Search dblp for Publications

export results for "toc:db/journals/di/di7.bht:"

 download as .bib file

@article{DBLP:journals/di/BandayMQS11,
  author       = {M. Tariq Banday and
                  Farooq A. Mir and
                  Jameel A. Qadri and
                  Nisar Ahmed Shah},
  title        = {Analyzing Internet e-mail date-spoofing},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {145--153},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.11.001},
  doi          = {10.1016/J.DIIN.2010.11.001},
  timestamp    = {Tue, 03 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BandayMQS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BangYL11,
  author       = {Jewan Bang and
                  Byeongyeong Yoo and
                  Sangjin Lee},
  title        = {Analysis of changes in file time attributes with file manipulation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {135--144},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.12.001},
  doi          = {10.1016/J.DIIN.2010.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BangYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey11,
  author       = {Eoghan Casey},
  title        = {The increasing need for automation and validation in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {103--104},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.02.002},
  doi          = {10.1016/J.DIIN.2011.02.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChiversH11,
  author       = {Howard Chivers and
                  Christopher James Hargreaves},
  title        = {Forensic data recovery from the Windows Search Database},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {114--126},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.01.001},
  doi          = {10.1016/J.DIIN.2011.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChiversH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HsuSC11,
  author       = {Hsien{-}Ming Hsu and
                  Yeali S. Sun and
                  Meng Chang Chen},
  title        = {Collaborative scheme for VoIP traceback},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {185--195},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.10.003},
  doi          = {10.1016/J.DIIN.2010.10.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HsuSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hunton11,
  author       = {Paul Hunton},
  title        = {A rigorous approach to formalising the technical investigation stages
                  of cybercrime and criminality within a {UK} law enforcement environment},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {105--113},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.01.002},
  doi          = {10.1016/J.DIIN.2011.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hunton11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LallieB11,
  author       = {Harjinder Singh Lallie and
                  Philip James Briggs},
  title        = {Windows 7 registry forensic evidence created by three popular BitTorrent
                  clients},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {127--134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.10.002},
  doi          = {10.1016/J.DIIN.2010.10.002},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LallieB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LouisE11,
  author       = {A. L. Louis and
                  Andries P. Engelbrecht},
  title        = {Unsupervised discovery of relations for analysis of textual data},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {154--171},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2010.08.004},
  doi          = {10.1016/J.DIIN.2010.08.004},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LouisE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PhamSH11,
  author       = {Dung Vu Pham and
                  Ali Syed and
                  Malka N. Halgamuge},
  title        = {Universal serial bus based software attacks and protection solutions},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {172--184},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.02.001},
  doi          = {10.1016/J.DIIN.2011.02.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PhamSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Axelsson10,
  author       = {Stefan Axelsson},
  title        = {The Normalised Compression Distance as a file fragment classifier},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S24--S31},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.004},
  doi          = {10.1016/J.DIIN.2010.05.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Axelsson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BangYL10,
  author       = {Jewan Bang and
                  Byeongyeong Yoo and
                  Sangjin Lee},
  title        = {Secure {USB} bypassing tool},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S114--S120},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.014},
  doi          = {10.1016/J.DIIN.2010.05.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BangYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Carrier10,
  author       = {Brian D. Carrier},
  title        = {Different interpretations of {ISO9660} file systems},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S129--S134},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.016},
  doi          = {10.1016/J.DIIN.2010.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Carrier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMNR10,
  author       = {Andrew Case and
                  Lodovico Marziale and
                  Cris Neckar and
                  Golden G. Richard III},
  title        = {Treasure and tragedy in \emph{kmem{\_}cache} mining for live forensics
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S41--S47},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.006},
  doi          = {10.1016/J.DIIN.2010.05.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMR10,
  author       = {Andrew Case and
                  Lodovico Marziale and
                  Golden G. Richard III},
  title        = {Dynamic recreation of kernel data structures for live forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S32--S40},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.005},
  doi          = {10.1016/J.DIIN.2010.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey10a,
  author       = {Eoghan Casey},
  title        = {Digital investigations, security and privacy},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.10.001},
  doi          = {10.1016/J.DIIN.2010.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChengL10,
  author       = {Fa{-}Chang Cheng and
                  Wen{-}Hsing Lai},
  title        = {An overview of VoIP and {P2P} copyright and lawful-interception issues
                  in the United States and Taiwan},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {81--89},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.001},
  doi          = {10.1016/J.DIIN.2010.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChengL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CohenS10,
  author       = {Michael Cohen and
                  Bradley L. Schatz},
  title        = {Hash based disk imaging using {AFF4}},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S121--S128},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.015},
  doi          = {10.1016/J.DIIN.2010.05.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CohenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ContiBSSRSLP10,
  author       = {Gregory J. Conti and
                  Sergey Bratus and
                  Anna Shubina and
                  Benjamin Sangster and
                  Roy Ragsdale and
                  Matthew Supan and
                  Andrew Lichtenberg and
                  Robert Perez{-}Alemany},
  title        = {Automated mapping of large binary objects using primitive fragment
                  type classification},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S3--S12},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.002},
  doi          = {10.1016/J.DIIN.2010.05.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ContiBSSRSLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CroftO10,
  author       = {Neil J. Croft and
                  Martin S. Olivier},
  title        = {Sequenced release of privacy-accurate information in a forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {95--101},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.002},
  doi          = {10.1016/J.DIIN.2010.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CroftO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DistefanoMP10,
  author       = {Alessandro Distefano and
                  Gianluigi Me and
                  Francesco Pace},
  title        = {Android anti-forensics through a local paradigm},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S83--S94},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.011},
  doi          = {10.1016/J.DIIN.2010.05.011},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DistefanoMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fellows10,
  author       = {Geoffrey Fellows},
  title        = {WinRAR temporary folder artefacts},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {9--13},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2009.12.001},
  doi          = {10.1016/J.DIIN.2009.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fellows10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel10,
  author       = {Simson L. Garfinkel},
  title        = {Digital forensics research: The next 10 years},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S64--S73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.009},
  doi          = {10.1016/J.DIIN.2010.05.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelNWR10,
  author       = {Simson L. Garfinkel and
                  Alex J. Nelson and
                  Douglas White and
                  Vassil Roussev},
  title        = {Using purpose-built functions and block hashes to enable small block
                  and sub-file forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S13--S23},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.003},
  doi          = {10.1016/J.DIIN.2010.05.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelNWR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Gogolin10,
  author       = {Greg Gogolin},
  title        = {The Digital Crime Tsunami},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {3--8},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.07.001},
  doi          = {10.1016/J.DIIN.2010.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Gogolin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalBFD10,
  author       = {Farkhund Iqbal and
                  Hamad Binsalleeh and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {Mining writeprints from anonymous e-mails for forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {56--64},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.03.003},
  doi          = {10.1016/J.DIIN.2010.03.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IqbalBFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhanBY10,
  author       = {Liaqat Ali Khan and
                  Muhammad Shamim Baig and
                  Amr M. Youssef},
  title        = {Speaker recognition from encrypted VoIP communications},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {65--73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2009.10.001},
  doi          = {10.1016/J.DIIN.2009.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhanBY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhanIB10,
  author       = {Liaqat Ali Khan and
                  Farkhund Iqbal and
                  Muhammad Shamim Baig},
  title        = {Speaker verification from partially encrypted compressed speech for
                  forensic investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {74--80},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.03.002},
  doi          = {10.1016/J.DIIN.2010.03.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KhanIB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LiberatoreEKLS10,
  author       = {Marc Liberatore and
                  Robert Erdely and
                  Thomas Kerle and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {Forensic investigation of peer-to-peer file sharing networks},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S95--S103},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.012},
  doi          = {10.1016/J.DIIN.2010.05.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LiberatoreEKLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lyle10,
  author       = {James R. Lyle},
  title        = {If \emph{error rate} is such a simple concept, why don't {I} have
                  one for my forensic tool yet?},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S135--S139},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.017},
  doi          = {10.1016/J.DIIN.2010.05.017},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Lyle10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OkolicaP10,
  author       = {James S. Okolica and
                  Gilbert L. Peterson},
  title        = {Windows operating systems agnostic memory analysis},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S48--S56},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.007},
  doi          = {10.1016/J.DIIN.2010.05.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OkolicaP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PilliJN10,
  author       = {Emmanuel S. Pilli and
                  Ramesh C. Joshi and
                  Rajdeep Niyogi},
  title        = {Network forensic frameworks: Survey and research challenges},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {14--27},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.02.003},
  doi          = {10.1016/J.DIIN.2010.02.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PilliJN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Rehault10,
  author       = {Frederick Rehault},
  title        = {Windows mobile advanced forensics: An alternative to existing tools},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {38--47},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.003},
  doi          = {10.1016/J.DIIN.2010.08.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Rehault10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SaurG10,
  author       = {Karla Saur and
                  Julian B. Grizzard},
  title        = {Locating {\texttimes}86 paging structures in memory images},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {28--37},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.002},
  doi          = {10.1016/J.DIIN.2010.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SaurG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShebaroPC10,
  author       = {Bilal Shebaro and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Jedidiah R. Crandall},
  title        = {Leaving timing-channel fingerprints in hidden service log files},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S104--S113},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.013},
  doi          = {10.1016/J.DIIN.2010.05.013},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShebaroPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StevensC10,
  author       = {Richard M. Stevens and
                  Eoghan Casey},
  title        = {Extracting Windows command line details from physical memory},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S57--S63},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.008},
  doi          = {10.1016/J.DIIN.2010.05.008},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StevensC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThingNC10,
  author       = {Vrizlynn L. L. Thing and
                  Kian{-}Yong Ng and
                  Ee{-}Chien Chang},
  title        = {Live memory forensics of mobile phones},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S74--S82},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.010},
  doi          = {10.1016/J.DIIN.2010.05.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThingNC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/XuYXXZ10,
  author       = {Ming Xu and
                  Hong{-}Rong Yang and
                  Jian Xu and
                  Ye Xu and
                  Ning Zheng},
  title        = {An adaptive method to identify disk cluster size based on block content},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {48--55},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.01.003},
  doi          = {10.1016/J.DIIN.2010.01.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/XuYXXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YasinCK10,
  author       = {Muhammad Yasin and
                  Ahmad R. Cheema and
                  Firdous Kausar},
  title        = {Analysis of Internet Download Manager for collection of digital forensic
                  artefacts},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {1-2},
  pages        = {90--94},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.08.005},
  doi          = {10.1016/J.DIIN.2010.08.005},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YasinCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics