default search action
Forensic Science International: Digital Investigation, Volume 40
Volume 40, Number Supplement, April 2022
Full Papers
- Janine Schneider, Linus Düsel, Benedikt Lorch, Julia Drafz, Felix C. Freiling:
Prudent design principles for digital tampering experiments. 301334 - Kevin Lamshöft, Tom Neubert, Jonas Hielscher, Claus Vielhauer, Jana Dittmann:
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover. 301335 - Nauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed:
PEM: Remote forensic acquisition of PLC memory in industrial control systems. 301336 - Stewart Sentanoe, Hans P. Reiser:
SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. 301337 - Aurélien Thierry, Tilo Müller:
A systematic approach to understanding MACB timestamps on Unix-like systems. 301338 - Muhammad Haris Rais, Rima Asmar Awad, Juan Lopez Jr., Irfan Ahmed:
Memory forensic analysis of a programmable logic controller in industrial control systems. 301339 - Tyler Thomas, Tiffanie Edwards, Ibrahim M. Baggili:
BlockQuery: Toward forensically sound cryptocurrency investigation. 301340 - Dayton Closser, Elias Bou-Harb:
A live digital forensics approach for quantum mechanical computers. 301341 - Pedro Fernández-Álvarez, Ricardo J. Rodríguez:
Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application. 301342 - Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, André Årnes:
Quantifying data volatility for IoT forensics with examples from Contiki OS. 301343 - Thomas Göbel, Stephan Maltan, Jan Türr, Harald Baier, Florian Mann:
ForTrace - A holistic forensic data set synthesis framework. 301344
Volume 40, March 2022
- Manabu Hirano, Ryo Hodota, Ryotaro Kobayashi:
RanSAP: An open dataset of ransomware storage access patterns for training machine learning models. 301314 - Abdellah Akilal, M. Tahar Kechadi:
An improved forensic-by-design framework for cloud computing with systems engineering standard compliance. 301315
- Nina Sunde:
Strategies for safeguarding examiner objectivity and evidence reliability during digital forensic investigations. 301317
- Simon R. Davies, Richard Macfarlane, William J. Buchanan:
NapierOne: A modern mixed file data set alternative to Govdocs1. 301330
- Graeme Horsman:
Conducting a 'manual examination' of a device as part of a digital investigation. 301331
- David-Olivier Jaquet-Chiffelle, Eoghan Casey, Jonathan Bourquenoud:
Corrigendum to "Tamperproof timestamped provenance ledger using blockchain technology∗" [Forens. Sci. Int.: Digit. Invest. 33 (2020) 300977]. 301332
- Peter Sommer:
Evidence from hacking: A few tiresome problems. 301333
- Luca Calderoni, Antonio Magnani:
The impact of face image compression in future generation electronic identity documents. 301345
- Pushpajit Khaire, Praveen Kumar:
A semi-supervised deep learning based video anomaly detection framework using RGB-D for surveillance of real-world critical environments. 301346
- Jihun Son, Yeong Woong Kim, Dong Bin Oh, Kyounggon Kim:
Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema. 301347
- Felix Olu Bankole, Ayankunle A. Taiwo, Ivan Claims:
An extended digital forensic readiness and maturity model. 301348
- Angus M. Marshall:
The unwanted effects of imprecise language in forensic science standards. 301349 - Graeme Horsman:
Defining principles for preserving privacy in digital forensic examinations. 301350
- Radina Stoykova, Stig Andersen, Katrin Franke, Stefan Axelsson:
Reliability assessment of digital forensic investigations in the Norwegian police. 301351
- Christopher Neale, Ian Kennedy, Blaine A. Price, Yijun Yu, Bashar Nuseibeh:
The case for Zero Trust Digital Forensics. 301352
- Soram Kim, Giyoon Kim, Sumin Shin, Byungchul Youn, Jian Song, Insoo Lee, Jongsung Kim:
Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber. 301353
- Jiho Shin, Hyunpyo Choi, Jung-Taek Seo:
A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system. 301354
- Sumin Shin, Giyoon Kim, Soram Kim, Jongsung Kim:
Forensic analysis of note and journal applications. 301355
- Frederic Chamot, Zeno J. M. H. Geradts, Evert Haasdijk:
Deepfake forensics: Cross-manipulation robustness of feedforward- and recurrent convolutional forgery detection methods. 301374
- Jewan Bang, Jungheum Park, Sangjin Lee:
Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations. 301376
- Katsiaryna Bahamazava, Rohan Nanda:
The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence. 301377
- Bruce J. Nikkel:
Editorial. 301388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.