default search action
Journal of Digital Forensics, Security and Law, Volume 10
Volume 10, Number 1, 2015
- Ibrahim M. Baggili:
From the Editor-in-Chief. 5-6 - Thomas Hyslip, Jason M. Pittman:
A Survey of Botnet Detection Techniques by Command and Control Infrastructure. 7-26 - Manghui Tu:
Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments. 27-44 - Thomas Lonardo, Alan Rea, Doug White:
To License or Not to License Reexamined: An Updated Report on State Statutes Regarding Private Investigators and Digital Examiners. 45-56 - Milton H. Luoma, Vicki Luoma:
Litigation Holds: Past, Present, and Future Directions. 57-68
Volume 10, Number 2, 2015
- Ibrahim M. Baggili:
From the Editor-in-Chief. 5-6 - Igor Korkin:
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations. 7-38 - Carla J. Utter, Alan Rea:
The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges. 55-72
Volume 10, Number 3, 2015
- Grover S. Kearns:
Computer Forensic Projects for Accountants. 7-34 - Nicholas C. Donnangelo, Walter S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar:
Identification and Exploitation of Inadvertent Spectral Artifacts in Digital Audio. 35-58 - Irvin Homem, Spyridon Dossis:
On the Network Performance of Digital Evidence Acquisition of Small Scale Devices over Public Networks. 59-86 - Hany Farid, Srivamshi Pittala, Emily Whiting:
A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo. 87-98
Volume 10, Number 4, 2015
- Ibtesam Al Awadhi, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira:
Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases. 7-16 - Xiao-Xi Fan, Kam-Pui Chow:
Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis. 17-30 - Joe Kong:
Data Extraction on MTK-based Android Mobile Phone Forensics. 31-42 - Michael Losavio, Pavel Sysoevich Pastukov, Svetlana Polyakova:
Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives and Challenges with Digital Forensics. 43-58 - Ken Yau, Kam-Pui Chow:
PLC Forensics Based on Control Program Logic Change Detection. 59-68 - Robert van Voorst, Mohand Tahar Kechadi, Nhien-An Le-Khac:
Forensic Acquisition of IMVU: A Case Study. 69-78 - Tina Wu, Jason R. C. Nurse:
Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. 79-96 - Lee Tobin, Pavel Gladyshev:
Open Forensic Devices. 97-104 - Mohammed Alzaabi:
The Use of Ontologies in Forensic Analysis of Smartphone Content. 105-114 - Jason Farina, M. Tahar Kechadi, Mark Scanlon:
Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser. 115-124
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.