


default search action
Digital Investigation, Volume 16 Supplement
Volume 16 Supplement, March 2016
- Michael Gruhn, Felix C. Freiling:
Evaluating atomicity, and integrity of correct memory acquisition methods. S1-S10 - Arkadiusz Socala, Michael Cohen:
Automatic profile generation for live Linux Memory analysis. S11-S24 - Joe Sylve, Lodovico Marziale, Golden G. Richard III
:
Pool tag quick scanning for windows memory analysis. S25-S32 - Oren Halvani, Christian Winter, Anika Pflug:
Authorship verification for different languages, genres and topics. S33-S43 - Christian Zoubek, Sabine Seufert, Andreas Dewald:
Generic RAID reassembly using block-level entropy. S44-S54 - Shahzad Saleem
, Oliver Popov, Ibrahim M. Baggili:
A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis. S55-S64 - Johannes Bauer, Michael Gruhn, Felix C. Freiling:
Lest we forget: Cold-boot attacks on scrambled DDR3 memory. S65-S74 - Ben Hitchcock, Nhien-An Le-Khac
, Mark Scanlon
:
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists. S75-S85 - Alex Biedermann
, Joëlle Vuille:
Digital evidence, 'absence' of data and ambiguous patterns of reasoning. S86-S95 - Noora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira
, Andrew Marrington:
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis. S96-S103 - Vassil Roussev, Shane McCulley:
Forensic analysis of cloud-native artifacts. S104-S113 - Benjamin Taubmann, Christoph Frädrich, Dominik Dusold, Hans P. Reiser
:
TLSkex: Harnessing virtual machine introspection for decrypting TLS communication. S114-S123 - David W. Gresty, Diane Gan, George Loukas
, Constantinos Ierotheou:
Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history. S124-S133

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.