


default search action
Digital Investigation, Volume 18
Volume 18, September 2016
- Eoghan Casey
:
Focused digital evidence analysis and forensic distinguishers. A1-A3
- Ji Eun Song, Kiryong Lee, Wan Yeon Lee, Heejo Lee:
Integrity verification of the ordered data structures in manipulated video content. 1-7 - K. Sitara
, Babu M. Mehtre:
Digital video tampering detection: An overview of passive techniques. 8-22 - Joshua I. James
, Pavel Gladyshev
:
A survey of mutual legal assistance involving digital evidence. 23-32 - Mohammad Reza Ebrahimi, Ching Y. Suen, Olga Ormandjieva:
Detecting predatory conversations in social media by deep Convolutional Neural Networks. 33-49 - Claudia Peersman, Christian Schulze, Awais Rashid
, Margaret Brennan, Carl Fischer:
iCOP: Live forensics to reveal previously unknown criminal media on P2P networks. 50-64 - M. Al Fahdi, Nathan L. Clarke
, Fudong Li, Steven M. Furnell
:
A suspect-oriented intelligent and automated computer forensic analysis. 65-76
- Kim-Kwang Raymond Choo
, Martin Herman, Michaela Iorga, Ben Martini:
Cloud forensics: State-of-the-art and future directions. 77-78 - Vassil Roussev, Irfan Ahmed
, Andres Barreto, Shane McCulley, Vivek Shanmughan:
Cloud forensics-Tool development studies & future outlook. 79-95 - Petra Leimich
, Josh Harrison, William J. Buchanan
:
A RAM triage methodology for Hadoop HDFS forensics. 96-109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.