Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/di/di26.bht:"
@article{DBLP:journals/di/Al-kawazCFL18, author = {Hiba Al{-}Kawaz and Nathan L. Clarke and Steven Furnell and Fudong Li}, title = {Facial-Forensic Analysis Tool}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S136}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.008}, doi = {10.1016/J.DIIN.2018.04.008}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-kawazCFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AwasthiRXS18, author = {Akshay Awasthi and Huw Read and Konstantinos Xynos and Iain Sutherland}, title = {Welcome pwn: Almond smart home hub forensics}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S38--S46}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.014}, doi = {10.1016/J.DIIN.2018.04.014}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AwasthiRXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaninD18, author = {Sergii Banin and Geir Olav Dyrkolbotn}, title = {Multinomial malware classification via low-level features}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S107--S117}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.019}, doi = {10.1016/J.DIIN.2018.04.019}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaninD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BhattA18, author = {Manish Bhatt and Irfan Ahmed}, title = {Leveraging relocations in ELF-binaries for Linux kernel version identification}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S12--S20}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.022}, doi = {10.1016/J.DIIN.2018.04.022}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BhattA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrajedaSBCB18, author = {Cinthya Grajeda and Laura S{\'{a}}nchez and Ibrahim M. Baggili and Devon Clark and Frank Breitinger}, title = {Experience constructing the Artifact Genome Project {(AGP):} Managing the domain's knowledge one artifact at a time}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S47--S58}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.021}, doi = {10.1016/J.DIIN.2018.04.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrajedaSBCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLY18, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Shujian Yang}, title = {Forensic analysis of multiple device {BTRFS} configurations using The Sleuth Kit}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S21--S29}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.020}, doi = {10.1016/J.DIIN.2018.04.020}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman18a, author = {Graeme Horsman}, title = {Reconstructing streamed video content: {A} case study on YouTube and Facebook Live stream content in the Chrome web browser cache}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S30--S37}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.017}, doi = {10.1016/J.DIIN.2018.04.017}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KaoCS18, author = {Da{-}Yu Kao and Yuanpei Chen and Neng{-}Hsin Shih}, title = {Reconstructing {ADS} data hiding in windows {NTFS:} {A} temporal analysis}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S137}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.009}, doi = {10.1016/J.DIIN.2018.04.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KaoCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KouwenSCL18, author = {Arie Kouwen and Mark Scanlon and Kim{-}Kwang Raymond Choo and Nhien{-}An Le{-}Khac}, title = {Digital forensic investigation of two-way radio communication equipment and services}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S77--S86}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.007}, doi = {10.1016/J.DIIN.2018.04.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KouwenSCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LambertzHS18, author = {Martin Lambertz and Jan{-}Niclas Hilgert and Roman Schell}, title = {Resurrecting Portable Network Graphics using block generators}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S138}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.010}, doi = {10.1016/J.DIIN.2018.04.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LambertzHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeBNS18, author = {Quan Le and Ois{\'{\i}}n Boydell and Brian Mac Namee and Mark Scanlon}, title = {Deep learning at the shallow end: Malware classification for non-domain experts}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S118--S126}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.024}, doi = {10.1016/J.DIIN.2018.04.024}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeBNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LewisCAR18, author = {Nathan Lewis and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Memory forensics and the Windows Subsystem for Linux}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S3--S11}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.018}, doi = {10.1016/J.DIIN.2018.04.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LewisCAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LinCZYW18, author = {Xiaodong Lin and Ting Chen and Tong Zhu and Kun Yang and Fengguo Wei}, title = {Automated forensic analysis of mobile applications on Android devices}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S59--S66}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.012}, doi = {10.1016/J.DIIN.2018.04.012}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LinCZYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MosliYP18, author = {Rayan Mosli and Bo Yuan and Yin Pan}, title = {On the viability of data collection using Google Rapid Response for enterprise-level malware research}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S139}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.011}, doi = {10.1016/J.DIIN.2018.04.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MosliYP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Porter18, author = {Kyle Porter}, title = {Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using {LDA} topic modeling}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S87--S97}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.023}, doi = {10.1016/J.DIIN.2018.04.023}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Porter18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TaubmannAR18, author = {Benjamin Taubmann and Omar Alabduljaleel and Hans P. Reiser}, title = {DroidKex: Fast extraction of ephemeral {TLS} keys from the memory of Android apps}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S67--S76}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.013}, doi = {10.1016/J.DIIN.2018.04.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TaubmannAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThompsonV18, author = {Michael F. Thompson and Timothy Vidas}, title = {Cyber Grand Challenge {(CGC)} monitor: {A} vetting system for the {DARPA} cyber grand challenge}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S127--S135}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.016}, doi = {10.1016/J.DIIN.2018.04.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThompsonV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TuzelBZLT18, author = {Tomasz Tuzel and Mark P. Bridgman and Joshua Zepf and Tamas K. Lengyel and Kyle J. Temkin}, title = {Who watches the watcher? Detecting hypervisor introspection from unprivileged guests}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S98--S106}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.015}, doi = {10.1016/J.DIIN.2018.04.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TuzelBZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.