Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2011
- M. Tariq Banday, Farooq A. Mir, Jameel A. Qadri, Nisar Ahmed Shah:
Analyzing Internet e-mail date-spoofing. Digit. Investig. 7(3-4): 145-153 (2011) - Jewan Bang, Byeongyeong Yoo, Sangjin Lee:
Analysis of changes in file time attributes with file manipulation. Digit. Investig. 7(3-4): 135-144 (2011) - Eoghan Casey:
The increasing need for automation and validation in digital forensics. Digit. Investig. 7(3-4): 103-104 (2011) - Howard Chivers, Christopher James Hargreaves:
Forensic data recovery from the Windows Search Database. Digit. Investig. 7(3-4): 114-126 (2011) - Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen:
Collaborative scheme for VoIP traceback. Digit. Investig. 7(3-4): 185-195 (2011) - Paul Hunton:
A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment. Digit. Investig. 7(3-4): 105-113 (2011) - Harjinder Singh Lallie, Philip James Briggs:
Windows 7 registry forensic evidence created by three popular BitTorrent clients. Digit. Investig. 7(3-4): 127-134 (2011) - A. L. Louis, Andries P. Engelbrecht:
Unsupervised discovery of relations for analysis of textual data. Digit. Investig. 7(3-4): 154-171 (2011) - Dung Vu Pham, Ali Syed, Malka N. Halgamuge:
Universal serial bus based software attacks and protection solutions. Digit. Investig. 7(3-4): 172-184 (2011) - 2010
- Stefan Axelsson:
The Normalised Compression Distance as a file fragment classifier. Digit. Investig. 7(Supplement): S24-S31 (2010) - Jewan Bang, Byeongyeong Yoo, Sangjin Lee:
Secure USB bypassing tool. Digit. Investig. 7(Supplement): S114-S120 (2010) - Brian D. Carrier:
Different interpretations of ISO9660 file systems. Digit. Investig. 7(Supplement): S129-S134 (2010) - Andrew Case, Lodovico Marziale, Cris Neckar, Golden G. Richard III:
Treasure and tragedy in kmem_cache mining for live forensics investigation. Digit. Investig. 7(Supplement): S41-S47 (2010) - Andrew Case, Lodovico Marziale, Golden G. Richard III:
Dynamic recreation of kernel data structures for live forensics. Digit. Investig. 7(Supplement): S32-S40 (2010) - Eoghan Casey:
Digital investigations, security and privacy. Digit. Investig. 7(1-2): 1-2 (2010) - Fa-Chang Cheng, Wen-Hsing Lai:
An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan. Digit. Investig. 7(1-2): 81-89 (2010) - Michael Cohen, Bradley L. Schatz:
Hash based disk imaging using AFF4. Digit. Investig. 7(Supplement): S121-S128 (2010) - Gregory J. Conti, Sergey Bratus, Anna Shubina, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, Robert Perez-Alemany:
Automated mapping of large binary objects using primitive fragment type classification. Digit. Investig. 7(Supplement): S3-S12 (2010) - Neil J. Croft, Martin S. Olivier:
Sequenced release of privacy-accurate information in a forensic investigation. Digit. Investig. 7(1-2): 95-101 (2010) - Alessandro Distefano, Gianluigi Me, Francesco Pace:
Android anti-forensics through a local paradigm. Digit. Investig. 7(Supplement): S83-S94 (2010) - Geoffrey Fellows:
WinRAR temporary folder artefacts. Digit. Investig. 7(1-2): 9-13 (2010) - Simson L. Garfinkel:
Digital forensics research: The next 10 years. Digit. Investig. 7(Supplement): S64-S73 (2010) - Simson L. Garfinkel, Alex J. Nelson, Douglas White, Vassil Roussev:
Using purpose-built functions and block hashes to enable small block and sub-file forensics. Digit. Investig. 7(Supplement): S13-S23 (2010) - Greg Gogolin:
The Digital Crime Tsunami. Digit. Investig. 7(1-2): 3-8 (2010) - Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. Fung, Mourad Debbabi:
Mining writeprints from anonymous e-mails for forensic investigation. Digit. Investig. 7(1-2): 56-64 (2010) - Liaqat Ali Khan, Muhammad Shamim Baig, Amr M. Youssef:
Speaker recognition from encrypted VoIP communications. Digit. Investig. 7(1-2): 65-73 (2010) - Liaqat Ali Khan, Farkhund Iqbal, Muhammad Shamim Baig:
Speaker verification from partially encrypted compressed speech for forensic investigation. Digit. Investig. 7(1-2): 74-80 (2010) - Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, Clay Shields:
Forensic investigation of peer-to-peer file sharing networks. Digit. Investig. 7(Supplement): S95-S103 (2010) - James R. Lyle:
If error rate is such a simple concept, why don't I have one for my forensic tool yet? Digit. Investig. 7(Supplement): S135-S139 (2010) - James S. Okolica, Gilbert L. Peterson:
Windows operating systems agnostic memory analysis. Digit. Investig. 7(Supplement): S48-S56 (2010)
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-19 11:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint