


default search action
Digital Investigation, Volume 15
Volume 15, December 2015
- Pritheega Magalingam
, Stephen Davis, Asha Rao
:
Using shortest path to discover criminal community. 1-17
- Zeno J. M. H. Geradts
, Katrin Franke:
Editorial for big data issue. 18-19 - Harm M. A. van Beek
, E. J. van Eijk, Ruud B. van Baar, M. Ugen, J. N. C. Bodde, A. J. Siemelink:
Digital forensics as a service: Game on. 20-38 - P. A. C. Duijn, Peter M. A. Sloot:
From data to disruption. 39-45 - Mohammad Reza Farhadi, Benjamin C. M. Fung
, Yin Bun Fung
, Philippe Charland, Stere Preda, Mourad Debbabi
:
Scalable code clone search for malware analysis. 46-60 - Wilco Wisse, Cor J. Veenman:
Scripting DNA: Identifying the JavaScript programmer. 61-71 - Owen Brady
, Richard E. Overill, Jeroen Keppens
:
DESO: Addressing volume and variety in large-scale criminal cases. 72-82 - Yoan Chabot
, Aurélie Bertaux, Christophe Nicolle, M. Tahar Kechadi
:
An ontology-based approach for the reconstruction and analysis of digital incidents timelines. 83-100 - Peter Sommer:
DI commentary: Big Data and privacy. 101-103 - Alessandro Mantelero
, Giuseppe Vaciago:
Data protection in a big data society. Ideas for a future regulation. 104-109
- Filip Karpísek, Ibrahim M. Baggili
, Frank Breitinger
:
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. 110-118 - Wan Yeon Lee, Hyuckmin Kwon, Heejo Lee:
Comments on the Linux FAT32 allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]. 119-123

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.