default search action
Search dblp for Publications
export results for "toc:db/journals/jdfsl/jdfsl4.bht:"
@article{DBLP:journals/jdfsl/BestRT09, author = {Peter J. Best and Pall Rikhardsson and Mark Toleman}, title = {Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {1}, pages = {39--60}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1053}, doi = {10.15394/JDFSL.2009.1053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BestRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BrowningK09, author = {Dennis Browning and Gary C. Kessler}, title = {Bluetooth Hacking: {A} Case Study}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {57--72}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1058}, doi = {10.15394/JDFSL.2009.1058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BrowningK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Chawki09, author = {Mohamed Chawki}, title = {Online Child Sexual Abuse: The French Response}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {7--42}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1164}, doi = {10.15394/JDFSL.2009.1164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Chawki09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cronje09, author = {Francis S. Cronj{\'{e}}}, title = {A Synopsis of Proposed Data Protection Legislation in {SA}}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {43--50}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1165}, doi = {10.15394/JDFSL.2009.1165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cronje09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Fick09, author = {Jacqueline Fick}, title = {Prevention is Better than Prosecution: Deepening the Defence against Cyber Crime}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {51--72}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1166}, doi = {10.15394/JDFSL.2009.1166}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Fick09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Jobodwana09, author = {Z. Ntozintle Jobodwana}, title = {Telecommunications Liberalisation in Africa: Proposed Regulatory Model for the {SADC} Region}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {73--94}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1167}, doi = {10.15394/JDFSL.2009.1167}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Jobodwana09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KahvedzicK09, author = {Damir Kahvedzic and M. Tahar Kechadi}, title = {Correlating Orphaned Windows Registry Data Structures}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {39--56}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1057}, doi = {10.15394/JDFSL.2009.1057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KahvedzicK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kearns09, author = {Grover S. Kearns}, title = {Graduate Accounting Students' Perception of {IT} Forensics: {A} Multi-Dimensional Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {1}, pages = {5--38}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1052}, doi = {10.15394/JDFSL.2009.1052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kearns09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler09, author = {Gary C. Kessler}, title = {Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {57--60}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1163}, doi = {10.15394/JDFSL.2009.1163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KulkarniGNE09, author = {Asawaree Kulkarni and James Goldman and Brad Nabholz and William Eyre}, title = {Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {5--26}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1055}, doi = {10.15394/JDFSL.2009.1055}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KulkarniGNE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoW009, author = {Thomas Lonardo and Doug White and Alan Rea}, title = {To License or Not to License Revisited: An Examination of State Statutes Regarding Private Investigators and Digital Examiners}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {35--56}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1162}, doi = {10.15394/JDFSL.2009.1162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoW009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LuseMT09, author = {Andy Luse and Brian E. Mennecke and Anthony M. Townsend}, title = {Electronic Forms-Based Computing for Evidentiary Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {17--34}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1161}, doi = {10.15394/JDFSL.2009.1161}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LuseMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SmithC09, author = {Stevenson G. Smith and Larry D. Crumbley}, title = {Defining a Forensic Audit}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {1}, pages = {61--80}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1054}, doi = {10.15394/JDFSL.2009.1054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SmithC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SutherlandDPB09, author = {Iain Sutherland and Gareth Davies and Nick Pringle and Andrew Blyth}, title = {The Impact of Hard Disk Firmware Steganography on Computer Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {73--84}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1059}, doi = {10.15394/JDFSL.2009.1059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SutherlandDPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Valli09, author = {Craig Valli}, title = {Visualisation of Honeypot Data Using Graphviz and Afterglow}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {27--38}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1056}, doi = {10.15394/JDFSL.2009.1056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Valli09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ValliS09, author = {Craig Valli and Patryk Szewczyk}, title = {Insecurity by Obscurity: {A} Review of SoHo Router Literature from a Network Security Perspective}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {5--16}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1160}, doi = {10.15394/JDFSL.2009.1160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ValliS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.