default search action
Digital Investigation, Volume 11
Volume 11, Number 1, 2014
- Eoghan Casey:
Growing societal impact of digital forensics and incident response. 1-2
- Jonathan Zdziarski:
Identifying back doors, attack points, and surveillance mechanisms in iOS devices. 3-19 - Howard Chivers:
Private browsing: A window of forensic opportunity. 20-29 - Corrado Federici:
Cloud Data Imager: A unified answer to remote acquisition of cloud storage areas. 30-42 - George E. Noel, Gilbert L. Peterson:
Applicability of Latent Dirichlet Allocation to multi-disk search. 43-56 - Jicang Lu, Fenlin Liu, Xiangyang Luo:
Selection of image features for steganalysis based on the Fisher criterion. 57-66 - Pritesh Pathak, S. Selvakumar:
Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation. 67-77
Volume 11, Number Supplement 1, May 2014
- Frank Breitinger, Harald Baier, Douglas White:
On the database lookup problem of approximate matching. S1-S9 - Frank Breitinger, Vassil Roussev:
Automated evaluation of approximate matching algorithms on real data. S10-S17 - Petter Christian Bjelland, Katrin Franke, André Årnes:
Practical use of Approximate Hash Based Matching in digital investigations. S18-S26 - Christian Winter, Martin Steinebach, York Yannikos:
Fast indexing strategies for robust image hashes. S27-S35 - Nick Pringle, Mikhaila Burgess:
Information assurance in a distributed forensic cluster. S36-S44 - Timothy Vidas, Brian Kaplan, Matthew Geiger:
OpenLV: Empowering investigators and first-responders in the digital forensics process. S45-S53 - Ruud B. van Baar, Harm M. A. van Beek, E. J. van Eijk:
Digital Forensics as a Service: A game changer. S54-S62 - Alexander Nilsson, Marcus Andersson, Stefan Axelsson:
Key-hiding on the ARM platform. S63-S67 - Thomas Gloe, André Fischer, Matthias Kirchner:
Forensic analysis of video file formats. S68-S76 - Jason Farina, Mark Scanlon, M. Tahar Kechadi:
BitTorrent Sync: First Impressions and Digital Forensic Implications. S77-S86 - Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, Andy Jones:
Windows Surface RT tablet forensics. S87-S93 - Saed Alrabaee, Noman Saleem, Stere Preda, Lingyu Wang, Mourad Debbabi:
OBA2: An Onion approach to Binary code Authorship Attribution. S94-S103 - Wicher Minnaard:
Out of sight, but not out of mind: Traces of nearby devices' wireless transmissions in volatile memory. S104-S111 - Johannes Stüttgen, Michael Cohen:
Robust Linux memory acquisition with minimal target impact. S112-S119
Volume 11, Number 2, 2014
- Eoghan Casey:
What constitutes a proper education? 79-80
- Frank Breitinger, Georgios Stivaktakis, Vassil Roussev:
Evaluating detection error trade-offs for bytewise approximate matching algorithms. 81-89 - Benjamin Aziz:
Modelling and refinement of forensic data acquisition specifications. 90-101 - Chan-Youn Lee, Sangjin Lee:
Structure and application of IconCache.db files for digital forensics. 102-110 - Fei Peng, Die-lan Zhou:
Discriminating natural images and computer generated graphics based on the impact of CFA interpolation on the correlation of PRNU. 111-119 - Cheng-Shian Lin, Jyh-Jong Tsay:
A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis. 120-140
Volume 11, Number Supplement 2, August 2014
- Golden G. Richard III, Andrew Case:
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux. S3-S12 - Vassil Roussev, Irfan Ahmed, Thomas Sires:
Image-based kernel fingerprinting. S13-S21 - Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim M. Baggili:
Testing the forensic soundness of forensic examination environments on bootable media. S22-S29 - Eoghan Casey, Rikkert Zoun:
Design tradeoffs for developing fragmented video carving tools. S30-S39 - Tu-Thach Quach:
Extracting hidden messages in steganographic images. S40-S45 - Alex J. Nelson, Erik Q. Steggall, Darrell D. E. Long:
Cooperative mode: Comparative storage metadata verification applied to the Xbox 360. S46-S56 - Jason Moore, Ibrahim M. Baggili, Andrew Marrington, Armindo Rodrigues:
Preliminary forensic analysis of the Xbox One. S57-S65 - Vijay Kumar, George C. Oikonomou, Theo Tryfonas, Dan Page, Iain W. Phillips:
Digital investigations for IPv6-based Wireless Sensor Networks. S66-S75 - Anthony Lang, Masooda N. Bashir, Roy H. Campbell, Lizanne DeStefano:
Developing a new digital forensics curriculum. S76-S84 - Florian Westphal, Stefan Axelsson, Christian Neuhaus, Andreas Polze:
VMI-PL: A monitoring language for virtual platforms using virtual machine introspection. S85-S94 - Yoan Chabot, Aurélie Bertaux, Christophe Nicolle, M. Tahar Kechadi:
A complete formalized knowledge representation model for advanced digital forensics timeline analysis. S95-S105 - Kurt Oestreicher:
A forensically robust method for acquisition of iCloud data. S106-S113 - Elias Bou-Harb, Nour-Eddine Lakhdari, Hamad Binsalleeh, Mourad Debbabi:
Multidimensional investigation of source port 0 probing. S114-S123 - Nicole Lang Beebe, Lishu Liu:
Ranking algorithms for digital forensic string search hits. S124-S132
Volume 11, Number 3, September 2014
- Bradley L. Schatz, Pavel Gladyshev, Ronald M. van der Knijff:
The internet of things: Interconnected digital dust. 141-142 - Thomas R. Souvignet, Julien Hatin, Fabrice Maqua, D. Tesniere, Pierre Léger, Romain Hormière:
Payment card forensic analysis: From concepts to desktop and mobile analysis tools. 143-153 - Thomas R. Souvignet, T. Prüfer, J. Frinken, R. Kricsanowits:
Case study: From embedded system analysis to embedded system based investigator tools. 154-159 - Ronald M. van der Knijff:
Control systems/SCADA forensics, what's the difference? 160-174 - Iain Sutherland, Huw Read, Konstantinos Xynos:
Forensic analysis of smart TV: A current issue and call to arms. 175-178 - Lee Tobin, Ahmed F. Shosha, Pavel Gladyshev:
Reverse engineering a CCTV system, a case study. 179-186 - Jungheum Park, Sangjin Lee:
Data fragment forensics for embedded DVR systems. 187-200 - Cosimo Anglano:
Forensic analysis of WhatsApp Messenger on Android smartphones. 201-213 - Bradley L. Schatz:
A visual approach to interpreting NAND flash memory. 214-223 - Wicher Minnaard:
The Linux FAT32 allocator and file creation order reconstruction. 224-233 - Marnix Kaart, Susan Laraghy:
Android forensics: Interpretation of timestamps. 234-248
Volume 11, Number 4, December 2014
- Bruce J. Nikkel:
Fostering incident response and digital forensics research. 249-251 - Kathryn C. Seigfried-Spellar:
Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings. 252-260 - Amy Phelps, Allan Watt:
I shop online - recreationally! Internet anonymity and Silk Road enabling drug use in Australia. 261-272 - Darren Quick, Kim-Kwang Raymond Choo:
Impacts of increasing volume of digital forensic data: A survey and future research challenges. 273-294 - Ben Martini, Kim-Kwang Raymond Choo:
Distributed filesystem forensics: XtreemFS as a case study. 295-313 - Nicole Lang Beebe, Lishu Liu:
Clustering digital forensic string search output. 314-322 - Boojoong Kang, Kyoung-Soo Han, Byeongho Kang, Eul Gyu Im:
Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering. 323-335 - Peter Frühwirt, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl:
Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. 336-348 - Tarique Anwar, Muhammad Abulaish:
A social graph based text mining framework for chat log investigation. 349-362 - Frank Breitinger, Georgios Stivaktakis, Vassil Roussev:
Erratum to "Evaluating detection error trade-offs for bytewise approximate matching algorithms" [Digit Invest 11 (2) 81-89]. 363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.