


default search action
Digital Investigation, Volume 24
Volume 24, March 2018
- Eoghan Casey:
Clearly conveying digital forensic results. 1-3
- Ioannis Tsimperidis
, Avi Arampatzis
, Alexandros Karakos:
Keystroke dynamics features for gender recognition. 4-10 - Heloise Pieterse
, Martin Olivier
, Renier van Heerden:
Smartphone data evaluation model: Identifying authentic smartphone data. 11-24 - Abdullah Talha Kabakus
, Ibrahim Alper Dogru:
An in-depth analysis of Android malware using hybrid techniques. 25-33 - Edward Raff
, Charles Nicholas:
Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and sdhash. 34-49 - Mariam Khader, Ali Hadi, Ghazi Al-Naymat:
HDFS file operation fingerprints for forensic investigations. 50-61 - Janis Dalins, Campbell Wilson
, Mark J. Carman
:
Criminal motivation on the dark web: A categorisation model for law enforcement. 62-71 - Douglas A. Orr, Laura Sánchez:
Alexa, did you get that? Determining the evidentiary value of data stored by the Amazon® Echo. 72-78 - Shuyuan Mary Ho, Da-Yu Kao, Wen-Ying Wu:
Following the breadcrumbs: Timestamp pattern identification for cloud forensics. 79-94 - Virginia N. L. Franqueira
, Joanne Bryce, Noora Al Mutawa, Andrew Marrington:
Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches. 95-105 - Jongseong Yoon, Sangjin Lee:
A method and tool to recover data deleted from a MongoDB. 106-120 - Bhupendra Gupta, Mayank Tiwari:
Improving source camera identification performance using DCT based image frequency components dependent sensor pattern noise extraction method. 121-127 - Nitesh K. Bharadwaj, Upasna Singh
:
Efficiently searching target data traces in storage devices with region based random sector sampling approach. 128-141 - Christiaan Meij, Zeno J. M. H. Geradts
:
Source camera identification using Photo Response Non-Uniformity on WhatsApp. 142-154

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.