default search action
Journal of Digital Forensics, Security and Law, Volume 8
Volume 8, Number 1, 2013
- Fred Cohen:
Science Column: Measuring Inconsistency Methods for Evidentiary Value. 7-16 - Gregory H. Carlton:
A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology. 17-38 - Eric D. Shaw:
How Often is Employee Anger an Insider Risk I? 39-72 - Damian Schofield:
Visualizing Forensic Data: Evidence Guidelines (Part 1). 73-90
Volume 8, Number 2, 2013
- Kishore Singh, Peter J. Best, Joseph M. Mula:
Automating Vendor Fraud Detection in Enterprise Systems. 7-40 - Nik Thompson, Kevin Lee:
The Digital Forensics and Security Challenge of QR Codes. 41-72 - Eric D. Shaw:
How Often is Employee Aanger an Insider Risk II? 73-92 - Damian Schofield, Ken Fowle:
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2). 93-114 - Thomas Nash:
Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. 115-118
Volume 8, Number 3, 2013
- John C. Ruhnka, Windham E. Loopesko:
Risk Management Of Email And Internet Use In The Workplace. 7-20 - Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod:
Trends In Android Malware Detection. 21-40 - Murad Mehmet, Miguel Fuentes Buchholtz:
Money Laundering Detection Framework to Link the Disparate and Evolving Schemes. 41-70 - Enos K. Mabuto, Hein S. Venter:
System-Generated Digital Forensic Evidence in Graphic Design Applications. 71-86 - Joshua Bartolomie:
Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E. 87-90
Volume 8, Number 4, 2013
- Stephen Parker Larson:
Analysis of Second Hand Google Mini Search Appliance. 7-24 - Richard Brian Adams, Valerie Hobbs, Graham Mann:
The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice. 25-48 - Fred Cohen:
Science Column: Reconstruction: The Experimental Side of Digital Forensics. 49-56 - Gary C. Kessler:
Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory. 57-64 - Simson L. Garfinkel:
Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. 65-68
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.