![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Digital Investigation, Volume 12
Volume 12, March 2015
- Eoghan Casey
:
Strengthening forensic science. A1-A2 - Jicang Lu, Fenlin Liu, Xiangyang Luo:
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix. 1-14 - Reza Sharifnya, Mahdi Abadi
:
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic. 15-26 - Oluwasola Mary Adedayo
, Martin S. Olivier
:
Ideal log setting for database forensics reconstruction. 27-40 - Jan Peter van Zandwijk:
A mathematical approach to NAND flash-memory descrambling and decoding. 41-52 - Yogesh Khatri
:
Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8. 53-65 - Ahmet Karaküçük
, Ahmet Emir Dirik
:
Adaptive photo-response non-uniformity noise removal against image source attribution. 66-76 - Li Zhang
, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quanxin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. 77-87 - Kathryn C. Seigfried-Spellar
:
Erratum to "Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary findings" [Digit. Invest 11 (4), 252-260]. 88
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.