default search action
Digital Investigation, Volume 26 Supplement
Volume 26 Supplement, July 2018
- Nathan Lewis, Andrew Case, Aisha I. Ali-Gombe, Golden G. Richard III:
Memory forensics and the Windows Subsystem for Linux. S3-S11 - Manish Bhatt, Irfan Ahmed:
Leveraging relocations in ELF-binaries for Linux kernel version identification. S12-S20 - Jan-Niclas Hilgert, Martin Lambertz, Shujian Yang:
Forensic analysis of multiple device BTRFS configurations using The Sleuth Kit. S21-S29 - Graeme Horsman:
Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache. S30-S37 - Akshay Awasthi, Huw Read, Konstantinos Xynos, Iain Sutherland:
Welcome pwn: Almond smart home hub forensics. S38-S46 - Cinthya Grajeda, Laura Sánchez, Ibrahim M. Baggili, Devon Clark, Frank Breitinger:
Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. S47-S58 - Xiaodong Lin, Ting Chen, Tong Zhu, Kun Yang, Fengguo Wei:
Automated forensic analysis of mobile applications on Android devices. S59-S66 - Benjamin Taubmann, Omar Alabduljaleel, Hans P. Reiser:
DroidKex: Fast extraction of ephemeral TLS keys from the memory of Android apps. S67-S76 - Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital forensic investigation of two-way radio communication equipment and services. S77-S86 - Kyle Porter:
Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using LDA topic modeling. S87-S97 - Tomasz Tuzel, Mark P. Bridgman, Joshua Zepf, Tamas K. Lengyel, Kyle J. Temkin:
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests. S98-S106 - Sergii Banin, Geir Olav Dyrkolbotn:
Multinomial malware classification via low-level features. S107-S117 - Quan Le, Oisín Boydell, Brian Mac Namee, Mark Scanlon:
Deep learning at the shallow end: Malware classification for non-domain experts. S118-S126 - Michael F. Thompson, Timothy Vidas:
Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge. S127-S135 - Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
Facial-Forensic Analysis Tool. S136 - Da-Yu Kao, Yuanpei Chen, Neng-Hsin Shih:
Reconstructing ADS data hiding in windows NTFS: A temporal analysis. S137 - Martin Lambertz, Jan-Niclas Hilgert, Roman Schell:
Resurrecting Portable Network Graphics using block generators. S138 - Rayan Mosli, Bo Yuan, Yin Pan:
On the viability of data collection using Google Rapid Response for enterprise-level malware research. S139
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.