Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jdfsl/jdfsl1.bht:"
@article{DBLP:journals/jdfsl/AlbrechtAWF06, author = {Chad Albrecht and Conan C. Albrecht and Jonathan Wareham and Paul B. Fox}, title = {The Role of Power and Negotiation in Online Deception}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {29--48}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1012}, doi = {10.15394/JDFSL.2006.1012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AlbrechtAWF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BagbyR06, author = {John W. Bagby and John C. Ruhnka}, title = {Electronic Data Discovery: Integrating Due Process into Cyber Forensic Practice}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {1}, pages = {5--24}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1000}, doi = {10.15394/JDFSL.2006.1000}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BagbyR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BagbyR06a, author = {John W. Bagby and John C. Ruhnka}, title = {Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {39--74}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1005}, doi = {10.15394/JDFSL.2006.1005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BagbyR06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JansenA06, author = {Wayne A. Jansen and Rick Ayers}, title = {Forensic Tools for Mobile Phone Subscriber Identity Modules}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {75--94}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1006}, doi = {10.15394/JDFSL.2006.1006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JansenA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVST06, author = {Andy Jones and Craig Valli and Iain Sutherland and Paula Thomas}, title = {The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {23--36}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1008}, doi = {10.15394/JDFSL.2006.1008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kearns06, author = {Grover S. Kearns}, title = {A Curriculum for Teaching Information Technology Investigative Techniques for Auditors}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {9--28}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1011}, doi = {10.15394/JDFSL.2006.1011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kearns06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler06, author = {Gary C. Kessler}, title = {Book Review: Digital Crime and Forensic Science in Cyberspace}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {67--70}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1014}, doi = {10.15394/JDFSL.2006.1014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KesslerS06, author = {Gary C. Kessler and Michael E. Schirling}, title = {The Design of an Undergraduate Degree Program in Computer {\&} Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {37--50}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1009}, doi = {10.15394/JDFSL.2006.1009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KesslerS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MorfittV06, author = {Kim Morfitt and Craig Valli}, title = {A Forensic Log File Extraction Tool for {ICQ} Instant Messaging Clients}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {51--64}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1010}, doi = {10.15394/JDFSL.2006.1010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MorfittV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RogersGMWD06, author = {Marcus K. Rogers and James Goldman and Richard Mislan and Timothy Wedge and Steve Debrota}, title = {Computer Forensics Field Triage Process Model}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {19--38}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1004}, doi = {10.15394/JDFSL.2006.1004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RogersGMWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SlayS06, author = {Jill Slay and Fiona Schulz}, title = {Development of an Ontology Based Forensic Search Mechanism: Proof of Concept}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {1}, pages = {25--44}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1002}, doi = {10.15394/JDFSL.2006.1002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SlayS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SongLHMCC06, author = {Il{-}Yeol Song and Ki Jung Lee and Xiaohua Hu and John D. Maguire and Namyoun Choi and Peter P. Chen}, title = {Designing a Data Warehouse for Cyber Crimes}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {5--22}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1007}, doi = {10.15394/JDFSL.2006.1007}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SongLHMCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Stahl06, author = {Bernd Carsten Stahl}, title = {Is Forensic Computing a Profession? Revisiting an Old Debate in a New Field}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {49--66}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1043}, doi = {10.15394/JDFSL.2006.1043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Stahl06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TanriverdiHMBHH06, author = {H{\"{u}}seyin Tanriverdi and Jonathan Harrison and Ketan S. Mesuria and Joshua Bertsch and Po{-}Ling Hsiao and David Hendrawirawan}, title = {AlphaCo: {A} Teaching Case on Information Technology Audit and Security}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {1}, pages = {45--68}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1001}, doi = {10.15394/JDFSL.2006.1001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TanriverdiHMBHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/WeiserBM06, author = {Mark Weiser and David P. Biros and Greg Mosier}, title = {Development of a National Repository of Digital Forensic Intelligence}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {5--18}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1003}, doi = {10.15394/JDFSL.2006.1003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/WeiserBM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.