![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Forensic Science International: Digital Investigation, Volume 32 Supplement
Volume 32 Supplement, April 2020
Extended Abstracts
- Shuyuan Mary Ho, Da-Yu Kao, Ming-Jung Chiu-Huang, Wenyi Li, Chung-Jui Lai:
Detecting Cyberbullying "Hotspots" on Twitter: A Predictive Analytics Approach. 300906 - Asanka P. Sayakkara, Nhien-An Le-Khac
, Mark Scanlon:
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis. 300907 - Edward Harshany, Ryan Benton, David Bourrie, William Bradley Glisson:
Big Data Forensics: Hadoop 3.2.0 Reconstruction. 300909 - Kingson Chinedu Odogwu, Pavel Gladyshev, Babak Habibnia:
PNG Data Detector for DECA. 300910 - David Billard
:
Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems. 300911
- Paul Prade, Tobias Groß, Andreas Dewald:
Forensic Analysis of the Resilient File System (ReFS) Version 3.4. 300915 - Patrick Mullan, Christian Riess, Felix C. Freiling:
Towards Open-Set Forensic Source Grouping on JPEG Header Information. 300916 - Daniel Uroz
, Ricardo J. Rodríguez:
On Challenges in Verifying Trusted Executable Files in Memory Forensics. 300917 - Pavol Sokol
, Laura Rózenfeldová
, Katarína Lucivjanská, Jakub Harasta
:
IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic. 300918 - Tobias Latzo, Julian Brost, Felix C. Freiling:
BMCLeech: Introducing Stealthy Memory Forensics to BMC. 300919 - David Palmbach, Frank Breitinger
:
Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability. 300920 - Felix Anda, Nhien-An Le-Khac
, Mark Scanlon:
DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation. 300921 - Sadegh Torabi
, Elias Bou-Harb, Chadi Assi, Mourad Debbabi
:
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. 300922 - Virginia N. L. Franqueira
, Graeme Horsman:
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice. 300923 - Janine Schneider
, Julian Wolf
, Felix C. Freiling:
Tampering with Digital Evidence is Hard: The Case of Main Memory Images. 300924 - Erisa Karafili
, Linna Wang, Emil C. Lupu:
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks. 300925 - Xiaolu Zhang, Oren Upton, Nicole Lang Beebe, Kim-Kwang Raymond Choo
:
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. 300926 - Asanka P. Sayakkara
, Luis Miralles-Pechuán, Nhien-An Le-Khac
, Mark Scanlon:
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection. 300927 - Eoghan Casey
, David-Olivier Jaquet-Chiffelle
, Hannes Spichiger
, Elénore Ryser
, Thomas R. Souvignet
:
Structuring the Evaluation of Location-Related Mobile Device Evidence. 300928
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.