Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/di/di7.bht:"
@article{DBLP:journals/di/BandayMQS11, author = {M. Tariq Banday and Farooq A. Mir and Jameel A. Qadri and Nisar Ahmed Shah}, title = {Analyzing Internet e-mail date-spoofing}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {145--153}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.11.001}, doi = {10.1016/J.DIIN.2010.11.001}, timestamp = {Tue, 03 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BandayMQS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BangYL11, author = {Jewan Bang and Byeongyeong Yoo and Sangjin Lee}, title = {Analysis of changes in file time attributes with file manipulation}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {135--144}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.12.001}, doi = {10.1016/J.DIIN.2010.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BangYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey11, author = {Eoghan Casey}, title = {The increasing need for automation and validation in digital forensics}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {103--104}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.02.002}, doi = {10.1016/J.DIIN.2011.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChiversH11, author = {Howard Chivers and Christopher James Hargreaves}, title = {Forensic data recovery from the Windows Search Database}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {114--126}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.01.001}, doi = {10.1016/J.DIIN.2011.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChiversH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HsuSC11, author = {Hsien{-}Ming Hsu and Yeali S. Sun and Meng Chang Chen}, title = {Collaborative scheme for VoIP traceback}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {185--195}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.10.003}, doi = {10.1016/J.DIIN.2010.10.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HsuSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Hunton11, author = {Paul Hunton}, title = {A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a {UK} law enforcement environment}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {105--113}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.01.002}, doi = {10.1016/J.DIIN.2011.01.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Hunton11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LallieB11, author = {Harjinder Singh Lallie and Philip James Briggs}, title = {Windows 7 registry forensic evidence created by three popular BitTorrent clients}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {127--134}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.10.002}, doi = {10.1016/J.DIIN.2010.10.002}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LallieB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LouisE11, author = {A. L. Louis and Andries P. Engelbrecht}, title = {Unsupervised discovery of relations for analysis of textual data}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {154--171}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.08.004}, doi = {10.1016/J.DIIN.2010.08.004}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LouisE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PhamSH11, author = {Dung Vu Pham and Ali Syed and Malka N. Halgamuge}, title = {Universal serial bus based software attacks and protection solutions}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {172--184}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.02.001}, doi = {10.1016/J.DIIN.2011.02.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PhamSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Axelsson10, author = {Stefan Axelsson}, title = {The Normalised Compression Distance as a file fragment classifier}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S24--S31}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.004}, doi = {10.1016/J.DIIN.2010.05.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Axelsson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BangYL10, author = {Jewan Bang and Byeongyeong Yoo and Sangjin Lee}, title = {Secure {USB} bypassing tool}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S114--S120}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.014}, doi = {10.1016/J.DIIN.2010.05.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BangYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Carrier10, author = {Brian D. Carrier}, title = {Different interpretations of {ISO9660} file systems}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S129--S134}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.016}, doi = {10.1016/J.DIIN.2010.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Carrier10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMNR10, author = {Andrew Case and Lodovico Marziale and Cris Neckar and Golden G. Richard III}, title = {Treasure and tragedy in \emph{kmem{\_}cache} mining for live forensics investigation}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S41--S47}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.006}, doi = {10.1016/J.DIIN.2010.05.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMR10, author = {Andrew Case and Lodovico Marziale and Golden G. Richard III}, title = {Dynamic recreation of kernel data structures for live forensics}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S32--S40}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.005}, doi = {10.1016/J.DIIN.2010.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey10a, author = {Eoghan Casey}, title = {Digital investigations, security and privacy}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.10.001}, doi = {10.1016/J.DIIN.2010.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChengL10, author = {Fa{-}Chang Cheng and Wen{-}Hsing Lai}, title = {An overview of VoIP and {P2P} copyright and lawful-interception issues in the United States and Taiwan}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {81--89}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.08.001}, doi = {10.1016/J.DIIN.2010.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChengL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CohenS10, author = {Michael Cohen and Bradley L. Schatz}, title = {Hash based disk imaging using {AFF4}}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S121--S128}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.015}, doi = {10.1016/J.DIIN.2010.05.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CohenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ContiBSSRSLP10, author = {Gregory J. Conti and Sergey Bratus and Anna Shubina and Benjamin Sangster and Roy Ragsdale and Matthew Supan and Andrew Lichtenberg and Robert Perez{-}Alemany}, title = {Automated mapping of large binary objects using primitive fragment type classification}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S3--S12}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.002}, doi = {10.1016/J.DIIN.2010.05.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ContiBSSRSLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CroftO10, author = {Neil J. Croft and Martin S. Olivier}, title = {Sequenced release of privacy-accurate information in a forensic investigation}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {95--101}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.01.002}, doi = {10.1016/J.DIIN.2010.01.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CroftO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DistefanoMP10, author = {Alessandro Distefano and Gianluigi Me and Francesco Pace}, title = {Android anti-forensics through a local paradigm}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S83--S94}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.011}, doi = {10.1016/J.DIIN.2010.05.011}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DistefanoMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fellows10, author = {Geoffrey Fellows}, title = {WinRAR temporary folder artefacts}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {9--13}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2009.12.001}, doi = {10.1016/J.DIIN.2009.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fellows10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel10, author = {Simson L. Garfinkel}, title = {Digital forensics research: The next 10 years}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S64--S73}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.009}, doi = {10.1016/J.DIIN.2010.05.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Garfinkel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelNWR10, author = {Simson L. Garfinkel and Alex J. Nelson and Douglas White and Vassil Roussev}, title = {Using purpose-built functions and block hashes to enable small block and sub-file forensics}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S13--S23}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.003}, doi = {10.1016/J.DIIN.2010.05.003}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GarfinkelNWR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Gogolin10, author = {Greg Gogolin}, title = {The Digital Crime Tsunami}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {3--8}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.07.001}, doi = {10.1016/J.DIIN.2010.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Gogolin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IqbalBFD10, author = {Farkhund Iqbal and Hamad Binsalleeh and Benjamin C. M. Fung and Mourad Debbabi}, title = {Mining writeprints from anonymous e-mails for forensic investigation}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {56--64}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.03.003}, doi = {10.1016/J.DIIN.2010.03.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IqbalBFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhanBY10, author = {Liaqat Ali Khan and Muhammad Shamim Baig and Amr M. Youssef}, title = {Speaker recognition from encrypted VoIP communications}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {65--73}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2009.10.001}, doi = {10.1016/J.DIIN.2009.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhanBY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhanIB10, author = {Liaqat Ali Khan and Farkhund Iqbal and Muhammad Shamim Baig}, title = {Speaker verification from partially encrypted compressed speech for forensic investigation}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {74--80}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.03.002}, doi = {10.1016/J.DIIN.2010.03.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhanIB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LiberatoreEKLS10, author = {Marc Liberatore and Robert Erdely and Thomas Kerle and Brian Neil Levine and Clay Shields}, title = {Forensic investigation of peer-to-peer file sharing networks}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S95--S103}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.012}, doi = {10.1016/J.DIIN.2010.05.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LiberatoreEKLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lyle10, author = {James R. Lyle}, title = {If \emph{error rate} is such a simple concept, why don't {I} have one for my forensic tool yet?}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S135--S139}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.017}, doi = {10.1016/J.DIIN.2010.05.017}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Lyle10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OkolicaP10, author = {James S. Okolica and Gilbert L. Peterson}, title = {Windows operating systems agnostic memory analysis}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S48--S56}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.007}, doi = {10.1016/J.DIIN.2010.05.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OkolicaP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PilliJN10, author = {Emmanuel S. Pilli and Ramesh C. Joshi and Rajdeep Niyogi}, title = {Network forensic frameworks: Survey and research challenges}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {14--27}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.02.003}, doi = {10.1016/J.DIIN.2010.02.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PilliJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Rehault10, author = {Frederick Rehault}, title = {Windows mobile advanced forensics: An alternative to existing tools}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {38--47}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.08.003}, doi = {10.1016/J.DIIN.2010.08.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Rehault10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SaurG10, author = {Karla Saur and Julian B. Grizzard}, title = {Locating {\texttimes}86 paging structures in memory images}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {28--37}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.08.002}, doi = {10.1016/J.DIIN.2010.08.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SaurG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShebaroPC10, author = {Bilal Shebaro and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Jedidiah R. Crandall}, title = {Leaving timing-channel fingerprints in hidden service log files}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S104--S113}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.013}, doi = {10.1016/J.DIIN.2010.05.013}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShebaroPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StevensC10, author = {Richard M. Stevens and Eoghan Casey}, title = {Extracting Windows command line details from physical memory}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S57--S63}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.008}, doi = {10.1016/J.DIIN.2010.05.008}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StevensC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThingNC10, author = {Vrizlynn L. L. Thing and Kian{-}Yong Ng and Ee{-}Chien Chang}, title = {Live memory forensics of mobile phones}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S74--S82}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.010}, doi = {10.1016/J.DIIN.2010.05.010}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThingNC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/XuYXXZ10, author = {Ming Xu and Hong{-}Rong Yang and Jian Xu and Ye Xu and Ning Zheng}, title = {An adaptive method to identify disk cluster size based on block content}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {48--55}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.01.003}, doi = {10.1016/J.DIIN.2010.01.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/XuYXXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YasinCK10, author = {Muhammad Yasin and Ahmad R. Cheema and Firdous Kausar}, title = {Analysis of Internet Download Manager for collection of digital forensic artefacts}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {90--94}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.08.005}, doi = {10.1016/J.DIIN.2010.08.005}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/YasinCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.