


default search action
Forensic Science International: Digital Investigation, Volume 46
Volume 46, Number Supplement, October 2023
- Daniel Dolejska, Michal Koutenský, Vladimír Veselý, Jan Pluskal:
Busting up Monopoly: Methods for modern darknet marketplace forensics. 301604 - Hoyong Choi, Sangjin Lee:
Forensic analysis of SQL server transaction log in unallocated area of file system. 301605 - Kwangkeun Song, Dong Bin Oh:
Bike computer forensics: An efficient and robust method for FIT file recovery. 301606 - Eunji Lee
, Seo Yeon Lee, Hyeon Kwon, Sungjin Lee, Gi Bum Kim:
Identification of data wiping tools based on deletion patterns in ReFS $Logfile. 301607 - Donghyun Kim
, Subin Oh, Taeshik Shon:
Digital forensic approaches for metaverse ecosystems. 301608 - Mark Scanlon, Frank Breitinger
, Christopher Hargreaves
, Jan-Niclas Hilgert, John Sheppard
:
ChatGPT for digital forensic investigation: The good, the bad, and the unknown. 301609 - Jan-Niclas Hilgert, Roman Schell, Carlo Jakobs, Martin Lambertz:
About the applicability of Apache2 web server memory forensics. 301610 - Jihun Son, Gyubin Kim, Hyunwoo Jung, Jewan Bang
, Jungheum Park:
IF-DSS: A forensic investigation framework for decentralized storage services. 301611 - Jihun Joun
, Sangjin Lee, Jungheum Park:
Data remnants analysis of document files in Windows: Microsoft 365 as a case study. 301612 - Geun-Yeong Choi, Jewan Bang
, Sangjin Lee, Jungheum Park:
Chracer: Memory analysis of Chromium-based browsers. 301613 - Yanan Gong, Kam-Pui Chow, Siu Ming Yiu, Hing-Fung Ting:
Analyzing the peeling chain patterns on the Bitcoin blockchain. 301614
Volume 46, September 2023
- Sang Hyuk An
, Sangjin Lee, Jaehyeok Han
:
Data reconstruction and recovery of deduplicated files having non-resident attributes in NTFS volume. 301571 - Luis Fernandez de Loaysa Babiano, Richard Macfarlane
, Simon R. Davies
:
Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation. 301572 - Michael Kerr
, Fengling Han, Xun Yi, Andrei Kelarev, Ron G. van Schyndel:
A non-invasive method for the cataloguing and authentication of surveillance video using on-camera blockchain participation, machine learning and signal analysis. 301573
- Adrien Dubettier, Tanguy Gernot
, Emmanuel Giguet, Christophe Rosenberger
:
File type identification tools for digital investigations. 301574
- Arianna Trozze
, Toby Davies
, Bennett Kleinberg:
Of degens and defrauders: Using open-source investigative tools to investigate decentralized finance frauds and money laundering. 301575
- Sahil Dudani
, Ibrahim Baggili
, David R. Raymond, Randolph Marchany:
The current state of cryptocurrency forensics. 301576
- Howard Heath, Áine MacDermott
, Alex Akinbi:
Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data? 301585 - Mattheüs B. Blankesteijn, Aya Fukami
, Zeno J. M. H. Geradts
:
Assessing data remnants in modern smartphones after factory reset. 301587 - Lakshminarayana Sadineni
, Emmanuel S. Pilli
, Ramesh Babu Battula
:
ProvLink-IoT: A novel provenance model for Link-Layer Forensics in IoT networks. 301600 - Milica Matijevic Gostojic, Zeljko Vukovic:
A knowledge-based system for supporting the soundness of digital forensic investigations. 301601
- Radina Stoykova
:
Encrochat: The hacker with a warrant and fair trials? 301602
- Manabu Hirano
, Ryotaro Kobayashi:
FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis. 301603
- Muhammad Irshad
, Sea Ran Cleon Liew, Ngai-Fong Law
, Ka Hong Loo:
CAMID: An assuasive approach to reveal source camera through inconspicuous evidence. 301616
- Johannes Fähndrich, Wilfried Honekamp, Roman Povalej, Heiko Rittelmeier, Silvio Berner, Dirk Labudde:
Digital forensics and strong AI: A structured literature review. 301617
- Raphaela Mettig
, Charles Glass, Andrew Case, Golden G. Richard III:
Assessing the threat of Rosetta 2 on Apple Silicon devices. 301618

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.