Search dblp for Publications

export results for "toc:db/journals/jdfsl/jdfsl16.bht:"

 download as .bib file

@article{DBLP:journals/jdfsl/AsanteA21,
  author       = {Audrey Asante and
                  Vincent Amankona},
  title        = {Digital Forensic Readiness Framework based on Honeypot and Honeynet
                  for {BYOD}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1706},
  doi          = {10.58940/1558-7223.1706},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AsanteA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BoozerJM21,
  author       = {Abel Alex Boozer and
                  Arun John and
                  Tathagata Mukherjee},
  title        = {Internet of Things Software and Hardware Architectures and Their Impacts
                  on Forensic Investigations: Current Approaches and Challenges},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1759},
  doi          = {10.58940/1558-7223.1759},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BoozerJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HopkinsR21,
  author       = {Brandon J. Hopkins and
                  Kevin A. Riggle},
  title        = {An Economical Method for Securely Disintegrating Solid-State Drives
                  Using Blenders},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1681},
  doi          = {10.58940/1558-7223.1681},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HopkinsR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kara21,
  author       = {Ilker Kara},
  title        = {Don't Bite the Bait: Phishing Attack for Internet Banking (E-Banking)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1743},
  doi          = {10.58940/1558-7223.1743},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kara21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Korkin21,
  author       = {Igor Korkin},
  title        = {Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the
                  Rescue Again},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1726},
  doi          = {10.58940/1558-7223.1726},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Korkin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Olber21,
  author       = {Pawel Olber},
  title        = {The survey on cross-border collection of digital evidence by representatives
                  from Polish prosecutors' offices and judicial authorities},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1700},
  doi          = {10.58940/1558-7223.1700},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Olber21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/OrunsoluSKB21,
  author       = {Abdul Abiodun Orunsolu and
                  Adesina S. Sodiya and
                  Sakiru Oluyemi Kareem and
                  Oladimeji G. B},
  title        = {Performance Assessment of some Phishing predictive models based on
                  Minimal Feature corpus},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1692},
  doi          = {10.58940/1558-7223.1692},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/OrunsoluSKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics