangHKI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Knijff14,
  author       = {Ronald M. van der Knijff},
  title        = {Control systems/SCADA forensics, what's the difference?},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {160--174},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.007},
  doi          = {10.1016/J.DIIN.2014.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Knijff14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KumarOTPP14,
  author       = {Vijay Kumar and
                  George C. Oikonomou and
                  Theo Tryfonas and
                  Dan Page and
                  Iain W. Phillips},
  title        = {Digital investigations for IPv6-based Wireless Sensor Networks},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S66--S75},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.005},
  doi          = {10.1016/J.DIIN.2014.05.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KumarOTPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LangBCD14,
  author       = {Anthony Lang and
                  Masooda N. Bashir and
                  Roy H. Campbell and
                  Lizanne DeStefano},
  title        = {Developing a new digital forensics curriculum},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S76--S84},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.008},
  doi          = {10.1016/J.DIIN.2014.05.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LangBCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeL14,
  author       = {Chan{-}Youn Lee and
                  Sangjin Lee},
  title        = {Structure and application of IconCache.db files for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {2},
  pages        = {102--110},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.017},
  doi          = {10.1016/J.DIIN.2014.05.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LeeL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LinT14,
  author       = {Cheng{-}Shian Lin and
                  Jyh{-}Jong Tsay},
  title        = {A passive approach for effective detection and localization of region-level
                  video forgery with spatio-temporal coherence analysis},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {2},
  pages        = {120--140},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.016},
  doi          = {10.1016/J.DIIN.2014.03.016},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LinT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LuLL14,
  author       = {Jicang Lu and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Selection of image features for steganalysis based on the Fisher criterion},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {57--66},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2013.12.001},
  doi          = {10.1016/J.DIIN.2013.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LuLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MartiniC14,
  author       = {Ben Martini and
                  Kim{-}Kwang Raymond Choo},
  title        = {Distributed filesystem forensics: XtreemFS as a case study},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {295--313},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.08.002},
  doi          = {10.1016/J.DIIN.2014.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MartiniC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Minnaard14,
  author       = {Wicher Minnaard},
  title        = {Out of sight, but not out of mind: Traces of nearby devices' wireless
                  transmissions in volatile memory},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S104--S111},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.013},
  doi          = {10.1016/J.DIIN.2014.03.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Minnaard14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Minnaard14a,
  author       = {Wicher Minnaard},
  title        = {The Linux {FAT32} allocator and file creation order reconstruction},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {224--233},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.008},
  doi          = {10.1016/J.DIIN.2014.06.008},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Minnaard14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MohamedMIB14,
  author       = {Ahmed Fathy Abdul Latif Mohamed and
                  Andrew Marrington and
                  Farkhund Iqbal and
                  Ibrahim M. Baggili},
  title        = {Testing the forensic soundness of forensic examination environments
                  on bootable media},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S22--S29},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.015},
  doi          = {10.1016/J.DIIN.2014.05.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MohamedMIB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MooreBMR14,
  author       = {Jason Moore and
                  Ibrahim M. Baggili and
                  Andrew Marrington and
                  Armindo Rodrigues},
  title        = {Preliminary forensic analysis of the Xbox One},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S57--S65},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.014},
  doi          = {10.1016/J.DIIN.2014.05.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MooreBMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NelsonSL14,
  author       = {Alex J. Nelson and
                  Erik Q. Steggall and
                  Darrell D. E. Long},
  title        = {Cooperative mode: Comparative storage metadata verification applied
                  to the Xbox 360},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S46--S56},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.004},
  doi          = {10.1016/J.DIIN.2014.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NelsonSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel14,
  author       = {Bruce J. Nikkel},
  title        = {Fostering incident response and digital forensics research},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {249--251},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.09.004},
  doi          = {10.1016/J.DIIN.2014.09.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NilssonAA14,
  author       = {Alexander Nilsson and
                  Marcus Andersson and
                  Stefan Axelsson},
  title        = {Key-hiding on the {ARM} platform},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S63--S67},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.008},
  doi          = {10.1016/J.DIIN.2014.03.008},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NilssonAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NoelP14,
  author       = {George E. Noel and
                  Gilbert L. Peterson},
  title        = {Applicability of Latent Dirichlet Allocation to multi-disk search},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {43--56},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.02.001},
  doi          = {10.1016/J.DIIN.2014.02.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NoelP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Oestreicher14,
  author       = {Kurt Oestreicher},
  title        = {A forensically robust method for acquisition of iCloud data},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S106--S113},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.006},
  doi          = {10.1016/J.DIIN.2014.05.006},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Oestreicher14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkL14,
  author       = {Jungheum Park and
                  Sangjin Lee},
  title        = {Data fragment forensics for embedded {DVR} systems},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {187--200},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.001},
  doi          = {10.1016/J.DIIN.2014.06.001},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PathakS14,
  author       = {Pritesh Pathak and
                  S. Selvakumar},
  title        = {Blind Image Steganalysis of {JPEG} images using feature extraction
                  through the process of dilation},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {67--77},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2013.12.002},
  doi          = {10.1016/J.DIIN.2013.12.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PathakS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PengZ14,
  author       = {Fei Peng and
                  Die{-}lan Zhou},
  title        = {Discriminating natural images and computer generated graphics based
                  on the impact of {CFA} interpolation on the correlation of {PRNU}},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {2},
  pages        = {111--119},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.04.002},
  doi          = {10.1016/J.DIIN.2014.04.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PengZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PhelpsW14,
  author       = {Amy Phelps and
                  Allan Watt},
  title        = {I shop online - recreationally! Internet anonymity and Silk Road enabling
                  drug use in Australia},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {261--272},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.08.001},
  doi          = {10.1016/J.DIIN.2014.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PhelpsW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PringleB14,
  author       = {Nick Pringle and
                  Mikhaila Burgess},
  title        = {Information assurance in a distributed forensic cluster},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S36--S44},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.005},
  doi          = {10.1016/J.DIIN.2014.03.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PringleB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Quach14,
  author       = {Tu{-}Thach Quach},
  title        = {Extracting hidden messages in steganographic images},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S40--S45},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.003},
  doi          = {10.1016/J.DIIN.2014.05.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Quach14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/QuickC14,
  author       = {Darren Quick and
                  Kim{-}Kwang Raymond Choo},
  title        = {Impacts of increasing volume of digital forensic data: {A} survey
                  and future research challenges},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {273--294},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.09.002},
  doi          = {10.1016/J.DIIN.2014.09.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/QuickC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RichardC14,
  author       = {Golden G. Richard III and
                  Andrew Case},
  title        = {In lieu of swap: Analyzing compressed {RAM} in Mac {OS} {X} and Linux},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S3--S12},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.011},
  doi          = {10.1016/J.DIIN.2014.05.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RichardC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevAS14,
  author       = {Vassil Roussev and
                  Irfan Ahmed and
                  Thomas Sires},
  title        = {Image-based kernel fingerprinting},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S13--S21},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.013},
  doi          = {10.1016/J.DIIN.2014.05.013},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schatz14,
  author       = {Bradley L. Schatz},
  title        = {A visual approach to interpreting {NAND} flash memory},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {214--223},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.018},
  doi          = {10.1016/J.DIIN.2014.05.018},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Schatz14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchatzGK14,
  author       = {Bradley L. Schatz and
                  Pavel Gladyshev and
                  Ronald M. van der Knijff},
  title        = {The internet of things: Interconnected digital dust},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {141--142},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.09.001},
  doi          = {10.1016/J.DIIN.2014.09.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchatzGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Seigfried-Spellar14,
  author       = {Kathryn C. Seigfried{-}Spellar},
  title        = {Distinguishing the viewers, downloaders, and exchangers of Internet
                  child pornography by individual differences: Preliminary findings},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {4},
  pages        = {252--260},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.07.003},
  doi          = {10.1016/J.DIIN.2014.07.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Seigfried-Spellar14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SouvignetHMTLH14,
  author       = {Thomas R. Souvignet and
                  Julien Hatin and
                  Fabrice Maqua and
                  D. Tesniere and
                  Pierre L{\'{e}}ger and
                  Romain Hormi{\`{e}}re},
  title        = {Payment card forensic analysis: From concepts to desktop and mobile
                  analysis tools},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {143--153},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.006},
  doi          = {10.1016/J.DIIN.2014.06.006},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SouvignetHMTLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SouvignetPFK14,
  author       = {Thomas R. Souvignet and
                  T. Pr{\"{u}}fer and
                  J. Frinken and
                  R. Kricsanowits},
  title        = {Case study: From embedded system analysis to embedded system based
                  investigator tools},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {154--159},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.06.004},
  doi          = {10.1016/J.DIIN.2014.06.004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SouvignetPFK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StuttgenC14,
  author       = {Johannes St{\"{u}}ttgen and
                  Michael Cohen},
  title        = {Robust Linux memory acquisition with minimal target impact},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S112--S119},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.014},
  doi          = {10.1016/J.DIIN.2014.03.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StuttgenC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SutherlandRX14,
  author       = {Iain Sutherland and
                  Huw Read and
                  Konstantinos Xynos},
  title        = {Forensic analysis of smart {TV:} {A} current issue and call to arms},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {175--178},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.019},
  doi          = {10.1016/J.DIIN.2014.05.019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SutherlandRX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TobinSG14,
  author       = {Lee Tobin and
                  Ahmed F. Shosha and
                  Pavel Gladyshev},
  title        = {Reverse engineering a {CCTV} system, a case study},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {3},
  pages        = {179--186},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.07.002},
  doi          = {10.1016/J.DIIN.2014.07.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/TobinSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VidasKG14,
  author       = {Timothy Vidas and
                  Brian Kaplan and
                  Matthew Geiger},
  title        = {OpenLV: Empowering investigators and first-responders in the digital
                  forensics process},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S45--S53},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.006},
  doi          = {10.1016/J.DIIN.2014.03.006},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/VidasKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WestphalANP14,
  author       = {Florian Westphal and
                  Stefan Axelsson and
                  Christian Neuhaus and
                  Andreas Polze},
  title        = {{VMI-PL:} {A} monitoring language for virtual platforms using virtual
                  machine introspection},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S85--S94},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.016},
  doi          = {10.1016/J.DIIN.2014.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WestphalANP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WinterSY14,
  author       = {Christian Winter and
                  Martin Steinebach and
                  York Yannikos},
  title        = {Fast indexing strategies for robust image hashes},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S27--S35},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.004},
  doi          = {10.1016/J.DIIN.2014.03.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WinterSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Zdziarski14,
  author       = {Jonathan Zdziarski},
  title        = {Identifying back doors, attack points, and surveillance mechanisms
                  in iOS devices},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {3--19},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.01.001},
  doi          = {10.1016/J.DIIN.2014.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Zdziarski14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AndriotisOT13,
  author       = {Panagiotis Andriotis and
                  George C. Oikonomou and
                  Theo Tryfonas},
  title        = {{JPEG} steganography detection with Benford's Law},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {246--257},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.01.005},
  doi          = {10.1016/J.DIIN.2013.01.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AndriotisOT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BarmpatsalouDKK13,
  author       = {Konstantia Barmpatsalou and
                  Dimitrios Damopoulos and
                  Georgios Kambourakis and
                  Vasilios Katos},
  title        = {A critical review of 7 years of Mobile Device Forensics},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {323--349},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.10.003},
  doi          = {10.1016/J.DIIN.2013.10.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BarmpatsalouDKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BirajdarM13,
  author       = {Gajanan K. Birajdar and
                  Vijay H. Mankar},
  title        = {Digital image forgery detection using passive techniques: {A} survey},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {3},
  pages        = {226--245},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.04.007},
  doi          = {10.1016/J.DIIN.2013.04.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BirajdarM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BreitingerSB13,
  author       = {Frank Breitinger and
                  Georgios Stivaktakis and
                  Harald Baier},
  title        = {{FRASH:} {A} framework to test algorithms of similarity hashing},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S50--S58},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.006},
  doi          = {10.1016/J.DIIN.2013.06.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BreitingerSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Brown13,
  author       = {Ralf D. Brown},
  title        = {Improved recovery and reconstruction of DEFLATEd files},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S21--S29},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.003},
  doi          = {10.1016/J.DIIN.2013.06.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Brown13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey13,
  author       = {Eoghan Casey},
  title        = {Experimental design challenges in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {167--169},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.002},
  doi          = {10.1016/J.DIIN.2013.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey13a,
  author       = {Eoghan Casey},
  title        = {Smartphone incident response},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {1--2},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.04.004},
  doi          = {10.1016/J.DIIN.2013.04.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey13b,
  author       = {Eoghan Casey},
  title        = {Triage in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {85--86},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.08.001},
  doi          = {10.1016/J.DIIN.2013.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey13c,
  author       = {Eoghan Casey},
  title        = {New developments in digital {\&} multimedia forensics},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {3},
  pages        = {205--206},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.09.001},
  doi          = {10.1016/J.DIIN.2013.09.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey13d,
  author       = {Eoghan Casey},
  title        = {Enhancing forensic science through basic and applied research},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {279--280},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.11.001},
  doi          = {10.1016/J.DIIN.2013.11.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyKL13,
  author       = {Eoghan Casey and
                  Gary Katz and
                  Joe Lewthwaite},
  title        = {Honing digital forensic processes},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {138--147},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.07.002},
  doi          = {10.1016/J.DIIN.2013.07.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChanLS13,
  author       = {Lit{-}Hung Chan and
                  Ngai{-}Fong Law and
                  Wan{-}Chi Siu},
  title        = {A confidence map and pixel-based weighted correlation for PRNU-based
                  camera identification},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {3},
  pages        = {215--225},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.04.001},
  doi          = {10.1016/J.DIIN.2013.04.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChanLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CiptasariRS13,
  author       = {Rimba Whidiana Ciptasari and
                  Kyung Hyune Rhee and
                  Kouichi Sakurai},
  title        = {Exploiting reference images for image splicing verification},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {3},
  pages        = {246--258},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.014},
  doi          = {10.1016/J.DIIN.2013.06.014},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CiptasariRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Collie13,
  author       = {Jan Collie},
  title        = {The windows IconCache.db: {A} resource for forensic artifacts from
                  {USB} connectable devices},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {200--210},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.01.006},
  doi          = {10.1016/J.DIIN.2013.01.006},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Collie13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DykstraS13,
  author       = {Josiah Dykstra and
                  Alan T. Sherman},
  title        = {Design and implementation of {FROST:} Digital forensic tools for the
                  OpenStack cloud computing platform},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S87--S95},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.010},
  doi          = {10.1016/J.DIIN.2013.06.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DykstraS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GisolfGVK13,
  author       = {Floris Gisolf and
                  Zeno J. M. H. Geradts and
                  Dennie Verhoeven and
                  Coert Klaver},
  title        = {The effects of switching the camera module from BlackBerry Curve 9360
                  devices},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {56--61},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.01.007},
  doi          = {10.1016/J.DIIN.2013.01.007},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GisolfGVK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GisolfMBG13,
  author       = {Floris Gisolf and
                  Anwar Malgoezar and
                  Teun Baar and
                  Zeno J. M. H. Geradts},
  title        = {Improving source camera identification using a simplified total variation
                  based noise removal algorithm},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {3},
  pages        = {207--214},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.08.002},
  doi          = {10.1016/J.DIIN.2013.08.002},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GisolfMBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GlissonSB13,
  author       = {William Bradley Glisson and
                  Tim Storer and
                  Joe Buchanan{-}Wollaston},
  title        = {An empirical comparison of data recovered from mobile forensic toolkits},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {44--55},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.03.004},
  doi          = {10.1016/J.DIIN.2013.03.004},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GlissonSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Grover13,
  author       = {Justin Grover},
  title        = {Android forensics: Automated data collection and reporting from a
                  mobile device},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S12--S20},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.002},
  doi          = {10.1016/J.DIIN.2013.06.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Grover13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuidoOGWNH13,
  author       = {Mark D. Guido and
                  Jared Ondricek and
                  Justin Grover and
                  David Wilburn and
                  Thanh Nguyen and
                  Andrew Hunt},
  title        = {Automated identification of installed malicious Android applications},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S96--S104},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.011},
  doi          = {10.1016/J.DIIN.2013.06.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuidoOGWNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hale13,
  author       = {Jason S. Hale},
  title        = {Amazon Cloud Drive forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {3},
  pages        = {259--265},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.04.006},
  doi          = {10.1016/J.DIIN.2013.04.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hale13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HongYLL13,
  author       = {Ilyoung Hong and
                  Hyeon Yu and
                  Sangjin Lee and
                  Kyungho Lee},
  title        = {A new triage model conforming to the needs of selective search and
                  seizure of electronic evidence},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {175--192},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.01.003},
  doi          = {10.1016/J.DIIN.2013.01.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HongYLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JamesG13,
  author       = {Joshua I. James and
                  Pavel Gladyshev},
  title        = {A survey of digital forensic investigator decision processes and measurement
                  of decisions based on enhanced preview},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {148--157},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.04.005},
  doi          = {10.1016/J.DIIN.2013.04.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JamesG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KaartKB13,
  author       = {Marnix Kaart and
                  C. Klaver and
                  Ruud B. van Baar},
  title        = {Forensic access to Windows Mobile pim.vol and other Embedded Database
                  {(EDB)} volumes},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {170--192},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2012.12.002},
  doi          = {10.1016/J.DIIN.2012.12.002},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KaartKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Kerrigan13,
  author       = {Martin Kerrigan},
  title        = {A capability maturity model for digital investigations},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {19--33},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.005},
  doi          = {10.1016/J.DIIN.2013.02.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Kerrigan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhalindHA13,
  author       = {Omed S. Khalind and
                  Julio C. Hernandez{-}Castro and
                  Benjamin Aziz},
  title        = {A study on the false positive rate of Stegdetect},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {235--245},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.01.004},
  doi          = {10.1016/J.DIIN.2013.01.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhalindHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KoopmansJ13,
  author       = {Martin B. Koopmans and
                  Joshua I. James},
  title        = {Automated network triage},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {129--137},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.03.002},
  doi          = {10.1016/J.DIIN.2013.03.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KoopmansJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lees13,
  author       = {Christopher Lees},
  title        = {Determining removal of forensic artefacts using the {USN} change journal},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {300--310},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.10.002},
  doi          = {10.1016/J.DIIN.2013.10.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Lees13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lewthwaite13,
  author       = {Joseph Lewthwaite},
  title        = {FrostWire {P2P} forensic examinations},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {211--221},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2012.12.001},
  doi          = {10.1016/J.DIIN.2012.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Lewthwaite13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MartiniC13,
  author       = {Ben Martini and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cloud storage forensics: ownCloud as a case study},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {287--299},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.08.005},
  doi          = {10.1016/J.DIIN.2013.08.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MartiniC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MarturanaT13,
  author       = {Fabio Marturana and
                  Simone Tacconi},
  title        = {A Machine Learning-based Triage methodology for automated categorization
                  of digital media},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {193--204},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.01.001},
  doi          = {10.1016/J.DIIN.2013.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MarturanaT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MoserC13,
  author       = {Andreas Moser and
                  Michael I. Cohen},
  title        = {Hunting in the enterprise: Forensic triage and incident response},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {89--98},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.03.003},
  doi          = {10.1016/J.DIIN.2013.03.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MoserC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OverillSR13,
  author       = {Richard E. Overill and
                  Jantje A. M. Silomon and
                  Keith A. Roscoe},
  title        = {Triage template pipelines in digital forensic investigations},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {168--174},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.03.001},
  doi          = {10.1016/J.DIIN.2013.03.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OverillSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PatelS13,
  author       = {Pratik C. Patel and
                  Upasna Singh},
  title        = {A novel classification model for data theft detection using advanced
                  pattern mining},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {385--397},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.09.002},
  doi          = {10.1016/J.DIIN.2013.09.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PatelS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PenroseMB13,
  author       = {Philip Penrose and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Approaches to the classification of high entropy file fragments},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {372--384},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.08.004},
  doi          = {10.1016/J.DIIN.2013.08.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PenroseMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PiccinelliG13,
  author       = {Mario Piccinelli and
                  Paolo Gubian},
  title        = {Modern ships Voyage Data Recorders: {A} forensics perspective on the
                  Costa Concordia shipwreck},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S41--S49},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.005},
  doi          = {10.1016/J.DIIN.2013.06.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PiccinelliG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Pollitt13,
  author       = {Mark Pollitt},
  title        = {Triage: {A} practical solution or admission of failure},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {87--88},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.01.002},
  doi          = {10.1016/J.DIIN.2013.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Pollitt13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ProvatakiK13,
  author       = {Athina Provataki and
                  Vasilios Katos},
  title        = {Differential malware forensics},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {311--322},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.08.006},
  doi          = {10.1016/J.DIIN.2013.08.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ProvatakiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/QuickC13,
  author       = {Darren Quick and
                  Kim{-}Kwang Raymond Choo},
  title        = {Dropbox analysis: Data remnants on user machines},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {3--18},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.003},
  doi          = {10.1016/J.DIIN.2013.02.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/QuickC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/QuickC13a,
  author       = {Darren Quick and
                  Kim{-}Kwang Raymond Choo},
  title        = {Forensic collection of cloud storage data: Does the act of collection
                  result in changes to the data or its metadata?},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {3},
  pages        = {266--277},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.07.001},
  doi          = {10.1016/J.DIIN.2013.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/QuickC13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ReadXSDHRB13,
  author       = {Huw Read and
                  Konstantinos Xynos and
                  Iain Sutherland and
                  Gareth Davies and
                  Tom Houiellebecq and
                  Frode Roarson and
                  Andrew Blyth},
  title        = {Manipulation of hard drive firmware to conceal entire partitions},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {281--286},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.10.001},
  doi          = {10.1016/J.DIIN.2013.10.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ReadXSDHRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevQ13,
  author       = {Vassil Roussev and
                  Candice Quates},
  title        = {File fragment encoding classification - An empirical approach},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S69--S77},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.008},
  doi          = {10.1016/J.DIIN.2013.06.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevQM13,
  author       = {Vassil Roussev and
                  Candice Quates and
                  Robert Martell},
  title        = {Real-time digital forensics and triage},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {158--167},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.001},
  doi          = {10.1016/J.DIIN.2013.02.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RoussevQM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoweSG13,
  author       = {Neil C. Rowe and
                  Riqui Schwamm and
                  Simson L. Garfinkel},
  title        = {Language translation for file paths},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S78--S86},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.009},
  doi          = {10.1016/J.DIIN.2013.06.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoweSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RuanCKB13,
  author       = {Keyun Ruan and
                  Joe Carthy and
                  M. Tahar Kechadi and
                  Ibrahim M. Baggili},
  title        = {Cloud forensics definitions and critical criteria for cloud forensic
                  capability: An overview of survey results},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {34--43},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.004},
  doi          = {10.1016/J.DIIN.2013.02.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RuanCKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SekehMRM13,
  author       = {Mohammad Akbarpour Sekeh and
                  Mohd Aizaini Maarof and
                  Mohd. Foad Rohani and
                  Babak Mahdian},
  title        = {Efficient image duplicated region detection model using sequential
                  block clustering},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {73--84},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.007},
  doi          = {10.1016/J.DIIN.2013.02.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SekehMRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Shanableh13,
  author       = {Tamer Shanableh},
  title        = {Detection of frame deletion for digital video forensics},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {350--360},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.10.004},
  doi          = {10.1016/J.DIIN.2013.10.004},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Shanableh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShawB13,
  author       = {Adrian Shaw and
                  Alan Browne},
  title        = {A practical and robust approach to coping with large volumes of data
                  submitted for digital forensic examination},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {116--128},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.04.003},
  doi          = {10.1016/J.DIIN.2013.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShawB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShiaelesCK13,
  author       = {Stavros N. Shiaeles and
                  Anargyros Chryssanthou and
                  Vasilios Katos},
  title        = {On-scene triage open source forensic tool chests: Are they effective?},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {2},
  pages        = {99--115},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.04.002},
  doi          = {10.1016/J.DIIN.2013.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShiaelesCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Smith13,
  author       = {G. Stevenson Smith},
  title        = {Using jump lists to identify fraudulent documents},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {193--199},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2012.11.002},
  doi          = {10.1016/J.DIIN.2012.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Smith13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SonLKJLL13,
  author       = {Namheun Son and
                  Yunho Lee and
                  Dohyun Kim and
                  Joshua I. James and
                  Sangjin Lee and
                  Kyungho Lee},
  title        = {A study of user data integrity during acquisition of Android devices},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S3--S11},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.001},
  doi          = {10.1016/J.DIIN.2013.06.001},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SonLKJLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StewartU13,
  author       = {Jon Stewart and
                  Joel Uckelman},
  title        = {Unicode search of dirty data, or: How {I} learned to stop worrying
                  and love Unicode Technical Standard {\#}18},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S116--S125},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.013},
  doi          = {10.1016/J.DIIN.2013.06.013},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/StewartU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StuttgenC13,
  author       = {Johannes St{\"{u}}ttgen and
                  Michael Cohen},
  title        = {Anti-forensic resilient memory acquisition},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S105--S115},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.012},
  doi          = {10.1016/J.DIIN.2013.06.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StuttgenC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VomelS13,
  author       = {Stefan V{\"{o}}mel and
                  Johannes St{\"{u}}ttgen},
  title        = {An evaluation platform for forensic memory acquisition software},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S30--S40},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.004},
  doi          = {10.1016/J.DIIN.2013.06.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/VomelS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WhiteSF13,
  author       = {Andrew White and
                  Bradley L. Schatz and
                  Ernest Foo},
  title        = {Integrity verification of user space code},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S59--S68},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.007},
  doi          = {10.1016/J.DIIN.2013.06.007},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WhiteSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Winter0Y13,
  author       = {Christian Winter and
                  Markus Schneider and
                  York Yannikos},
  title        = {{F2S2:} Fast forensic similarity search through indexing piecewise
                  hash signatures},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {4},
  pages        = {361--371},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.08.003},
  doi          = {10.1016/J.DIIN.2013.08.003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Winter0Y13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/XuYWYZXZ13,
  author       = {Ming Xu and
                  Xue Yang and
                  Beibei Wu and
                  Jun Yao and
                  Haiping Zhang and
                  Jian Xu and
                  Ning Zheng},
  title        = {A metadata-based method for recovering files and file traces from
                  {YAFFS2}},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {1},
  pages        = {62--72},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.02.006},
  doi          = {10.1016/J.DIIN.2013.02.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/XuYWYZXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YasinA13,
  author       = {Muhammad Yasin and
                  Muhammad Abulaish},
  title        = {DigLA - {A} Digsby log analysis tool to identify forensic artifacts},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {3-4},
  pages        = {222--234},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2012.11.003},
  doi          = {10.1016/J.DIIN.2012.11.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/YasinA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-SalehA12,
  author       = {Mohammed I. Al{-}Saleh and
                  Ziad A. Al{-}Sharif},
  title        = {Utilizing data lifetime of {TCP} buffers in digital forensics: Empirical
                  study},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {119--124},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.09.001},
  doi          = {10.1016/J.DIIN.2012.09.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Al-SalehA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-ZaidyFYF12,
  author       = {Rabeah Al{-}Zaidy and
                  Benjamin C. M. Fung and
                  Amr M. Youssef and
                  Francis Fortin},
  title        = {Mining criminal networks from unstructured text documents},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {147--160},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.12.001},
  doi          = {10.1016/J.DIIN.2011.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Al-ZaidyFYF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BhoedjangBBSDBOS12,
  author       = {R. A. F. Bhoedjang and
                  Alex van Ballegooij and
                  Harm M. A. van Beek and
                  J. C. van Schie and
                  F. W. Dillema and
                  Ruud B. van Baar and
                  F. A. Ouwendijk and
                  M. Streppel},
  title        = {Engineering an online computer forensic service},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {96--108},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.10.001},
  doi          = {10.1016/J.DIIN.2012.10.001},
  timestamp    = {Wed, 29 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BhoedjangBBSDBOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Brown12,
  author       = {Ralf D. Brown},
  title        = {Finding and identifying text in 900+ languages},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S34--S43},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.004},
  doi          = {10.1016/J.DIIN.2012.05.004},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Brown12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey12,
  author       = {Eoghan Casey},
  title        = {Editorial - Cutting the Gordian knot: Defining requirements for trustworthy
                  tools},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {145--146},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.02.001},
  doi          = {10.1016/J.DIIN.2012.02.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey12a,
  author       = {Eoghan Casey},
  title        = {Editorial: {IT} security is not enough},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {1--2},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.016},
  doi          = {10.1016/J.DIIN.2012.05.016},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey12b,
  author       = {Eoghan Casey},
  title        = {Cloud computing and digital forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {69--70},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.11.001},
  doi          = {10.1016/J.DIIN.2012.11.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChungPLK12,
  author       = {Hyunji Chung and
                  Jungheum Park and
                  Sangjin Lee and
                  Cheulhoon Kang},
  title        = {Digital forensic investigation of cloud storage services},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {81--95},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.015},
  doi          = {10.1016/J.DIIN.2012.05.015},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChungPLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DengX0J12,
  author       = {Zhui Deng and
                  Dongyan Xu and
                  Xiangyu Zhang and
                  Xuxian Jiang},
  title        = {IntroLib: Efficient and transparent library call introspection for
                  malware forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S13--S23},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.013},
  doi          = {10.1016/J.DIIN.2012.05.013},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DengX0J12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DongYZ12,
  author       = {Qiong Dong and
                  Gaobo Yang and
                  Ningbo Zhu},
  title        = {A {MCEA} based passive forensics scheme for detecting frame-based
                  video tampering},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {151--159},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.07.002},
  doi          = {10.1016/J.DIIN.2012.07.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DongYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DrezewskiSF12,
  author       = {Rafal Drezewski and
                  Jan Sepielak and
                  Wojciech Filipkowski},
  title        = {System supporting money laundering detection},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {8--21},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.04.003},
  doi          = {10.1016/J.DIIN.2012.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DrezewskiSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DykstraS12,
  author       = {Josiah Dykstra and
                  Alan T. Sherman},
  title        = {Acquiring forensic evidence from infrastructure-as-a-service cloud
                  computing: Exploring and evaluating tools, trust, and techniques},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S90--S98},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.001},
  doi          = {10.1016/J.DIIN.2012.05.001},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DykstraS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fairbanks12,
  author       = {Kevin D. Fairbanks},
  title        = {An analysis of Ext4 for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S118--S130},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.010},
  doi          = {10.1016/J.DIIN.2012.05.010},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fairbanks12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FaridB12,
  author       = {Hany Farid and
                  Mary J. Bravo},
  title        = {Perceptual discrimination of computer generated and photographic faces},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {226--235},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.06.003},
  doi          = {10.1016/J.DIIN.2011.06.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FaridB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FasanO12,
  author       = {Oluwasola Mary Fasan and
                  Martin S. Olivier},
  title        = {Correctness proof for database reconstruction algorithm},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {138--150},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.09.002},
  doi          = {10.1016/J.DIIN.2012.09.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FasanO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FitzgeraldMMZ12,
  author       = {Simran Fitzgerald and
                  George Mathews and
                  Colin Morris and
                  Oles Zhulyn},
  title        = {Using {NLP} techniques for file fragment classification},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S44--S49},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.008},
  doi          = {10.1016/J.DIIN.2012.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FitzgeraldMMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel12,
  author       = {Simson L. Garfinkel},
  title        = {Digital forensics {XML} and the {DFXML} toolset},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {161--174},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.11.002},
  doi          = {10.1016/J.DIIN.2011.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel12a,
  author       = {Simson L. Garfinkel},
  title        = {Lessons learned writing digital forensics tools and managing a 30TB
                  digital evidence corpus},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S80--S89},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.002},
  doi          = {10.1016/J.DIIN.2012.05.002},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelNY12,
  author       = {Simson L. Garfinkel and
                  Alex J. Nelson and
                  Joel Young},
  title        = {A general strategy for differential forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S50--S59},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.003},
  doi          = {10.1016/J.DIIN.2012.05.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelNY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HandLGT12,
  author       = {Scott Hand and
                  Zhiqiang Lin and
                  Guofei Gu and
                  Bhavani Thuraisingham},
  title        = {Bin-Carver: Automatic recovery of binary executable files},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S108--S117},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.014},
  doi          = {10.1016/J.DIIN.2012.05.014},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HandLGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HargreavesP12,
  author       = {Christopher James Hargreaves and
                  Jonathan Patterson},
  title        = {An automated timeline reconstruction approach for digital forensic
                  investigations},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S69--S79},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.006},
  doi          = {10.1016/J.DIIN.2012.05.006},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HargreavesP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JonesPW12,
  author       = {Brian Jones and
                  Syd Pleno and
                  Michael Wilkinson},
  title        = {The use of random sampling in investigations involving child abuse
                  material},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S99--S107},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.011},
  doi          = {10.1016/J.DIIN.2012.05.011},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JonesPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lallie12,
  author       = {Harjinder Singh Lallie},
  title        = {An overview of the digital forensic investigation infrastructure of
                  India},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {3--7},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.02.002},
  doi          = {10.1016/J.DIIN.2012.02.002},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Lallie12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MahalakshmiVP12,
  author       = {S. Devi Mahalakshmi and
                  K. Vijayalakshmi and
                  Priyadharsini Selvaraj},
  title        = {Digital image forgery detection and estimation by exploring basic
                  image manipulations},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {215--225},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.06.004},
  doi          = {10.1016/J.DIIN.2011.06.004},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MahalakshmiVP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MartiniC12,
  author       = {Ben Martini and
                  Kim{-}Kwang Raymond Choo},
  title        = {An integrated conceptual digital forensic framework for cloud computing},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {71--80},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.07.001},
  doi          = {10.1016/J.DIIN.2012.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MartiniC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MuhamadHB12,
  author       = {Ghulam Muhammad and
                  Muhammad Hussain and
                  George Bebis},
  title        = {Passive copy move image forgery detection using undecimated dyadic
                  wavelet transform},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {49--57},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.04.004},
  doi          = {10.1016/J.DIIN.2012.04.004},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MuhamadHB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MutawaBM12,
  author       = {Noora Al Mutawa and
                  Ibrahim M. Baggili and
                  Andrew Marrington},
  title        = {Forensic analysis of social networking applications on mobile devices},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S24--S33},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.007},
  doi          = {10.1016/J.DIIN.2012.05.007},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MutawaBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkCL12,
  author       = {Jungheum Park and
                  Hyunji Chung and
                  Sangjin Lee},
  title        = {Forensic analysis techniques for fragmented flash memory pages in
                  smartphones},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {109--118},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.09.003},
  doi          = {10.1016/J.DIIN.2012.09.003},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Quach12,
  author       = {Tu{-}Thach Quach},
  title        = {Locating payload embedded by group-parity steganography},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {160--166},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.08.001},
  doi          = {10.1016/J.DIIN.2012.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Quach12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevQ12,
  author       = {Vassil Roussev and
                  Candice Quates},
  title        = {Content triage with similarity digests: The {M57} case study},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S60--S68},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.012},
  doi          = {10.1016/J.DIIN.2012.05.012},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Rowe12,
  author       = {Neil C. Rowe},
  title        = {Testing the National Software Reference Library},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S131--S138},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.009},
  doi          = {10.1016/J.DIIN.2012.05.009},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Rowe12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SavoldiPG12,
  author       = {Antonio Savoldi and
                  Mario Piccinelli and
                  Paolo Gubian},
  title        = {A statistical method for detecting on-disk wiped areas},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {194--214},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.06.005},
  doi          = {10.1016/J.DIIN.2011.06.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SavoldiPG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SylveCMR12,
  author       = {Joe Sylve and
                  Andrew Case and
                  Lodovico Marziale and
                  Golden G. Richard III},
  title        = {Acquisition and analysis of volatile memory from android devices},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {175--184},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.10.003},
  doi          = {10.1016/J.DIIN.2011.10.003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SylveCMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TartBGM12,
  author       = {Matthew Tart and
                  Iain Brodie and
                  Nicholas Gleed and
                  James Matthews},
  title        = {Historic cell site analysis - Overview of principles and survey methodologies},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {3-4},
  pages        = {185--193},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2011.10.002},
  doi          = {10.1016/J.DIIN.2011.10.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TartBGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VomelF12,
  author       = {Stefan V{\"{o}}mel and
                  Felix C. Freiling},
  title        = {Correctness, atomicity, and integrity: Defining criteria for forensically-sound
                  memory acquisition},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {2},
  pages        = {125--137},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.04.005},
  doi          = {10.1016/J.DIIN.2012.04.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VomelF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WhiteSF12,
  author       = {Andrew White and
                  Bradley L. Schatz and
                  Ernest Foo},
  title        = {Surveying the user space through user allocations},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S3--S12},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.005},
  doi          = {10.1016/J.DIIN.2012.05.005},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WhiteSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YuQLZLG12,
  author       = {Miao Yu and
                  Zhengwei Qi and
                  Qian Lin and
                  Xianming Zhong and
                  Bingyu Li and
                  Haibing Guan},
  title        = {Vis: Virtualization enhanced live forensics acquisition for native
                  system},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {22--33},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.04.002},
  doi          = {10.1016/J.DIIN.2012.04.002},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/YuQLZLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhangTZ12,
  author       = {Li Zhang and
                  Yu{-}an Tan and
                  Qikun Zhang},
  title        = {Identification of {NAND} flash {ECC} algorithms in mobile devices},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {34--48},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.04.001},
  doi          = {10.1016/J.DIIN.2012.04.001},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZhangTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZongLL12,
  author       = {Han Zong and
                  Fenlin Liu and
                  Xiangyang Luo},
  title        = {Blind image steganalysis based on wavelet coefficient correlation},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {1},
  pages        = {58--68},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.02.003},
  doi          = {10.1016/J.DIIN.2012.02.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZongLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-WehaibiSG11,
  author       = {Khawla Al{-}Wehaibi and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {Augmenting password recovery with online profiling},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S25--S33},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.004},
  doi          = {10.1016/J.DIIN.2011.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Al-WehaibiSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AllegraPNRV11,
  author       = {Elisabetta Allegra and
                  Roberto Di Pietro and
                  Mauro La Noce and
                  Valerio Ruocco and
                  Nino Vincenzo Verde},
  title        = {Cross-border co-operation and education in digital investigations:
                  {A} European perspective},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {106--113},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.09.001},
  doi          = {10.1016/J.DIIN.2011.09.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AllegraPNRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BallouG11,
  author       = {Susan Ballou and
                  Rhesa G. Gilliland},
  title        = {Emerging paper standards in computer forensics},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {96--97},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.017},
  doi          = {10.1016/J.DIIN.2011.05.017},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BallouG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BandayMQS11,
  author       = {M. Tariq Banday and
                  Farooq A. Mir and
                  Jameel A. Qadri and
                  Nisar Ahmed Shah},
  title        = {Analyzing Internet e-mail date-spoofing},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {145--153},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.11.001},
  doi          = {10.1016/J.DIIN.2010.11.001},
  timestamp    = {Tue, 03 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BandayMQS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BangYL11,
  author       = {Jewan Bang and
                  Byeongyeong Yoo and
                  Sangjin Lee},
  title        = {Analysis of changes in file time attributes with file manipulation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {135--144},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.12.001},
  doi          = {10.1016/J.DIIN.2010.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BangYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeckettS11,
  author       = {Jason Beckett and
                  Jill Slay},
  title        = {Scientific underpinnings and background to standards and accreditation
                  in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {114--121},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.08.001},
  doi          = {10.1016/J.DIIN.2011.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BeckettS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeverlyGC11,
  author       = {Robert Beverly and
                  Simson L. Garfinkel and
                  Greg Cardwell},
  title        = {Forensic carving of network packets and associated data structures},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S78--S89},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.010},
  doi          = {10.1016/J.DIIN.2011.05.010},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeverlyGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Brown11,
  author       = {Ralf D. Brown},
  title        = {Reconstructing corrupt DEFLATEd files},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S125--S131},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.015},
  doi          = {10.1016/J.DIIN.2011.05.015},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Brown11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey11,
  author       = {Eoghan Casey},
  title        = {The increasing need for automation and validation in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {103--104},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.02.002},
  doi          = {10.1016/J.DIIN.2011.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey11a,
  author       = {Eoghan Casey},
  title        = {Responding to a data breach: {A} little knowledge is a dangerous thing},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {1--2},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.07.001},
  doi          = {10.1016/J.DIIN.2011.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey11b,
  author       = {Eoghan Casey},
  title        = {A unified voice: The need for an international digital forensic convention},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {89--91},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.09.004},
  doi          = {10.1016/J.DIIN.2011.09.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyCLOS11,
  author       = {Eoghan Casey and
                  Adrien Cheval and
                  Jong Yeon Lee and
                  David Oxley and
                  Yong Jun Song},
  title        = {Forensic acquisition and analysis of palm webOS on mobile devices},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {37--47},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.04.003},
  doi          = {10.1016/J.DIIN.2011.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyCLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyFGS11,
  author       = {Eoghan Casey and
                  Geoff Fellows and
                  Matthew Geiger and
                  Gerasimos Stellatos},
  title        = {The growing impact of full disk encryption on digital forensics},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {129--134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.09.005},
  doi          = {10.1016/J.DIIN.2011.09.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyFGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChenHY11,
  author       = {Zhili Chen and
                  Liusheng Huang and
                  Wei Yang},
  title        = {Detection of substitution-based linguistic steganography by relative
                  frequency analysis},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {68--77},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.03.001},
  doi          = {10.1016/J.DIIN.2011.03.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChenHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChengCS11,
  author       = {Na Cheng and
                  Rajarathnam Chandramouli and
                  K. P. Subbalakshmi},
  title        = {Author gender identification from text},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {78--88},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.04.002},
  doi          = {10.1016/J.DIIN.2011.04.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChengCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChiversH11,
  author       = {Howard Chivers and
                  Christopher James Hargreaves},
  title        = {Forensic data recovery from the Windows Search Database},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {114--126},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.01.001},
  doi          = {10.1016/J.DIIN.2011.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChiversH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CohenBC11,
  author       = {Michael I. Cohen and
                  Darren Bilby and
                  Germano Caronni},
  title        = {Distributed forensics and incident response in the enterprise},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S101--S110},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.012},
  doi          = {10.1016/J.DIIN.2011.05.012},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CohenBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FlaglienMMA11,
  author       = {Anders Flaglien and
                  Aleksander Mallasvik and
                  Magnus Mustorp and
                  Andr{\'{e}} {\AA}rnes},
  title        = {Storage and exchange formats for digital evidence},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {122--128},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.09.002},
  doi          = {10.1016/J.DIIN.2011.09.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FlaglienMMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FuSLL11,
  author       = {Zhangjie Fu and
                  Xingming Sun and
                  Yuling Liu and
                  Bo Li},
  title        = {Forensic investigation of {OOXML} format documents},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {48--55},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.04.001},
  doi          = {10.1016/J.DIIN.2011.04.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FuSLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Geradts11,
  author       = {Zeno J. M. H. Geradts},
  title        = {{ENFSI} Forensic {IT} Working group},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {94--95},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.09.003},
  doi          = {10.1016/J.DIIN.2011.09.003},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Geradts11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Grier11,
  author       = {Jonathan Grier},
  title        = {Detecting data theft using stochastic forensics},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S71--S77},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.009},
  doi          = {10.1016/J.DIIN.2011.05.009},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Grier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrisposSG11,
  author       = {George Grispos and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {A comparison of forensic evidence recovery techniques for a windows
                  mobile smart phone},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {23--36},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.016},
  doi          = {10.1016/J.DIIN.2011.05.016},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrisposSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HsuSC11,
  author       = {Hsien{-}Ming Hsu and
                  Yeali S. Sun and
                  Meng Chang Chen},
  title        = {Collaborative scheme for VoIP traceback},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {185--195},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.10.003},
  doi          = {10.1016/J.DIIN.2010.10.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HsuSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hunton11,
  author       = {Paul Hunton},
  title        = {A rigorous approach to formalising the technical investigation stages
                  of cybercrime and criminality within a {UK} law enforcement environment},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {105--113},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.01.002},
  doi          = {10.1016/J.DIIN.2011.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hunton11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/InoueAJ11,
  author       = {Hajime Inoue and
                  Frank Adelstein and
                  Robert A. Joyce},
  title        = {Visualization in testing a volatile memory forensic tool},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S42--S51},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.006},
  doi          = {10.1016/J.DIIN.2011.05.006},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/InoueAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KingV11,
  author       = {Christopher King and
                  Timothy Vidas},
  title        = {Empirical analysis of solid state disk data retention when used with
                  contemporary operating systems},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S111--S117},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.013},
  doi          = {10.1016/J.DIIN.2011.05.013},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KingV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LallieB11,
  author       = {Harjinder Singh Lallie and
                  Philip James Briggs},
  title        = {Windows 7 registry forensic evidence created by three popular BitTorrent
                  clients},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {127--134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.10.002},
  doi          = {10.1016/J.DIIN.2010.10.002},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LallieB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LouisE11,
  author       = {A. L. Louis and
                  Andries P. Engelbrecht},
  title        = {Unsupervised discovery of relations for analysis of textual data},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {154--171},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.08.004},
  doi          = {10.1016/J.DIIN.2010.08.004},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LouisE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MarringtonBMC11,
  author       = {Andrew Marrington and
                  Ibrahim M. Baggili and
                  George M. Mohay and
                  Andrew J. Clark},
  title        = {{CAT} Detect (Computer Activity Timeline Detection): {A} tool for
                  detecting inconsistency in computer activity timelines},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S52--S61},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.007},
  doi          = {10.1016/J.DIIN.2011.05.007},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MarringtonBMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Marshall11,
  author       = {Angus M. Marshall},
  title        = {Standards, regulation {\&} quality in digital investigations:
                  The state we are in},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {141--144},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.11.001},
  doi          = {10.1016/J.DIIN.2011.11.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Marshall11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OhLL11,
  author       = {Junghoon Oh and
                  SeungBong Lee and
                  Sangjin Lee},
  title        = {Advanced evidence collection and analysis of web browser activity},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S62--S70},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.008},
  doi          = {10.1016/J.DIIN.2011.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OhLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OkolicaP11,
  author       = {James S. Okolica and
                  Gilbert L. Peterson},
  title        = {Extracting the windows clipboard from physical memory},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S118--S124},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.014},
  doi          = {10.1016/J.DIIN.2011.05.014},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OkolicaP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OwenT11,
  author       = {Paul Owen and
                  Paula Thomas},
  title        = {An analysis of digital forensic examinations: Mobile devices versus
                  hard disk drives utilising {ACPO} {\&} {NIST} guidelines},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {135--140},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.03.002},
  doi          = {10.1016/J.DIIN.2011.03.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OwenT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PhamSH11,
  author       = {Dung Vu Pham and
                  Ali Syed and
                  Malka N. Halgamuge},
  title        = {Universal serial bus based software attacks and protection solutions},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {172--184},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.02.001},
  doi          = {10.1016/J.DIIN.2011.02.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PhamSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Roussev11,
  author       = {Vassil Roussev},
  title        = {An evaluation of forensic similarity hashes},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S34--S41},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.005},
  doi          = {10.1016/J.DIIN.2011.05.005},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Roussev11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShebaroC11,
  author       = {Bilal Shebaro and
                  Jedidiah R. Crandall},
  title        = {Privacy-preserving network flow recording},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S90--S100},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.011},
  doi          = {10.1016/J.DIIN.2011.05.011},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShebaroC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShieldsFM11,
  author       = {Clay Shields and
                  Ophir Frieder and
                  Mark Maloof},
  title        = {A system for the proactive, continuous, and efficient collection of
                  digital forensic evidence},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S3--S13},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.002},
  doi          = {10.1016/J.DIIN.2011.05.002},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShieldsFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sommer11,
  author       = {Peter Sommer},
  title        = {Certification, registration and assessment of digital forensic experts:
                  The {UK} experience},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {98--105},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.06.001},
  doi          = {10.1016/J.DIIN.2011.06.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sommer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Venema11,
  author       = {Wietse Z. Venema},
  title        = {Eleventh Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S1--S2},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.001},
  doi          = {10.1016/J.DIIN.2011.05.001},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Venema11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VidasZC11,
  author       = {Timothy Vidas and
                  Chengye Zhang and
                  Nicolas Christin},
  title        = {Toward a general collection methodology for Android devices},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S14--S24},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.003},
  doi          = {10.1016/J.DIIN.2011.05.003},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/VidasZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VomelF11,
  author       = {Stefan V{\"{o}}mel and
                  Felix C. Freiling},
  title        = {A survey of main memory acquisition and analysis techniques for the
                  windows operating system},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {3--22},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.06.002},
  doi          = {10.1016/J.DIIN.2011.06.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VomelF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/X11,
  title        = {Consortium of Digital Forensic Specialists: Shape the future of your
                  profession},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {2},
  pages        = {92--93},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.10.001},
  doi          = {10.1016/J.DIIN.2011.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/X11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YenLW11,
  author       = {Yun{-}Sheng Yen and
                  I{-}Long Lin and
                  Bo{-}Lin Wu},
  title        = {A study on the forensic mechanisms of VoIP attacks: Analysis and digital
                  evidence},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {1},
  pages        = {56--67},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.03.003},
  doi          = {10.1016/J.DIIN.2011.03.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/YenLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Axelsson10,
  author       = {Stefan Axelsson},
  title        = {The Normalised Compression Distance as a file fragment classifier},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S24--S31},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.004},
  doi          = {10.1016/J.DIIN.2010.05.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Axelsson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BangYL10,
  author       = {Jewan Bang and
                  Byeongyeong Yoo and
                  Sangjin Lee},
  title        = {Secure {USB} bypassing tool},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S114--S120},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.014},
  doi          = {10.1016/J.DIIN.2010.05.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BangYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Carrier10,
  author       = {Brian D. Carrier},
  title        = {Different interpretations of {ISO9660} file systems},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S129--S134},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.016},
  doi          = {10.1016/J.DIIN.2010.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Carrier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMNR10,
  author       = {Andrew Case and
                  Lodovico Marziale and
                  Cris Neckar and
                  Golden G. Richard III},
  title        = {Treasure and tragedy in \emph{kmem{\_}cache} mining for live forensics
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S41--S47},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.006},
  doi          = {10.1016/J.DIIN.2010.05.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMR10,
  author       = {Andrew Case and
                  Lodovico Marziale and
                  Golden G. Richard III},
  title        = {Dynamic recreation of kernel data structures for live forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S32--S40},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.005},
  doi          = {10.1016/J.DIIN.2010.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey10,
  author       = {Eoghan Casey},
  title        = {Digital dust: Evidence in every nook and cranny},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {93--94},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.02.002},
  doi          = {10.1016/J.DIIN.2010.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey10a,
  author       = {Eoghan Casey},
  title        = {Digital investigations, security and privacy},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.10.001},
  doi          = {10.1016/J.DIIN.2010.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyBD10,
  author       = {Eoghan Casey and
                  Michael Bann and
                  John Doyle},
  title        = {Introduction to Windows Mobile Forensics},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {136--146},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.004},
  doi          = {10.1016/J.DIIN.2010.01.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChengL10,
  author       = {Fa{-}Chang Cheng and
                  Wen{-}Hsing Lai},
  title        = {An overview of VoIP and {P2P} copyright and lawful-interception issues
                  in the United States and Taiwan},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {81--89},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.001},
  doi          = {10.1016/J.DIIN.2010.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChengL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CohenS10,
  author       = {Michael Cohen and
                  Bradley L. Schatz},
  title        = {Hash based disk imaging using {AFF4}},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S121--S128},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.015},
  doi          = {10.1016/J.DIIN.2010.05.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CohenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ContiBSSRSLP10,
  author       = {Gregory J. Conti and
                  Sergey Bratus and
                  Anna Shubina and
                  Benjamin Sangster and
                  Roy Ragsdale and
                  Matthew Supan and
                  Andrew Lichtenberg and
                  Robert Perez{-}Alemany},
  title        = {Automated mapping of large binary objects using primitive fragment
                  type classification},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S3--S12},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.002},
  doi          = {10.1016/J.DIIN.2010.05.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ContiBSSRSLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CroftO10,
  author       = {Neil J. Croft and
                  Martin S. Olivier},
  title        = {Sequenced release of privacy-accurate information in a forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {95--101},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.002},
  doi          = {10.1016/J.DIIN.2010.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CroftO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DistefanoMP10,
  author       = {Alessandro Distefano and
                  Gianluigi Me and
                  Francesco Pace},
  title        = {Android anti-forensics through a local paradigm},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S83--S94},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.011},
  doi          = {10.1016/J.DIIN.2010.05.011},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DistefanoMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/EijkR10,
  author       = {Onno van Eijk and
                  Mark Roeloffs},
  title        = {Forensic acquisition and analysis of the Random Access Memory of TomTom
                  {GPS} navigation systems},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {179--188},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.02.005},
  doi          = {10.1016/J.DIIN.2010.02.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/EijkR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fellows10,
  author       = {Geoffrey Fellows},
  title        = {WinRAR temporary folder artefacts},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {9--13},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2009.12.001},
  doi          = {10.1016/J.DIIN.2009.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fellows10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel10,
  author       = {Simson L. Garfinkel},
  title        = {Digital forensics research: The next 10 years},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S64--S73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.009},
  doi          = {10.1016/J.DIIN.2010.05.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelNWR10,
  author       = {Simson L. Garfinkel and
                  Alex J. Nelson and
                  Douglas White and
                  Vassil Roussev},
  title        = {Using purpose-built functions and block hashes to enable small block
                  and sub-file forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S13--S23},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.003},
  doi          = {10.1016/J.DIIN.2010.05.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelNWR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Gogolin10,
  author       = {Greg Gogolin},
  title        = {The Digital Crime Tsunami},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {3--8},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.07.001},
  doi          = {10.1016/J.DIIN.2010.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Gogolin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalBFD10,
  author       = {Farkhund Iqbal and
                  Hamad Binsalleeh and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {Mining writeprints from anonymous e-mails for forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {56--64},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.03.003},
  doi          = {10.1016/J.DIIN.2010.03.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IqbalBFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Jonkers10,
  author       = {Kevin Jonkers},
  title        = {The forensic use of mobile phone flasher boxes},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {168--178},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.006},
  doi          = {10.1016/J.DIIN.2010.01.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Jonkers10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhanBY10,
  author       = {Liaqat Ali Khan and
                  Muhammad Shamim Baig and
                  Amr M. Youssef},
  title        = {Speaker recognition from encrypted VoIP communications},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {65--73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2009.10.001},
  doi          = {10.1016/J.DIIN.2009.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhanBY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhanIB10,
  author       = {Liaqat Ali Khan and
                  Farkhund Iqbal and
                  Muhammad Shamim Baig},
  title        = {Speaker verification from partially encrypted compressed speech for
                  forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {74--80},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.03.002},
  doi          = {10.1016/J.DIIN.2010.03.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhanIB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Klaver10,
  author       = {C. Klaver},
  title        = {Windows Mobile advanced forensics},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {147--167},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.02.001},
  doi          = {10.1016/J.DIIN.2010.02.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Klaver10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LiberatoreEKLS10,
  author       = {Marc Liberatore and
                  Robert Erdely and
                  Thomas Kerle and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {Forensic investigation of peer-to-peer file sharing networks},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S95--S103},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.012},
  doi          = {10.1016/J.DIIN.2010.05.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LiberatoreEKLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lyle10,
  author       = {James R. Lyle},
  title        = {If \emph{error rate} is such a simple concept, why don't {I} have
                  one for my forensic tool yet?},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S135--S139},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.017},
  doi          = {10.1016/J.DIIN.2010.05.017},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Lyle10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MislanCK10,
  author       = {Richard P. Mislan and
                  Eoghan Casey and
                  Gary C. Kessler},
  title        = {The growing need for on-scene triage of mobile devices},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {112--124},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.03.001},
  doi          = {10.1016/J.DIIN.2010.03.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MislanCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OkolicaP10,
  author       = {James S. Okolica and
                  Gilbert L. Peterson},
  title        = {Windows operating systems agnostic memory analysis},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S48--S56},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.007},
  doi          = {10.1016/J.DIIN.2010.05.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OkolicaP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PilliJN10,
  author       = {Emmanuel S. Pilli and
                  Ramesh C. Joshi and
                  Rajdeep Niyogi},
  title        = {Network forensic frameworks: Survey and research challenges},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {14--27},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.02.003},
  doi          = {10.1016/J.DIIN.2010.02.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PilliJN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Pooters10,
  author       = {Ivo Pooters},
  title        = {Full user data acquisition from Symbian smart phones},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {125--135},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.001},
  doi          = {10.1016/J.DIIN.2010.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Pooters10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RabaiottiH10,
  author       = {Joseph R. Rabaiotti and
                  Christopher James Hargreaves},
  title        = {Using a software exploit to image {RAM} on an embedded system},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {95--103},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.005},
  doi          = {10.1016/J.DIIN.2010.01.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RabaiottiH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Rehault10,
  author       = {Frederick Rehault},
  title        = {Windows mobile advanced forensics: An alternative to existing tools},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {38--47},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.003},
  doi          = {10.1016/J.DIIN.2010.08.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Rehault10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SaurG10,
  author       = {Karla Saur and
                  Julian B. Grizzard},
  title        = {Locating {\texttimes}86 paging structures in memory images},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {28--37},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.002},
  doi          = {10.1016/J.DIIN.2010.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SaurG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShebaroPC10,
  author       = {Bilal Shebaro and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Jedidiah R. Crandall},
  title        = {Leaving timing-channel fingerprints in hidden service log files},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S104--S113},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.013},
  doi          = {10.1016/J.DIIN.2010.05.013},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShebaroPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StevensC10,
  author       = {Richard M. Stevens and
                  Eoghan Casey},
  title        = {Extracting Windows command line details from physical memory},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S57--S63},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.008},
  doi          = {10.1016/J.DIIN.2010.05.008},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StevensC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThingNC10,
  author       = {Vrizlynn L. L. Thing and
                  Kian{-}Yong Ng and
                  Ee{-}Chien Chang},
  title        = {Live memory forensics of mobile phones},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S74--S82},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.010},
  doi          = {10.1016/J.DIIN.2010.05.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThingNC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/XuYXXZ10,
  author       = {Ming Xu and
                  Hong{-}Rong Yang and
                  Jian Xu and
                  Ye Xu and
                  Ning Zheng},
  title        = {An adaptive method to identify disk cluster size based on block content},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {48--55},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.003},
  doi          = {10.1016/J.DIIN.2010.01.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/XuYXXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/XynosHSDB10,
  author       = {Konstantinos Xynos and
                  Simon Harries and
                  Iain Sutherland and
                  Gareth Davies and
                  Andrew Blyth},
  title        = {Xbox 360: {A} digital forensic investigation of the hard disk drive},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {3-4},
  pages        = {104--111},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.02.004},
  doi          = {10.1016/J.DIIN.2010.02.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/XynosHSDB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YasinCK10,
  author       = {Muhammad Yasin and
                  Ahmad R. Cheema and
                  Firdous Kausar},
  title        = {Analysis of Internet Download Manager for collection of digital forensic
                  artefacts},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {90--94},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.005},
  doi          = {10.1016/J.DIIN.2010.08.005},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YasinCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Ayers09,
  author       = {Daniel Ayers},
  title        = {A second generation computer forensic analysis system},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S34--S42},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.013},
  doi          = {10.1016/J.DIIN.2009.06.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Ayers09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeebeSS09,
  author       = {Nicole Lang Beebe and
                  Sonia D. Stacy and
                  Dane Stuckey},
  title        = {Digital forensic implications of {ZFS}},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S99--S107},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.006},
  doi          = {10.1016/J.DIIN.2009.06.006},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeebeSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ByersS09,
  author       = {David Byers and
                  Nahid Shahmehri},
  title        = {A systematic evaluation of disk imaging in EnCase\({}^{\mbox{{\textregistered}}}\)
                  6.8 and LinEn 6.1},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {61--70},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.05.004},
  doi          = {10.1016/J.DIIN.2009.05.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ByersS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey09,
  author       = {Eoghan Casey},
  title        = {"Dawn raids" bring a new form in incident response},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {73--74},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.01.002},
  doi          = {10.1016/J.DIIN.2009.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey09a,
  author       = {Eoghan Casey},
  title        = {Digital forensics: Coming of age},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {1--2},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.08.001},
  doi          = {10.1016/J.DIIN.2009.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Cohen09,
  author       = {Michael I. Cohen},
  title        = {Source attribution for network address translated forensic captures},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {138--145},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2008.12.002},
  doi          = {10.1016/J.DIIN.2008.12.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Cohen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CohenGS09,
  author       = {Michael Cohen and
                  Simson L. Garfinkel and
                  Bradley L. Schatz},
  title        = {Extending the advanced forensic format to accommodate multiple data
                  sources, logical evidence, arbitrary information and forensic workflow},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S57--S68},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.010},
  doi          = {10.1016/J.DIIN.2009.06.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CohenGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Forster09,
  author       = {Peter F. R. Forster},
  title        = {Steve Anson and Steve Bunting, Mastering Windows network forensics
                  and investigations , Sybex (an imprint of Wiley Publishing Inc.),
                  {US} and Canada {(2007)} {ISBN} 978-0-4700-9762-5 530 pp},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {153--154},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2008.09.001},
  doi          = {10.1016/J.DIIN.2008.09.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Forster09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Forster09a,
  author       = {Peter F. R. Forster},
  title        = {Photoshop {CS3} for forensics professionals},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {91},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.02.001},
  doi          = {10.1016/J.DIIN.2009.02.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Forster09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelFRD09,
  author       = {Simson L. Garfinkel and
                  Paul F. Farrell Jr. and
                  Vassil Roussev and
                  George W. Dinolt},
  title        = {Bringing science to digital forensics with standardized forensic corpora},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S2--S11},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.016},
  doi          = {10.1016/J.DIIN.2009.06.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelFRD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuoSB09,
  author       = {Yinghua Guo and
                  Jill Slay and
                  Jason Beckett},
  title        = {Validation and verification of computer forensic software tools -
                  Searching Function},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S12--S22},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.015},
  doi          = {10.1016/J.DIIN.2009.06.015},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuoSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HadjidjDLISB09,
  author       = {Rachid Hadjidj and
                  Mourad Debbabi and
                  Hakim Lounis and
                  Farkhund Iqbal and
                  Adam Szporer and
                  Djamel Benredjem},
  title        = {Towards an integrated e-mail forensic analysis framework},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {124--137},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.01.004},
  doi          = {10.1016/J.DIIN.2009.01.004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HadjidjDLISB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HejaziTD09,
  author       = {Seyed Mahmood Hejazi and
                  Chamseddine Talhi and
                  Mourad Debbabi},
  title        = {Extraction of forensically sensitive information from windows physical
                  memory},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S121--S131},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.003},
  doi          = {10.1016/J.DIIN.2009.06.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HejaziTD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HoutenG09,
  author       = {Wiger van Houten and
                  Zeno J. M. H. Geradts},
  title        = {Source video camera identification for multiply compressed videos
                  originating from YouTube},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {48--60},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.05.003},
  doi          = {10.1016/J.DIIN.2009.05.003},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HoutenG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IronsSF09,
  author       = {A. D. Irons and
                  P. Stephens and
                  R. Ian Ferguson},
  title        = {Digital Investigation as a distinct discipline: {A} pedagogic perspective},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {82--90},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.05.002},
  doi          = {10.1016/J.DIIN.2009.05.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IronsSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Jones09,
  author       = {Andy Jones},
  title        = {Lessons not learned on data disposal},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {3--7},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.017},
  doi          = {10.1016/J.DIIN.2009.06.017},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Jones09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KahvedzicK09,
  author       = {Damir Kahvedzic and
                  M. Tahar Kechadi},
  title        = {{DIALOG:} {A} framework for modeling, analysis and reuse of digital
                  forensic knowledge},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S23--S33},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.014},
  doi          = {10.1016/J.DIIN.2009.06.014},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KahvedzicK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimPCLB09,
  author       = {Kibom Kim and
                  Sangseo Park and
                  Taejoo Chang and
                  Cheolwon Lee and
                  Sungjai Baek},
  title        = {Lessons learned from the construction of a Korean software reference
                  data set for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S108--S113},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.005},
  doi          = {10.1016/J.DIIN.2009.06.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KimPCLB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Kornblum09,
  author       = {Jesse D. Kornblum},
  title        = {Implementing BitLocker Drive Encryption for forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {75--84},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.01.001},
  doi          = {10.1016/J.DIIN.2009.01.001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Kornblum09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LevineL09,
  author       = {Brian Neil Levine and
                  Marc Liberatore},
  title        = {{DEX:} Digital evidence provenance supporting reproducibility and
                  comparison},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S48--S56},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.011},
  doi          = {10.1016/J.DIIN.2009.06.011},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LevineL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Maartmann-MoeTA09,
  author       = {Carsten Maartmann{-}Moe and
                  Steffen E. Thorkildsen and
                  Andr{\'{e}} {\AA}rnes},
  title        = {The persistence of memory: Forensic identification and extraction
                  of cryptographic keys},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S132--S140},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.002},
  doi          = {10.1016/J.DIIN.2009.06.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Maartmann-MoeTA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel09,
  author       = {Bruce J. Nikkel},
  title        = {Forensic analysis of {GPT} disks and {GUID} partition tables},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {39--47},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.07.001},
  doi          = {10.1016/J.DIIN.2009.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Olivier09,
  author       = {Martin S. Olivier},
  title        = {On metadata context in Database Forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {115--123},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2008.10.001},
  doi          = {10.1016/J.DIIN.2008.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Olivier09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OlssonB09,
  author       = {Jens Olsson and
                  Martin Boldt},
  title        = {Computer forensic timeline visualization tool},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S78--S87},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.008},
  doi          = {10.1016/J.DIIN.2009.06.008},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OlssonB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PanB09,
  author       = {Lei Pan and
                  Lynn Margaret Batten},
  title        = {Robust performance testing for digital forensic tools},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {71--81},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.02.003},
  doi          = {10.1016/J.DIIN.2009.02.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkL09,
  author       = {Jungheum Park and
                  Sangjin Lee},
  title        = {Forensic investigation of Microsoft PowerPoint files},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {16--24},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.05.001},
  doi          = {10.1016/J.DIIN.2009.05.001},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ParkPL09,
  author       = {Bora Park and
                  Jungheum Park and
                  Sangjin Lee},
  title        = {Data concealment and detection in Microsoft Office 2007 files},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {104--114},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2008.12.001},
  doi          = {10.1016/J.DIIN.2008.12.001},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ParkPL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Pereira09,
  author       = {Murilo Tito Pereira},
  title        = {Forensic analysis of the Firefox 3 Internet history and recovery of
                  deleted SQLite records},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {93--103},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.01.003},
  doi          = {10.1016/J.DIIN.2009.01.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Pereira09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PooleZA09,
  author       = {Nigel R. Poole and
                  Qin Zhou and
                  P. Abatis},
  title        = {Analysis of {CCTV} digital video recorder hard disk storage system},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {85--92},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2008.11.001},
  doi          = {10.1016/J.DIIN.2008.11.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PooleZA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SencarM09,
  author       = {Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Identification and recovery of {JPEG} files with missing fragments},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S88--S98},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.007},
  doi          = {10.1016/J.DIIN.2009.06.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SencarM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sommer09,
  author       = {Peter Sommer},
  title        = {Meetings between experts: {A} route to simpler, fairer trials?},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {3-4},
  pages        = {146--152},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2008.11.002},
  doi          = {10.1016/J.DIIN.2008.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sommer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThingY09,
  author       = {Vrizlynn L. L. Thing and
                  Hwei{-}Ming Ying},
  title        = {A novel time-memory trade-off method for password recovery},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S114--S120},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.004},
  doi          = {10.1016/J.DIIN.2009.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThingY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WatkinsMLH09,
  author       = {Kathryn Watkins and
                  Mike McWhorte and
                  Jeff Long and
                  Bill Hill},
  title        = {Teleporter: An analytically and forensically sound duplicate transfer
                  system},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S43--S47},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.012},
  doi          = {10.1016/J.DIIN.2009.06.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WatkinsMLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZaxA09,
  author       = {Rachel Zax and
                  Frank Adelstein},
  title        = {{FAUST:} Forensic artifacts of uninstalled steganography tools},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {25--38},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.02.002},
  doi          = {10.1016/J.DIIN.2009.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZaxA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhuGJ09,
  author       = {Yuandong Zhu and
                  Pavel Gladyshev and
                  Joshua James},
  title        = {Using shellbag information to reconstruct user activities},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S69--S77},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.009},
  doi          = {10.1016/J.DIIN.2009.06.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZhuGJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhuJG09,
  author       = {Yuandong Zhu and
                  Joshua James and
                  Pavel Gladyshev},
  title        = {A comparative methodology for the reconstruction of digital events
                  using windows restore points},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {1-2},
  pages        = {8--15},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.02.004},
  doi          = {10.1016/J.DIIN.2009.02.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ZhuJG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaarAB08,
  author       = {Ruud B. van Baar and
                  Wouter Alink and
                  Alex van Ballegooij},
  title        = {Forensic memory analysis: Files mapped in memory},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S52--S57},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.014},
  doi          = {10.1016/J.DIIN.2008.05.014},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaarAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BayramSM08,
  author       = {Sevinc Bayram and
                  Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Classification of digital camera-models based on demosaicing artifacts},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {49--59},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.06.004},
  doi          = {10.1016/J.DIIN.2008.06.004},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BayramSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BruecknerGAW08,
  author       = {Stephen Brueckner and
                  David Guaspari and
                  Frank Adelstein and
                  Joseph Weeks},
  title        = {Automated computer forensics training in a virtualized environment},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S105--S111},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.009},
  doi          = {10.1016/J.DIIN.2008.05.009},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BruecknerGAW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BurghardtF08,
  author       = {Aaron Burghardt and
                  Adam J. Feldman},
  title        = {Using the {HFS+} journal for deleted file recovery},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S76--S82},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.013},
  doi          = {10.1016/J.DIIN.2008.05.013},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BurghardtF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ByersS08,
  author       = {David Byers and
                  Nahid Shahmehri},
  title        = {Contagious errors: Understanding and avoiding issues with imaging
                  drives containing faulty sectors},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {29--33},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.03.002},
  doi          = {10.1016/J.DIIN.2008.03.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ByersS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CalhounC08,
  author       = {William C. Calhoun and
                  Drue Coles},
  title        = {Predicting the types of file fragments},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S14--S20},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.005},
  doi          = {10.1016/J.DIIN.2008.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CalhounC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseCMRR08,
  author       = {Andrew Case and
                  Andrew Cristina and
                  Lodovico Marziale and
                  Golden G. Richard III and
                  Vassil Roussev},
  title        = {{FACE:} Automated digital evidence discovery and correlation},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S65--S75},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.008},
  doi          = {10.1016/J.DIIN.2008.05.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseCMRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey08,
  author       = {Eoghan Casey},
  title        = {State of the Journal},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {1--2},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.08.002},
  doi          = {10.1016/J.DIIN.2008.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Cohen08,
  author       = {Michael I. Cohen},
  title        = {PyFlag - An advanced network forensic framework},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S112--S120},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.016},
  doi          = {10.1016/J.DIIN.2008.05.016},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Cohen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DistefanoM08,
  author       = {Alessandro Distefano and
                  Gianluigi Me},
  title        = {An overall assessment of Mobile Internal Acquisition Tool},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S121--S127},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.010},
  doi          = {10.1016/J.DIIN.2008.05.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DistefanoM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dolan-Gavitt08,
  author       = {Brendan Dolan{-}Gavitt},
  title        = {Forensic analysis of the Windows registry in memory},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S26--S32},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.003},
  doi          = {10.1016/J.DIIN.2008.05.003},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Dolan-Gavitt08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dongen08,
  author       = {Wouter S. van Dongen},
  title        = {Case study: Forensic analysis of a Samsung digital video recorder},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {19--28},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.04.001},
  doi          = {10.1016/J.DIIN.2008.04.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Dongen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HargreavesCT08,
  author       = {Christopher James Hargreaves and
                  Howard Chivers and
                  Dave Titheridge},
  title        = {Windows Vista and digital investigations},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {34--48},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.08.001},
  doi          = {10.1016/J.DIIN.2008.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HargreavesCT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hilley08,
  author       = {Sarah Hilley},
  title        = {News},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {3--5},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.08.003},
  doi          = {10.1016/J.DIIN.2008.08.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hilley08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalHFD08,
  author       = {Farkhund Iqbal and
                  Rachid Hadjidj and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {A novel approach of mining write-prints for authorship attribution
                  in e-mail forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S42--S51},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.001},
  doi          = {10.1016/J.DIIN.2008.05.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IqbalHFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JoycePA08,
  author       = {Robert A. Joyce and
                  Judson Powers and
                  Frank Adelstein},
  title        = {{MEGA:} {A} tool for Mac {OS} {X} operating system and application
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S83--S90},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.011},
  doi          = {10.1016/J.DIIN.2008.05.011},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JoycePA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Kornblum08,
  author       = {Jesse D. Kornblum},
  title        = {Using {JPEG} quantization tables to identify imagery processed by
                  software},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S21--S25},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.004},
  doi          = {10.1016/J.DIIN.2008.05.004},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Kornblum08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeUH08,
  author       = {Jooyoung Lee and
                  Sung{-}Kyong Un and
                  Dowon Hong},
  title        = {High-speed search using Tarari content processor in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S91--S95},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.006},
  doi          = {10.1016/J.DIIN.2008.05.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeUH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LewthwaiteS08,
  author       = {Joseph Lewthwaite and
                  Victoria Smith},
  title        = {Limewire examinations},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S96--S104},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.017},
  doi          = {10.1016/J.DIIN.2008.05.017},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LewthwaiteS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Morgan08,
  author       = {Timothy D. Morgan},
  title        = {Recovering deleted data from the Windows registry},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S33--S41},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.002},
  doi          = {10.1016/J.DIIN.2008.05.002},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Morgan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nutter08,
  author       = {Beverley Nutter},
  title        = {Pinpointing TomTom location records: {A} forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {10--18},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.06.003},
  doi          = {10.1016/J.DIIN.2008.06.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nutter08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PalSM08,
  author       = {Anandabrata Pal and
                  Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Detecting file fragmentation point using sequential hypothesis testing},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S2--S13},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.015},
  doi          = {10.1016/J.DIIN.2008.05.015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PalSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schuster08,
  author       = {Andreas Schuster},
  title        = {The impact of Microsoft Windows pool allocation strategies on memory
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S58--S64},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.007},
  doi          = {10.1016/J.DIIN.2008.05.007},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schuster08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schwerha08,
  author       = {Joseph J. Schwerha IV},
  title        = {Why computer forensic professionals shouldn't be required to have
                  private investigator licenses},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {71--72},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.08.004},
  doi          = {10.1016/J.DIIN.2008.08.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Schwerha08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SteelL08,
  author       = {Chad M. S. Steel and
                  Chang{-}Tien Lu},
  title        = {Impersonator identification through dynamic fingerprinting},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {60--70},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.03.001},
  doi          = {10.1016/J.DIIN.2008.03.001},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SteelL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThonnardD08,
  author       = {Olivier Thonnard and
                  Marc Dacier},
  title        = {A framework for attack patterns' discovery in honeynet data},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S128--S139},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.012},
  doi          = {10.1016/J.DIIN.2008.05.012},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThonnardD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WardwellS08,
  author       = {James Wardwell and
                  G. Stevenson Smith},
  title        = {Recovering erased digital evidence from {CD-RW} discs in a child exploitation
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {6--9},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.06.002},
  doi          = {10.1016/J.DIIN.2008.06.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WardwellS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AdelsteinJ07,
  author       = {Frank Adelstein and
                  Robert A. Joyce},
  title        = {File Marshal: Automatic extraction of peer-to-peer data},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {43--48},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.016},
  doi          = {10.1016/J.DIIN.2007.06.016},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AdelsteinJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArastehD07,
  author       = {Ali Reza Arasteh and
                  Mourad Debbabi},
  title        = {Forensic memory analysis: From stack and code to execution history},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {114--125},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.010},
  doi          = {10.1016/J.DIIN.2007.06.010},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ArastehD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArastehDSS07,
  author       = {Ali Reza Arasteh and
                  Mourad Debbabi and
                  Assaad Sakha and
                  Mohamed Mostafa Saleh},
  title        = {Analyzing multiple logs for forensic evidence},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {82--91},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.013},
  doi          = {10.1016/J.DIIN.2007.06.013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ArastehDSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BarikGSMM07,
  author       = {Mridul Sankar Barik and
                  Gaurav Gupta and
                  Shubhro Sinha and
                  Alok Mishra and
                  Chandan Mazumdar},
  title        = {An efficient technique for enhancing forensic capabilities of Ext2
                  file system},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {55--61},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.007},
  doi          = {10.1016/J.DIIN.2007.06.007},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BarikGSMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeebeC07,
  author       = {Nicole Lang Beebe and
                  Jan Guynes Clark},
  title        = {Digital forensic text string searching: Improving information retrieval
                  effectiveness by thematically clustering search results},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {49--54},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.005},
  doi          = {10.1016/J.DIIN.2007.06.005},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeebeC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BuchholzT07,
  author       = {Florian P. Buchholz and
                  Brett C. Tjaden},
  title        = {A brief study of time},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {31--42},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.004},
  doi          = {10.1016/J.DIIN.2007.06.004},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BuchholzT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey07,
  author       = {Eoghan Casey},
  title        = {Digital evidence maps - {A} sign of the times},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {1},
  pages        = {1--2},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.01.004},
  doi          = {10.1016/J.DIIN.2007.01.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey07a,
  author       = {Eoghan Casey},
  title        = {What does "forensically sound" really mean?},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {2},
  pages        = {49--50},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.05.001},
  doi          = {10.1016/J.DIIN.2007.05.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey07b,
  author       = {Eoghan Casey},
  title        = {Attacks against forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {105--106},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2008.01.001},
  doi          = {10.1016/J.DIIN.2008.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Cohen07,
  author       = {Michael I. Cohen},
  title        = {Advanced carving techniques},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {119--128},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.10.001},
  doi          = {10.1016/J.DIIN.2007.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Cohen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dickson07,
  author       = {Mike Dickson},
  title        = {An examination into Trillian basic 3.x contact identification},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {1},
  pages        = {36--45},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.01.003},
  doi          = {10.1016/J.DIIN.2007.01.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Dickson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dolan-Gavitt07,
  author       = {Brendan Dolan{-}Gavitt},
  title        = {The {VAD} tree: {A} process-eye view of physical memory},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {62--64},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.008},
  doi          = {10.1016/J.DIIN.2007.06.008},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Dolan-Gavitt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dongen07,
  author       = {Wouter S. van Dongen},
  title        = {Forensic artefacts left by Windows Live Messenger 8.0},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {2},
  pages        = {73--87},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.019},
  doi          = {10.1016/J.DIIN.2007.06.019},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Dongen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dongen07a,
  author       = {Wouter S. van Dongen},
  title        = {Forensic artefacts left by Pidgin Messenger 2.0},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {138--145},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2008.01.002},
  doi          = {10.1016/J.DIIN.2008.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Dongen07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fellows07,
  author       = {Geoff Fellows},
  title        = {{NTFS} volume mounts, directory junctions and {\textdollar}Reparse},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {116--118},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.07.002},
  doi          = {10.1016/J.DIIN.2007.07.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fellows07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel07,
  author       = {Simson L. Garfinkel},
  title        = {Carving contiguous and fragmented files with fast object validation},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {2--12},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.017},
  doi          = {10.1016/J.DIIN.2007.06.017},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Harms07,
  author       = {Kris Harms},
  title        = {Corrigendum to "Forensic analysis of System Restore points in Microsoft
                  Windows XP" [Digit Investig 3 {(3)} {(2006)} 151-158]},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {165},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.08.001},
  doi          = {10.1016/J.DIIN.2007.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Harms07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hilley07,
  author       = {Sarah Hilley},
  title        = {Anti-forensics with a small army of exploits},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {1},
  pages        = {13--15},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.01.005},
  doi          = {10.1016/J.DIIN.2007.01.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hilley07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hilley07a,
  author       = {Sarah Hilley},
  title        = {News},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {107--110},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.07.004},
  doi          = {10.1016/J.DIIN.2007.07.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hilley07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hilley07b,
  author       = {Sarah Hilley},
  title        = {News},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {110--112},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.11.002},
  doi          = {10.1016/J.DIIN.2007.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hilley07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HuebnerBHW07,
  author       = {Ewa Huebner and
                  Derek Bem and
                  Frans A. Henskens and
                  Mark Wallis},
  title        = {Persistent systems techniques in forensic acquisition of memory},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {129--137},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2008.02.001},
  doi          = {10.1016/J.DIIN.2008.02.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HuebnerBHW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhanCY07,
  author       = {M. N. A. Khan and
                  Chris R. Chatwin and
                  Rupert C. D. Young},
  title        = {A framework for post-event timeline reconstruction using neural networks},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {3-4},
  pages        = {146--157},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.11.001},
  doi          = {10.1016/J.DIIN.2007.11.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhanCY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Kornblum07,
  author       = {Jesse D. Kornblum},
  title        = {Using every part of the buffalo in Windows memory analysis},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {1},
  pages        = {24--29},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2006.12.002},
  doi          = {10.1016/J.DIIN.2006.12.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Kornblum07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics