default search action
Digital Investigation, Volume 9
Volume 9, Number 1, June 2012
- Eoghan Casey:
Editorial: IT security is not enough. 1-2 - Harjinder Singh Lallie:
An overview of the digital forensic investigation infrastructure of India. 3-7 - Rafal Drezewski, Jan Sepielak, Wojciech Filipkowski:
System supporting money laundering detection. 8-21 - Miao Yu, Zhengwei Qi, Qian Lin, Xianming Zhong, Bingyu Li, Haibing Guan:
Vis: Virtualization enhanced live forensics acquisition for native system. 22-33 - Li Zhang, Yu-an Tan, Qikun Zhang:
Identification of NAND flash ECC algorithms in mobile devices. 34-48 - Ghulam Muhammad, Muhammad Hussain, George Bebis:
Passive copy move image forgery detection using undecimated dyadic wavelet transform. 49-57 - Han Zong, Fenlin Liu, Xiangyang Luo:
Blind image steganalysis based on wavelet coefficient correlation. 58-68
Volume 9, Number Supplement, August 2012
- Andrew White, Bradley L. Schatz, Ernest Foo:
Surveying the user space through user allocations. S3-S12 - Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang:
IntroLib: Efficient and transparent library call introspection for malware forensics. S13-S23 - Noora Al Mutawa, Ibrahim M. Baggili, Andrew Marrington:
Forensic analysis of social networking applications on mobile devices. S24-S33 - Ralf D. Brown:
Finding and identifying text in 900+ languages. S34-S43 - Simran Fitzgerald, George Mathews, Colin Morris, Oles Zhulyn:
Using NLP techniques for file fragment classification. S44-S49 - Simson L. Garfinkel, Alex J. Nelson, Joel Young:
A general strategy for differential forensic analysis. S50-S59 - Vassil Roussev, Candice Quates:
Content triage with similarity digests: The M57 case study. S60-S68 - Christopher James Hargreaves, Jonathan Patterson:
An automated timeline reconstruction approach for digital forensic investigations. S69-S79 - Simson L. Garfinkel:
Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus. S80-S89 - Josiah Dykstra, Alan T. Sherman:
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. S90-S98 - Brian Jones, Syd Pleno, Michael Wilkinson:
The use of random sampling in investigations involving child abuse material. S99-S107 - Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. S108-S117 - Kevin D. Fairbanks:
An analysis of Ext4 for digital forensics. S118-S130 - Neil C. Rowe:
Testing the National Software Reference Library. S131-S138
Volume 9, Number 2, November 2012
- Eoghan Casey:
Cloud computing and digital forensics. 69-70
- Ben Martini, Kim-Kwang Raymond Choo:
An integrated conceptual digital forensic framework for cloud computing. 71-80 - Hyunji Chung, Jungheum Park, Sangjin Lee, Cheulhoon Kang:
Digital forensic investigation of cloud storage services. 81-95 - R. A. F. Bhoedjang, Alex van Ballegooij, Harm M. A. van Beek, J. C. van Schie, F. W. Dillema, Ruud B. van Baar, F. A. Ouwendijk, M. Streppel:
Engineering an online computer forensic service. 96-108
- Jungheum Park, Hyunji Chung, Sangjin Lee:
Forensic analysis techniques for fragmented flash memory pages in smartphones. 109-118
- Mohammed I. Al-Saleh, Ziad A. Al-Sharif:
Utilizing data lifetime of TCP buffers in digital forensics: Empirical study. 119-124 - Stefan Vömel, Felix C. Freiling:
Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. 125-137
- Oluwasola Mary Fasan, Martin S. Olivier:
Correctness proof for database reconstruction algorithm. 138-150
- Qiong Dong, Gaobo Yang, Ningbo Zhu:
A MCEA based passive forensics scheme for detecting frame-based video tampering. 151-159
- Tu-Thach Quach:
Locating payload embedded by group-parity steganography. 160-166
Volume 9, Numbers 3-4, February 2013
- Eoghan Casey:
Experimental design challenges in digital forensics. 167-169
- Marnix Kaart, C. Klaver, Ruud B. van Baar:
Forensic access to Windows Mobile pim.vol and other Embedded Database (EDB) volumes. 170-192 - G. Stevenson Smith:
Using jump lists to identify fraudulent documents. 193-199 - Jan Collie:
The windows IconCache.db: A resource for forensic artifacts from USB connectable devices. 200-210 - Joseph Lewthwaite:
FrostWire P2P forensic examinations. 211-221 - Muhammad Yasin, Muhammad Abulaish:
DigLA - A Digsby log analysis tool to identify forensic artifacts. 222-234 - Omed S. Khalind, Julio C. Hernandez-Castro, Benjamin Aziz:
A study on the false positive rate of Stegdetect. 235-245 - Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas:
JPEG steganography detection with Benford's Law. 246-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.