


default search action
Forensic Science International: Digital Investigation, Volume 40
Volume 40, Number Supplement, April 2022
Full Papers
- Janine Schneider
, Linus Düsel, Benedikt Lorch, Julia Drafz, Felix C. Freiling:
Prudent design principles for digital tampering experiments. 301334 - Kevin Lamshöft
, Tom Neubert, Jonas Hielscher
, Claus Vielhauer, Jana Dittmann:
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover. 301335 - Nauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed
:
PEM: Remote forensic acquisition of PLC memory in industrial control systems. 301336 - Stewart Sentanoe, Hans P. Reiser:
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. 301337 - Aurélien Thierry, Tilo Müller:
A systematic approach to understanding MACB timestamps on Unix-like systems. 301338 - Muhammad Haris Rais
, Rima Asmar Awad
, Juan Lopez Jr., Irfan Ahmed
:
Memory forensic analysis of a programmable logic controller in industrial control systems. 301339 - Tyler Thomas, Tiffanie Edwards, Ibrahim M. Baggili
:
BlockQuery: Toward forensically sound cryptocurrency investigation. 301340 - Dayton Closser
, Elias Bou-Harb:
A live digital forensics approach for quantum mechanical computers. 301341 - Pedro Fernández-Álvarez, Ricardo J. Rodríguez:
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application. 301342 - Jens-Petter Sandvik
, Katrin Franke, Habtamu Abie
, André Årnes:
Quantifying data volatility for IoT forensics with examples from Contiki OS. 301343 - Thomas Göbel, Stephan Maltan, Jan Türr, Harald Baier, Florian Mann:
ForTrace - A holistic forensic data set synthesis framework. 301344
Volume 40, March 2022
- Manabu Hirano
, Ryo Hodota, Ryotaro Kobayashi
:
RanSAP: An open dataset of ransomware storage access patterns for training machine learning models. 301314 - Abdellah Akilal
, M. Tahar Kechadi
:
An improved forensic-by-design framework for cloud computing with systems engineering standard compliance. 301315
- Nina Sunde
:
Strategies for safeguarding examiner objectivity and evidence reliability during digital forensic investigations. 301317
- Simon R. Davies
, Richard Macfarlane
, William J. Buchanan
:
NapierOne: A modern mixed file data set alternative to Govdocs1. 301330
- Graeme Horsman:
Conducting a 'manual examination' of a device as part of a digital investigation. 301331
- David-Olivier Jaquet-Chiffelle
, Eoghan Casey, Jonathan Bourquenoud:
Corrigendum to "Tamperproof timestamped provenance ledger using blockchain technology∗" [Forens. Sci. Int.: Digit. Invest. 33 (2020) 300977]. 301332
- Peter Sommer
:
Evidence from hacking: A few tiresome problems. 301333
- Luca Calderoni
, Antonio Magnani:
The impact of face image compression in future generation electronic identity documents. 301345
- Pushpajit Khaire
, Praveen Kumar:
A semi-supervised deep learning based video anomaly detection framework using RGB-D for surveillance of real-world critical environments. 301346
- Jihun Son
, Yeong Woong Kim, Dong Bin Oh, Kyounggon Kim
:
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema. 301347
- Felix Olu Bankole, Ayankunle A. Taiwo, Ivan Claims:
An extended digital forensic readiness and maturity model. 301348
- Angus M. Marshall
:
The unwanted effects of imprecise language in forensic science standards. 301349 - Graeme Horsman:
Defining principles for preserving privacy in digital forensic examinations. 301350
- Radina Stoykova
, Stig Andersen, Katrin Franke
, Stefan Axelsson
:
Reliability assessment of digital forensic investigations in the Norwegian police. 301351
- Christopher Neale, Ian Kennedy
, Blaine A. Price
, Yijun Yu
, Bashar Nuseibeh
:
The case for Zero Trust Digital Forensics. 301352
- Soram Kim, Giyoon Kim, Sumin Shin, Byungchul Youn, Jian Song, Insoo Lee, Jongsung Kim:
Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber. 301353
- Jiho Shin
, Hyunpyo Choi
, Jung-Taek Seo
:
A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system. 301354
- Sumin Shin, Giyoon Kim, Soram Kim, Jongsung Kim:
Forensic analysis of note and journal applications. 301355
- Frederic Chamot
, Zeno J. M. H. Geradts
, Evert Haasdijk
:
Deepfake forensics: Cross-manipulation robustness of feedforward- and recurrent convolutional forgery detection methods. 301374
- Jewan Bang
, Jungheum Park
, Sangjin Lee:
Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations. 301376
- Katsiaryna Bahamazava
, Rohan Nanda
:
The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence. 301377
- Bruce J. Nikkel:
Editorial. 301388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.