Search dblp for Publications

export results for "stream:conf/dfrws:"

 download as .bib file

@article{DBLP:journals/di/DavisMA22,
  author       = {Megan Davis and
                  Bridget T. McInnes and
                  Irfan Ahmed},
  title        = {Forensic investigation of instant messaging services on linux {OS:}
                  Discord and Slack as case studies},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301401},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301401},
  doi          = {10.1016/J.FSIDI.2022.301401},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/DavisMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GobelUBB22,
  author       = {Thomas G{\"{o}}bel and
                  Frieder Uhlig and
                  Harald Baier and
                  Frank Breitinger},
  title        = {{FRASHER} - {A} framework for automated evaluation of similarity hashing},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301407},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301407},
  doi          = {10.1016/J.FSIDI.2022.301407},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GobelUBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JakobsLH22,
  author       = {Carlo Jakobs and
                  Martin Lambertz and
                  Jan{-}Niclas Hilgert},
  title        = {ssdeeper: Evaluating and improving ssdeep},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301402},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301402},
  doi          = {10.1016/J.FSIDI.2022.301402},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JakobsLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JohnsonVSGB22,
  author       = {Hailey Johnson and
                  Karl Volk and
                  Robert Serafin and
                  Cinthya Grajeda and
                  Ibrahim M. Baggili},
  title        = {Alt-tech social forensics: Forensic analysis of alternative social
                  networking applications},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301406},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301406},
  doi          = {10.1016/J.FSIDI.2022.301406},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JohnsonVSGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LiSL22,
  author       = {Qi Li and
                  Giuliano Sovernigo and
                  Xiaodong Lin},
  title        = {BlackFeather: {A} framework for background noise forensics},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301396},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301396},
  doi          = {10.1016/J.FSIDI.2022.301396},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LiSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MannaCAR22,
  author       = {Modhuparna Manna and
                  Andrew Case and
                  Aisha I. Ali{-}Gombe and
                  Golden G. Richard III},
  title        = {Memory analysis of .NET and .Net Core applications},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301404},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301404},
  doi          = {10.1016/J.FSIDI.2022.301404},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MannaCAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NguyenOA22,
  author       = {Thanh Nguyen and
                  Meni Orenbach and
                  Ahmad Atamli},
  title        = {Live system call trace reconstruction on Linux},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301398},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301398},
  doi          = {10.1016/J.FSIDI.2022.301398},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NguyenOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderEF22,
  author       = {Janine Schneider and
                  Maximilian Eichhorn and
                  Felix C. Freiling},
  title        = {Ambiguous file system partitions},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301399},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301399},
  doi          = {10.1016/J.FSIDI.2022.301399},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderEF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SentanoeDR22,
  author       = {Stewart Sentanoe and
                  Thomas Dangl and
                  Hans P. Reiser},
  title        = {\emph{KVMIveggur}: Flexible, secure, and efficient support for self-service
                  virtual machine introspection},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301397},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301397},
  doi          = {10.1016/J.FSIDI.2022.301397},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SentanoeDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShiCG22,
  author       = {Chen Shi and
                  Chris Chao{-}Chun Cheng and
                  Yong Guan},
  title        = {LibDroid: Summarizing information flow of android native libraries
                  via static analysis},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301405},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301405},
  doi          = {10.1016/J.FSIDI.2022.301405},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShiCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Solanke22,
  author       = {Abiodun A. Solanke},
  title        = {Explainable digital forensics {AI:} Towards mitigating distrust in
                  AI-based digital forensics analysis using interpretable models},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301403},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301403},
  doi          = {10.1016/J.FSIDI.2022.301403},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Solanke22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WangLCC22,
  author       = {Tianyi Wang and
                  Ming Liu and
                  Wei Cao and
                  Kam{-}Pui Chow},
  title        = {Deepfake noise investigation and detection},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301395},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301395},
  doi          = {10.1016/J.FSIDI.2022.301395},
  timestamp    = {Mon, 28 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WangLCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WangZDTB22,
  author       = {Enoch Wang and
                  Samuel Zurowski and
                  Orion Duffy and
                  Tyler Thomas and
                  Ibrahim M. Baggili},
  title        = {Juicing {V8:} {A} primary account for the memory forensics of the
                  {V8} JavaScript engine},
  journal      = {Digit. Investig.},
  volume       = {42},
  number       = {Supplement},
  pages        = {301400},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301400},
  doi          = {10.1016/J.FSIDI.2022.301400},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WangZDTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlendalAD21,
  author       = {Gunnar Alendal and
                  Stefan Axelsson and
                  Geir Olav Dyrkolbotn},
  title        = {Chip chop - smashing the mobile phone secure chip for fun and digital
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301191},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301191},
  doi          = {10.1016/J.FSIDI.2021.301191},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AlendalAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChengSGG21,
  author       = {Chris Chao{-}Chun Cheng and
                  Chen Shi and
                  Neil Zhenqiang Gong and
                  Yong Guan},
  title        = {LogExtractor: Extracting digital evidence from android log messages
                  via string and taint analysis},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301193},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301193},
  doi          = {10.1016/J.FSIDI.2021.301193},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChengSGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HranickyBRSSMM21,
  author       = {Radek Hranick{\'{y}} and
                  Frank Breitinger and
                  Ondrej Rysav{\'{y}} and
                  John Sheppard and
                  Florin Schaedler and
                  Holger Morgenstern and
                  Simon Malik},
  title        = {What do incident response practitioners need to know? {A} skillmap
                  for the years ahead},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301184},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301184},
  doi          = {10.1016/J.FSIDI.2021.301184},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HranickyBRSSMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KantaCCS21,
  author       = {Aikaterini Kanta and
                  Sein Coray and
                  Iwen Coisel and
                  Mark Scanlon},
  title        = {How viable is password cracking in digital forensic investigation?
                  Analyzing the guessability of over 3.9 billion real-world accounts},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301186},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301186},
  doi          = {10.1016/J.FSIDI.2021.301186},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KantaCCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeMD21,
  author       = {Anh Duc Le and
                  Justin P. L. McGuinness and
                  Edward Dixon},
  title        = {ChunkedHCs algorithm for authorship verification problems: Reddit
                  case study},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301185},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301185},
  doi          = {10.1016/J.FSIDI.2021.301185},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MaggioCAR21,
  author       = {Ryan D. Maggio and
                  Andrew Case and
                  Aisha I. Ali{-}Gombe and
                  Golden G. Richard III},
  title        = {Seance: Divination of tool-breaking changes in forensically important
                  binaries},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301189},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301189},
  doi          = {10.1016/J.FSIDI.2021.301189},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MaggioCAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McCulloughAOB21,
  author       = {Syria McCullough and
                  Stella Abudu and
                  Ebere Onwubuariri and
                  Ibrahim M. Baggili},
  title        = {Another brick in the wall: An exploratory analysis of digital forensics
                  programs in the United States},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301187},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301187},
  doi          = {10.1016/J.FSIDI.2021.301187},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/McCulloughAOB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NeshenkoBF21,
  author       = {Nataliia Neshenko and
                  Elias Bou{-}Harb and
                  Borko Furht},
  title        = {A behavioral-based forensic investigation approach for analyzing attacks
                  on water plants using GANs},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301198},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301198},
  doi          = {10.1016/J.FSIDI.2021.301198},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NeshenkoBF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OShaughnessyB21,
  author       = {Stephen O'Shaughnessy and
                  Frank Breitinger},
  title        = {Malware family classification via efficient Huffman features},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301192},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301192},
  doi          = {10.1016/J.FSIDI.2021.301192},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OShaughnessyB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RaisALA21,
  author       = {Muhammad Haris Rais and
                  Rima Asmar Awad and
                  Juan Lopez Jr. and
                  Irfan Ahmed},
  title        = {JTAG-based {PLC} memory acquisition framework for industrial control
                  systems},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301196},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301196},
  doi          = {10.1016/J.FSIDI.2021.301196},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RaisALA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RathoreSSS21,
  author       = {Hemant Rathore and
                  Adithya Samavedhi and
                  Sanjay K. Sahay and
                  Mohit Sewak},
  title        = {Robust Malware Detection Models: Learning from Adversarial Attacks
                  and Defenses},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301183},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301183},
  doi          = {10.1016/J.FSIDI.2021.301183},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RathoreSSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SandvikFAA21,
  author       = {Jens{-}Petter Sandvik and
                  Katrin Franke and
                  Habtamu Abie and
                  Andr{\'{e}} {\AA}rnes},
  title        = {Coffee forensics - Reconstructing data in IoT devices running Contiki
                  {OS}},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301188},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301188},
  doi          = {10.1016/J.FSIDI.2021.301188},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SandvikFAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SerhalL21,
  author       = {Cezar Serhal and
                  Nhien{-}An Le{-}Khac},
  title        = {Machine learning based approach to analyze file meta data for smart
                  phone file triage},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301194},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301194},
  doi          = {10.1016/J.FSIDI.2021.301194},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SerhalL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SilvaVSBACCSLJ21,
  author       = {Iaslan Silva and
                  Jo{\~{a}}o Marcos do Valle and
                  Gabriel Souza and
                  Jaine Budke and
                  Daniel Ara{\'{u}}jo and
                  Bruno Carvalho and
                  N{\'{e}}lio Cacho and
                  Henrique Sales and
                  Frederico Lopes and
                  Rivaldo Silva Junior},
  title        = {Using micro-services and artificial intelligence to analyze images
                  in criminal evidences},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301197},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301197},
  doi          = {10.1016/J.FSIDI.2021.301197},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SilvaVSBACCSLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sparling21,
  author       = {Aaron Sparling},
  title        = {Twenty first Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301262},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301262},
  doi          = {10.1016/J.FSIDI.2021.301262},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Sparling21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThomasPNB21,
  author       = {Tyler Thomas and
                  Mathew Piscitelli and
                  Bhavik Ashok Nahar and
                  Ibrahim M. Baggili},
  title        = {Duck Hunt: Memory forensics of {USB} attack platforms},
  journal      = {Digit. Investig.},
  volume       = {37 Supplement},
  pages        = {301190},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.fsidi.2021.301190},
  doi          = {10.1016/J.FSIDI.2021.301190},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThomasPNB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMMR20,
  author       = {Andrew Case and
                  Ryan D. Maggio and
                  Modhuparna Manna and
                  Golden G. Richard III},
  title        = {Memory Analysis of macOS Page Queues},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301004},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301004},
  doi          = {10.1016/J.FSIDI.2020.301004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DoraiAPP20,
  author       = {Gokila Dorai and
                  Sudhir Aggarwal and
                  Neet Patel and
                  Charisa Powell},
  title        = {{VIDE} - Vault App Identification and Extraction System for iOS Devices},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301007},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301007},
  doi          = {10.1016/J.FSIDI.2020.301007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DoraiAPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GalbraithSS20,
  author       = {Christopher Galbraith and
                  Padhraic Smyth and
                  Hal S. Stern},
  title        = {Statistical Methods for the Forensic Analysis of Geolocated Event
                  Data},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301009},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301009},
  doi          = {10.1016/J.FSIDI.2020.301009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GalbraithSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HassenfeldtJB20,
  author       = {Courtney Hassenfeldt and
                  Jillian Jacques and
                  Ibrahim M. Baggili},
  title        = {Exploring the Learning Efficacy of Digital Forensics Concepts and
                  Bagging {\&} Tagging of Digital Devices in Immersive Virtual Reality},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301011},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301011},
  doi          = {10.1016/J.FSIDI.2020.301011},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HassenfeldtJB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarresandDA20,
  author       = {Martin Karresand and
                  Geir Olav Dyrkolbotn and
                  Stefan Axelsson},
  title        = {An Empirical Study of the {NTFS} Cluster Allocation Behavior Over
                  Time},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301008},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301008},
  doi          = {10.1016/J.FSIDI.2020.301008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarresandDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nelson20a,
  author       = {Alex Nelson},
  title        = {Twentieth Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301028},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301028},
  doi          = {10.1016/J.FSIDI.2020.301028},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Nelson20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NordvikPTAF20,
  author       = {Rune Nordvik and
                  Kyle Porter and
                  Fergus Toolan and
                  Stefan Axelsson and
                  Katrin Franke},
  title        = {Generic Metadata Time Carving},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301005},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301005},
  doi          = {10.1016/J.FSIDI.2020.301005},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NordvikPTAF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PalutkeBRS20,
  author       = {Ralph Palutke and
                  Frank Block and
                  Patrick Reichenberger and
                  Dominik Stripeika},
  title        = {Hiding Process Memory Via Anti-Forensic Techniques},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301012},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301012},
  doi          = {10.1016/J.FSIDI.2020.301012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PalutkeBRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/QasimSA20,
  author       = {Syed Ali Qasim and
                  Jared M. Smith and
                  Irfan Ahmed},
  title        = {Control Logic Forensics Framework using Built-in Decompiler of Engineering
                  Software in Industrial Control Systems},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301013},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301013},
  doi          = {10.1016/J.FSIDI.2020.301013},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/QasimSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SayakkaraLS20a,
  author       = {Asanka P. Sayakkara and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation:
                  Evaluating the EMvidence Framework},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301003},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301003},
  doi          = {10.1016/J.FSIDI.2020.301003},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SayakkaraLS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchneiderDMF20,
  author       = {Janine Schneider and
                  Hans{-}Peter Deifel and
                  Stefan Milius and
                  Felix C. Freiling},
  title        = {Unifying Metadata-Based Storage Reconstruction and Carving with {LAYR}},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301006},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301006},
  doi          = {10.1016/J.FSIDI.2020.301006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SchneiderDMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShinKKYJS20,
  author       = {Yeonghun Shin and
                  Hyungchan Kim and
                  Sungbum Kim and
                  Dongkyun Yoo and
                  Wooyeon Jo and
                  Taeshik Shon},
  title        = {Certificate Injection-Based Encrypted Traffic Forensics in {AI} Speaker
                  Ecosystem},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301010},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301010},
  doi          = {10.1016/J.FSIDI.2020.301010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ShinKKYJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThomasPSB20,
  author       = {Tyler Thomas and
                  Mathew Piscitelli and
                  Ilya Shavrov and
                  Ibrahim M. Baggili},
  title        = {Memory {FORESHADOW:} Memory FOREnSics of HArDware CryptOcurrency wallets
                  - {A} Tool and Visualization Framework},
  journal      = {Digit. Investig.},
  volume       = {33 Supplement},
  pages        = {301002},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.fsidi.2020.301002},
  doi          = {10.1016/J.FSIDI.2020.301002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThomasPSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BlockD19,
  author       = {Frank Block and
                  Andreas Dewald},
  title        = {Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected
                  Code by Examining Page Table Entries},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S3--S12},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.008},
  doi          = {10.1016/J.DIIN.2019.04.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BlockD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseJFMASR19,
  author       = {Andrew Case and
                  Mohammad M. Jalalzai and
                  Md Firoz{-}Ul{-}Amin and
                  Ryan D. Maggio and
                  Aisha I. Ali{-}Gombe and
                  Mingxuan Sun and
                  Golden G. Richard III},
  title        = {HookTracer: {A} System for Automated and Accessible {API} Hooks Analysis},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S104--S112},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.011},
  doi          = {10.1016/J.DIIN.2019.04.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseJFMASR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyLBB19,
  author       = {Peter Casey and
                  Rebecca Lindsay{-}Decusati and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Inception: Virtual Space in Memory Space in Real Space - Memory Forensics
                  of Immersive Virtual Reality with the {HTC} Vive},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S13--S21},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.007},
  doi          = {10.1016/J.DIIN.2019.04.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CaseyLBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChangGSSW19,
  author       = {Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya and
                  Monika Singh and
                  Douglas R. White},
  title        = {FbHash: {A} New Similarity Hashing Scheme for Digital Forensics},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S113--S123},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.006},
  doi          = {10.1016/J.DIIN.2019.04.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChangGSSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FukamiN19,
  author       = {Aya Fukami and
                  Kazuhiro Nishimura},
  title        = {Forensic Analysis of Water Damaged Mobile Devices},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S71--S79},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.009},
  doi          = {10.1016/J.DIIN.2019.04.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/FukamiN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HilgertLRS19,
  author       = {Jan{-}Niclas Hilgert and
                  Martin Lambertz and
                  Mariia Rybalka and
                  Roman Schell},
  title        = {Syntactical Carving of PNGs and Automated Generation of Reproducible
                  Datasets},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S22--S30},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.014},
  doi          = {10.1016/J.DIIN.2019.04.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HilgertLRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JoSKYKKJONS19,
  author       = {Wooyeon Jo and
                  Yeonghun Shin and
                  Hyungchan Kim and
                  Dongkyun Yoo and
                  Donghyun Kim and
                  Cheulhoon Kang and
                  Jongmin Jin and
                  Jungkyung Oh and
                  Bitna Na and
                  Taeshik Shon},
  title        = {Digital Forensic Practices and Methodologies for {AI} Speaker Ecosystems},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S80--S93},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.013},
  doi          = {10.1016/J.DIIN.2019.04.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JoSKYKKJONS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarresandAD19,
  author       = {Martin Karresand and
                  Stefan Axelsson and
                  Geir Olav Dyrkolbotn},
  title        = {Using {NTFS} Cluster Allocation Behavior to Find the Location of User
                  Data},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S51--S60},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.018},
  doi          = {10.1016/J.DIIN.2019.04.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarresandAD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MengB19,
  author       = {Christian Meng and
                  Harald Baier},
  title        = {bring2lite: {A} Structural Concept and Tool for Forensic Data Analysis
                  and Recovery of Deleted SQLite Records},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S31--S41},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.017},
  doi          = {10.1016/J.DIIN.2019.04.017},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MengB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PessolanoRSX19,
  author       = {Gus Pessolano and
                  Huw Read and
                  Iain Sutherland and
                  Konstantinos Xynos},
  title        = {Forensic Analysis of the Nintendo 3DS {NAND}},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S61--S70},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.015},
  doi          = {10.1016/J.DIIN.2019.04.015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/PessolanoRSX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SanchezGBH19,
  author       = {Laura S{\'{a}}nchez and
                  Cinthya Grajeda and
                  Ibrahim M. Baggili and
                  Cory Lloyd Hall},
  title        = {A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering,
                  {\&} Safer Presentation for Investigating Child Sexual Abuse Material
                  {(CSAM)}},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S124--S142},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.005},
  doi          = {10.1016/J.DIIN.2019.04.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SanchezGBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SayakkaraLS19a,
  author       = {Asanka P. Sayakkara and
                  Nhien{-}An Le{-}Khac and
                  Mark Scanlon},
  title        = {Leveraging Electromagnetic Side-Channel Analysis for the Investigation
                  of IoT Devices},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S94--S103},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.012},
  doi          = {10.1016/J.DIIN.2019.04.012},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SayakkaraLS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schatz19,
  author       = {Bradley L. Schatz},
  title        = {{AFF4-L:} {A} Scalable Open Logical Evidence Container},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S143--S149},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.016},
  doi          = {10.1016/J.DIIN.2019.04.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schatz19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRHJG19,
  author       = {James Wagner and
                  Alexander Rasin and
                  Karen Heart and
                  Rebecca Jacob and
                  Jonathan Grier},
  title        = {{DB3F} {\&} DF-Toolkit: The Database Forensic File Format and
                  the Database Forensic Toolkit},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S42--S50},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.010},
  doi          = {10.1016/J.DIIN.2019.04.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRHJG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-kawazCFL18,
  author       = {Hiba Al{-}Kawaz and
                  Nathan L. Clarke and
                  Steven Furnell and
                  Fudong Li},
  title        = {Facial-Forensic Analysis Tool},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S136},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.008},
  doi          = {10.1016/J.DIIN.2018.04.008},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Al-kawazCFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AwasthiRXS18,
  author       = {Akshay Awasthi and
                  Huw Read and
                  Konstantinos Xynos and
                  Iain Sutherland},
  title        = {Welcome pwn: Almond smart home hub forensics},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S38--S46},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.014},
  doi          = {10.1016/J.DIIN.2018.04.014},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AwasthiRXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaninD18,
  author       = {Sergii Banin and
                  Geir Olav Dyrkolbotn},
  title        = {Multinomial malware classification via low-level features},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S107--S117},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.019},
  doi          = {10.1016/J.DIIN.2018.04.019},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaninD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BhattA18,
  author       = {Manish Bhatt and
                  Irfan Ahmed},
  title        = {Leveraging relocations in ELF-binaries for Linux kernel version identification},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S12--S20},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.022},
  doi          = {10.1016/J.DIIN.2018.04.022},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BhattA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrajedaSBCB18,
  author       = {Cinthya Grajeda and
                  Laura S{\'{a}}nchez and
                  Ibrahim M. Baggili and
                  Devon Clark and
                  Frank Breitinger},
  title        = {Experience constructing the Artifact Genome Project {(AGP):} Managing
                  the domain's knowledge one artifact at a time},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S47--S58},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.021},
  doi          = {10.1016/J.DIIN.2018.04.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GrajedaSBCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HilgertLY18,
  author       = {Jan{-}Niclas Hilgert and
                  Martin Lambertz and
                  Shujian Yang},
  title        = {Forensic analysis of multiple device {BTRFS} configurations using
                  The Sleuth Kit},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S21--S29},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.020},
  doi          = {10.1016/J.DIIN.2018.04.020},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HilgertLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman18a,
  author       = {Graeme Horsman},
  title        = {Reconstructing streamed video content: {A} case study on YouTube and
                  Facebook Live stream content in the Chrome web browser cache},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S30--S37},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.017},
  doi          = {10.1016/J.DIIN.2018.04.017},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Horsman18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KaoCS18,
  author       = {Da{-}Yu Kao and
                  Yuanpei Chen and
                  Neng{-}Hsin Shih},
  title        = {Reconstructing {ADS} data hiding in windows {NTFS:} {A} temporal analysis},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S137},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.009},
  doi          = {10.1016/J.DIIN.2018.04.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KaoCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KouwenSCL18,
  author       = {Arie Kouwen and
                  Mark Scanlon and
                  Kim{-}Kwang Raymond Choo and
                  Nhien{-}An Le{-}Khac},
  title        = {Digital forensic investigation of two-way radio communication equipment
                  and services},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S77--S86},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.007},
  doi          = {10.1016/J.DIIN.2018.04.007},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KouwenSCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LambertzHS18,
  author       = {Martin Lambertz and
                  Jan{-}Niclas Hilgert and
                  Roman Schell},
  title        = {Resurrecting Portable Network Graphics using block generators},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S138},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.010},
  doi          = {10.1016/J.DIIN.2018.04.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LambertzHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeBNS18,
  author       = {Quan Le and
                  Ois{\'{\i}}n Boydell and
                  Brian Mac Namee and
                  Mark Scanlon},
  title        = {Deep learning at the shallow end: Malware classification for non-domain
                  experts},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S118--S126},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.024},
  doi          = {10.1016/J.DIIN.2018.04.024},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeBNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LewisCAR18,
  author       = {Nathan Lewis and
                  Andrew Case and
                  Aisha I. Ali{-}Gombe and
                  Golden G. Richard III},
  title        = {Memory forensics and the Windows Subsystem for Linux},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S3--S11},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.018},
  doi          = {10.1016/J.DIIN.2018.04.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LewisCAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LinCZYW18,
  author       = {Xiaodong Lin and
                  Ting Chen and
                  Tong Zhu and
                  Kun Yang and
                  Fengguo Wei},
  title        = {Automated forensic analysis of mobile applications on Android devices},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S59--S66},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.012},
  doi          = {10.1016/J.DIIN.2018.04.012},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LinCZYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MosliYP18,
  author       = {Rayan Mosli and
                  Bo Yuan and
                  Yin Pan},
  title        = {On the viability of data collection using Google Rapid Response for
                  enterprise-level malware research},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S139},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.011},
  doi          = {10.1016/J.DIIN.2018.04.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MosliYP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Porter18,
  author       = {Kyle Porter},
  title        = {Analyzing the DarkNetMarkets subreddit for evolutions of tools and
                  trends using {LDA} topic modeling},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S87--S97},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.023},
  doi          = {10.1016/J.DIIN.2018.04.023},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Porter18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TaubmannAR18,
  author       = {Benjamin Taubmann and
                  Omar Alabduljaleel and
                  Hans P. Reiser},
  title        = {DroidKex: Fast extraction of ephemeral {TLS} keys from the memory
                  of Android apps},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S67--S76},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.013},
  doi          = {10.1016/J.DIIN.2018.04.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TaubmannAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThompsonV18,
  author       = {Michael F. Thompson and
                  Timothy Vidas},
  title        = {Cyber Grand Challenge {(CGC)} monitor: {A} vetting system for the
                  {DARPA} cyber grand challenge},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S127--S135},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.016},
  doi          = {10.1016/J.DIIN.2018.04.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThompsonV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TuzelBZLT18,
  author       = {Tomasz Tuzel and
                  Mark P. Bridgman and
                  Joshua Zepf and
                  Tamas K. Lengyel and
                  Kyle J. Temkin},
  title        = {Who watches the watcher? Detecting hypervisor introspection from unprivileged
                  guests},
  journal      = {Digit. Investig.},
  volume       = {26 Supplement},
  pages        = {S98--S106},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.04.015},
  doi          = {10.1016/J.DIIN.2018.04.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TuzelBZLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BlockD17,
  author       = {Frank Block and
                  Andreas Dewald},
  title        = {Linux memory forensics: Dissecting the user space process heap},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S66--S75},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.002},
  doi          = {10.1016/J.DIIN.2017.06.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BlockD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseDPRR17,
  author       = {Andrew Case and
                  Arghya Kusum Das and
                  Seung{-}Jong Park and
                  J. Ramanujam and
                  Golden G. Richard III},
  title        = {Gaslight: {A} comprehensive fuzzing architecture for memory forensics
                  frameworks},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S86--S93},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.011},
  doi          = {10.1016/J.DIIN.2017.06.011},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CaseDPRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChungPL17,
  author       = {Hyunji Chung and
                  Jungheum Park and
                  Sangjin Lee},
  title        = {Digital forensic approaches for Amazon Alexa ecosystem},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S15--S25},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.010},
  doi          = {10.1016/J.DIIN.2017.06.010},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChungPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ClarkMBB17,
  author       = {Devon Clark and
                  Christopher Meffert and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {{DROP} (DRone Open source Parser) your drone: Forensic analysis of
                  the {DJI} Phantom {III}},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S3--S14},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.013},
  doi          = {10.1016/J.DIIN.2017.06.013},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ClarkMBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DentonKBB17,
  author       = {George Denton and
                  Filip Karp{\'{\i}}sek and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Leveraging the {SRTP} protocol for over-the-network memory acquisition
                  of a {GE} Fanuc Series 90-30},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S26--S38},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.005},
  doi          = {10.1016/J.DIIN.2017.06.005},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DentonKBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GalbraithS17,
  author       = {Christopher Galbraith and
                  Padhraic Smyth},
  title        = {Analyzing user-event data using score-based likelihood ratios with
                  marked point processes},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S106--S114},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.009},
  doi          = {10.1016/J.DIIN.2017.06.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GalbraithS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrajedaBB17,
  author       = {Cinthya Grajeda and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Availability of datasets for digital forensics - And what is missing},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S94--S105},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.004},
  doi          = {10.1016/J.DIIN.2017.06.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrajedaBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HilgertLP17,
  author       = {Jan{-}Niclas Hilgert and
                  Martin Lambertz and
                  Daniel Plohmann},
  title        = {Extending The Sleuth Kit and its underlying model for pooled storage
                  file system forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S76--S85},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.003},
  doi          = {10.1016/J.DIIN.2017.06.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HilgertLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MillerGCDLP17,
  author       = {Cody Miller and
                  Dae Glendowne and
                  Henry Cook and
                  Thomas DeMarcus and
                  Chris Lanclos and
                  Patrick Pape},
  title        = {Insights gained from constructing a large scale dynamic analysis platform},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S48--S56},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.007},
  doi          = {10.1016/J.DIIN.2017.06.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MillerGCDLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SenthivelAR17,
  author       = {Saranyan Senthivel and
                  Irfan Ahmed and
                  Vassil Roussev},
  title        = {{SCADA} network forensics of the {PCCC} protocol},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S57--S65},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.012},
  doi          = {10.1016/J.DIIN.2017.06.012},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SenthivelAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StellyR17,
  author       = {Christopher Stelly and
                  Vassil Roussev},
  title        = {{SCARF:} {A} container-based approach to cloud-scale digital forensic
                  processing},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S39--S47},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.008},
  doi          = {10.1016/J.DIIN.2017.06.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StellyR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRGHFBG17,
  author       = {James Wagner and
                  Alexander Rasin and
                  Boris Glavic and
                  Karen Heart and
                  Jacob D. Furst and
                  Lucas Bressan and
                  Jonathan Grier},
  title        = {Carving database storage to detect and trace security breaches},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S127--S136},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.006},
  doi          = {10.1016/J.DIIN.2017.06.006},
  timestamp    = {Thu, 14 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRGHFBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Zheng0LT17,
  author       = {Lilei Zheng and
                  Ying Zhang and
                  Chien Eao Lee and
                  Vrizlynn L. L. Thing},
  title        = {Time-of-recording estimation for audio recordings},
  journal      = {Digit. Investig.},
  volume       = {22 Supplement},
  pages        = {S115--S126},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.06.001},
  doi          = {10.1016/J.DIIN.2017.06.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Zheng0LT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Alrabaee0D16,
  author       = {Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics
                  of binary code as semantic flow graphs (SFGs)},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S11--S22},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.002},
  doi          = {10.1016/J.DIIN.2016.04.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseR16,
  author       = {Andrew Case and
                  Golden G. Richard III},
  title        = {Detecting objective-C malware through memory forensics},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S3--S10},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.017},
  doi          = {10.1016/J.DIIN.2016.04.017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ConlanBB16,
  author       = {Kevin J. Conlan and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Anti-forensics: Furthering digital forensic science through a new
                  extended, granular taxonomy},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S66--S75},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.006},
  doi          = {10.1016/J.DIIN.2016.04.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ConlanBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuidoBG16,
  author       = {Mark D. Guido and
                  Jonathan Buttner and
                  Justin Grover},
  title        = {Rapid differential forensic imaging of mobile devices},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S46--S54},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.012},
  doi          = {10.1016/J.DIIN.2016.04.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuidoBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HarichandranWBB16,
  author       = {Vikram S. Harichandran and
                  Daniel Walnycky and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {CuFA: {A} more formal definition for digital forensic artifacts},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S125--S137},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.005},
  doi          = {10.1016/J.DIIN.2016.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HarichandranWBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KarbabDM16,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Djedjiga Mouheb},
  title        = {Fingerprinting Android packaging: Generating DNAs for malware detection},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S33--S45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.013},
  doi          = {10.1016/J.DIIN.2016.04.013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KarbabDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimPL16,
  author       = {Jeonghyeon Kim and
                  Aran Park and
                  Sangjin Lee},
  title        = {Recovery method of deleted records and tables from {ESE} database},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S118--S124},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.003},
  doi          = {10.1016/J.DIIN.2016.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/KimPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KovenBDM16,
  author       = {Jay Koven and
                  Enrico Bertini and
                  R. Luke DuBois and
                  Nasir D. Memon},
  title        = {InVEST: Intelligent visual email search and triage},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S138--S148},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.008},
  doi          = {10.1016/J.DIIN.2016.04.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KovenBDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeHKN16,
  author       = {Kyoungho Lee and
                  Hyunuk Hwang and
                  Kibom Kim and
                  BongNam Noh},
  title        = {Robust bootstrapping memory analysis against anti-forensics},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S23--S32},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.009},
  doi          = {10.1016/J.DIIN.2016.04.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeHKN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MabeyD0A16,
  author       = {Mike Mabey and
                  Adam Doup{\'{e}} and
                  Ziming Zhao and
                  Gail{-}Joon Ahn},
  title        = {dbling: Identifying extensions installed on encrypted web thin clients},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S55--S65},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.007},
  doi          = {10.1016/J.DIIN.2016.04.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MabeyD0A16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/McGrath16,
  author       = {Niall McGrath},
  title        = {Forensically extracting file encrypted contents on {OS} {X} using
                  {HFS+} journal file},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S157},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.014},
  doi          = {10.1016/J.DIIN.2016.04.014},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/McGrath16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MeffertBB16,
  author       = {Christopher Meffert and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Deleting collected digital evidence by exploiting a widely adopted
                  hardware write blocker},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S87--S96},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.004},
  doi          = {10.1016/J.DIIN.2016.04.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MeffertBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NeunerSW16,
  author       = {Sebastian Neuner and
                  Martin Schmiedecker and
                  Edgar R. Weippl},
  title        = {\emph{PeekaTorrent}: Leveraging {P2P} hash values for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S149--S156},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.011},
  doi          = {10.1016/J.DIIN.2016.04.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/NeunerSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NeunerVSB0W16,
  author       = {Sebastian Neuner and
                  Artemios G. Voyiatzis and
                  Martin Schmiedecker and
                  Stefan Brunthaler and
                  Stefan Katzenbeisser and
                  Edgar R. Weippl},
  title        = {Time is on my side: Steganography in filesystem metadata},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S76--S86},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.010},
  doi          = {10.1016/J.DIIN.2016.04.010},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NeunerVSB0W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TangFCYXFL016,
  author       = {Yanbin Tang and
                  Junbin Fang and
                  Kam{-}Pui Chow and
                  Siu{-}Ming Yiu and
                  Jun Xu and
                  Bo Feng and
                  Qiong Li and
                  Qi Han},
  title        = {Recovery of heavily fragmented {JPEG} files},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S108--S117},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.016},
  doi          = {10.1016/J.DIIN.2016.04.016},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TangFCYXFL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRG16,
  author       = {James Wagner and
                  Alexander Rasin and
                  Jonathan Grier},
  title        = {Database image content explorer: Carving data that does not officially
                  exist},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S97--S107},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.015},
  doi          = {10.1016/J.DIIN.2016.04.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArmknechtD15,
  author       = {Frederik Armknecht and
                  Andreas Dewald},
  title        = {Privacy-preserving email forensics},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S127--S136},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.003},
  doi          = {10.1016/J.DIIN.2015.05.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ArmknechtD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BalzarottiPV15,
  author       = {Davide Balzarotti and
                  Roberto Di Pietro and
                  Antonio Villani},
  title        = {The impact of GPU-assisted malware on memory forensics: {A} case study},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S16--S24},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.010},
  doi          = {10.1016/J.DIIN.2015.05.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BoukhtoutaMDAIB15,
  author       = {Amine Boukhtouta and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Omar Alfandi and
                  Farkhund Iqbal and
                  May El Barachi},
  title        = {Graph-theoretic characterization of cyber-threat infrastructures},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S3--S15},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.002},
  doi          = {10.1016/J.DIIN.2015.05.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseR15,
  author       = {Andrew Case and
                  Golden G. Richard III},
  title        = {Advancing Mac {OS} {X} rootkit detection},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S25--S33},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.005},
  doi          = {10.1016/J.DIIN.2015.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Clemens15,
  author       = {John Clemens},
  title        = {Automatic classification of object code using machine learning},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S156--S162},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.007},
  doi          = {10.1016/J.DIIN.2015.05.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Clemens15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DietrichA15,
  author       = {Dianne Dietrich and
                  Frank Adelstein},
  title        = {Archival science, digital forensics, and new media art},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S137--S145},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.004},
  doi          = {10.1016/J.DIIN.2015.05.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DietrichA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelM15,
  author       = {Simson L. Garfinkel and
                  Michael McCarrin},
  title        = {Hash-based carving: Searching media for complete files and file fragments
                  with sector hashing and hashdb},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S95--S105},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.001},
  doi          = {10.1016/J.DIIN.2015.05.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GrierR15,
  author       = {Jonathan Grier and
                  Golden G. Richard III},
  title        = {Rapid forensic imaging of large disks with sifting collectors},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S34--S44},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.006},
  doi          = {10.1016/J.DIIN.2015.05.006},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GrierR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LarbanetLD15,
  author       = {Adrien Larbanet and
                  Jonas Lerebours and
                  J. P. David},
  title        = {Detecting very large sets of referenced files at 40/100 GbE, especially
                  {MP4} files},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S85--S94},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.011},
  doi          = {10.1016/J.DIIN.2015.05.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LarbanetLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RahimianSAWD15,
  author       = {Ashkan Rahimian and
                  Paria Shirani and
                  Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {BinComp: {A} stratified approach to compiler provenance Attribution},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S146--S155},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.015},
  doi          = {10.1016/J.DIIN.2015.05.015},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schatz15,
  author       = {Bradley L. Schatz},
  title        = {Wirespeed: Extending the {AFF4} forensic container format for scalable
                  acquisition and live analysis},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S45--S54},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.016},
  doi          = {10.1016/J.DIIN.2015.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schatz15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchmidIF15,
  author       = {Michael R. Schmid and
                  Farkhund Iqbal and
                  Benjamin C. M. Fung},
  title        = {E-mail authorship attribution using customized associative classification},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S116--S126},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.012},
  doi          = {10.1016/J.DIIN.2015.05.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SchmidIF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schweinsberg15,
  author       = {Elizabeth Schweinsberg},
  title        = {Fifteenth Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S1--S2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.07.001},
  doi          = {10.1016/J.DIIN.2015.07.001},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schweinsberg15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WagnerRG15,
  author       = {James Wagner and
                  Alexander Rasin and
                  Jonathan Grier},
  title        = {Database forensic analysis through internal structure carving},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S106--S115},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.013},
  doi          = {10.1016/J.DIIN.2015.05.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WagnerRG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WalnyckyBMMB15,
  author       = {Daniel Walnycky and
                  Ibrahim M. Baggili and
                  Andrew Marrington and
                  Jason Moore and
                  Frank Breitinger},
  title        = {Network and device forensic analysis of Android social-messaging applications},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S77--S84},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.009},
  doi          = {10.1016/J.DIIN.2015.05.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WalnyckyBMMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/YangCKC15,
  author       = {Seung Jei Yang and
                  Jung Ho Choi and
                  Ki Bom Kim and
                  Taejoo Chang},
  title        = {New acquisition method based on firmware update protocols for Android
                  smartphones},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S68--S76},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.008},
  doi          = {10.1016/J.DIIN.2015.05.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/YangCKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZawoadHG15,
  author       = {Shams Zawoad and
                  Ragib Hasan and
                  John Grimes},
  title        = {{LINCS:} Towards building a trustworthy litigation hold enabled cloud
                  storage system},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S55--S67},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.014},
  doi          = {10.1016/J.DIIN.2015.05.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZawoadHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeebeL14a,
  author       = {Nicole Lang Beebe and
                  Lishu Liu},
  title        = {Ranking algorithms for digital forensic string search hits},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S124--S132},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.007},
  doi          = {10.1016/J.DIIN.2014.05.007},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeebeL14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Bou-HarbLBD14,
  author       = {Elias Bou{-}Harb and
                  Nour{-}Eddine Lakhdari and
                  Hamad Binsalleeh and
                  Mourad Debbabi},
  title        = {Multidimensional investigation of source port 0 probing},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S114--S123},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.012},
  doi          = {10.1016/J.DIIN.2014.05.012},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyZ14,
  author       = {Eoghan Casey and
                  Rikkert Zoun},
  title        = {Design tradeoffs for developing fragmented video carving tools},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S30--S39},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.010},
  doi          = {10.1016/J.DIIN.2014.05.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CaseyZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChabotBNK14,
  author       = {Yoan Chabot and
                  Aur{\'{e}}lie Bertaux and
                  Christophe Nicolle and
                  M. Tahar Kechadi},
  title        = {A complete formalized knowledge representation model for advanced
                  digital forensics timeline analysis},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S95--S105},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.009},
  doi          = {10.1016/J.DIIN.2014.05.009},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChabotBNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KumarOTPP14,
  author       = {Vijay Kumar and
                  George C. Oikonomou and
                  Theo Tryfonas and
                  Dan Page and
                  Iain W. Phillips},
  title        = {Digital investigations for IPv6-based Wireless Sensor Networks},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S66--S75},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.005},
  doi          = {10.1016/J.DIIN.2014.05.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KumarOTPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LangBCD14,
  author       = {Anthony Lang and
                  Masooda N. Bashir and
                  Roy H. Campbell and
                  Lizanne DeStefano},
  title        = {Developing a new digital forensics curriculum},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S76--S84},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.008},
  doi          = {10.1016/J.DIIN.2014.05.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/LangBCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MohamedMIB14,
  author       = {Ahmed Fathy Abdul Latif Mohamed and
                  Andrew Marrington and
                  Farkhund Iqbal and
                  Ibrahim M. Baggili},
  title        = {Testing the forensic soundness of forensic examination environments
                  on bootable media},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S22--S29},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.015},
  doi          = {10.1016/J.DIIN.2014.05.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MohamedMIB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MooreBMR14,
  author       = {Jason Moore and
                  Ibrahim M. Baggili and
                  Andrew Marrington and
                  Armindo Rodrigues},
  title        = {Preliminary forensic analysis of the Xbox One},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S57--S65},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.014},
  doi          = {10.1016/J.DIIN.2014.05.014},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MooreBMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/NelsonSL14,
  author       = {Alex J. Nelson and
                  Erik Q. Steggall and
                  Darrell D. E. Long},
  title        = {Cooperative mode: Comparative storage metadata verification applied
                  to the Xbox 360},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S46--S56},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.004},
  doi          = {10.1016/J.DIIN.2014.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/NelsonSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Oestreicher14,
  author       = {Kurt Oestreicher},
  title        = {A forensically robust method for acquisition of iCloud data},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S106--S113},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.006},
  doi          = {10.1016/J.DIIN.2014.05.006},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Oestreicher14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Quach14,
  author       = {Tu{-}Thach Quach},
  title        = {Extracting hidden messages in steganographic images},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S40--S45},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.003},
  doi          = {10.1016/J.DIIN.2014.05.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Quach14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RichardC14,
  author       = {Golden G. Richard III and
                  Andrew Case},
  title        = {In lieu of swap: Analyzing compressed {RAM} in Mac {OS} {X} and Linux},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S3--S12},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.011},
  doi          = {10.1016/J.DIIN.2014.05.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/RichardC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevAS14,
  author       = {Vassil Roussev and
                  Irfan Ahmed and
                  Thomas Sires},
  title        = {Image-based kernel fingerprinting},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S13--S21},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.013},
  doi          = {10.1016/J.DIIN.2014.05.013},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WestphalANP14,
  author       = {Florian Westphal and
                  Stefan Axelsson and
                  Christian Neuhaus and
                  Andreas Polze},
  title        = {{VMI-PL:} {A} monitoring language for virtual platforms using virtual
                  machine introspection},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 2},
  pages        = {S85--S94},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.05.016},
  doi          = {10.1016/J.DIIN.2014.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WestphalANP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BreitingerSB13,
  author       = {Frank Breitinger and
                  Georgios Stivaktakis and
                  Harald Baier},
  title        = {{FRASH:} {A} framework to test algorithms of similarity hashing},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S50--S58},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.006},
  doi          = {10.1016/J.DIIN.2013.06.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BreitingerSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Brown13,
  author       = {Ralf D. Brown},
  title        = {Improved recovery and reconstruction of DEFLATEd files},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S21--S29},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.003},
  doi          = {10.1016/J.DIIN.2013.06.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Brown13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DykstraS13,
  author       = {Josiah Dykstra and
                  Alan T. Sherman},
  title        = {Design and implementation of {FROST:} Digital forensic tools for the
                  OpenStack cloud computing platform},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S87--S95},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.010},
  doi          = {10.1016/J.DIIN.2013.06.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DykstraS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Grover13,
  author       = {Justin Grover},
  title        = {Android forensics: Automated data collection and reporting from a
                  mobile device},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S12--S20},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.002},
  doi          = {10.1016/J.DIIN.2013.06.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Grover13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuidoOGWNH13,
  author       = {Mark D. Guido and
                  Jared Ondricek and
                  Justin Grover and
                  David Wilburn and
                  Thanh Nguyen and
                  Andrew Hunt},
  title        = {Automated identification of installed malicious Android applications},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S96--S104},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.011},
  doi          = {10.1016/J.DIIN.2013.06.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuidoOGWNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PiccinelliG13,
  author       = {Mario Piccinelli and
                  Paolo Gubian},
  title        = {Modern ships Voyage Data Recorders: {A} forensics perspective on the
                  Costa Concordia shipwreck},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S41--S49},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.005},
  doi          = {10.1016/J.DIIN.2013.06.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PiccinelliG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevQ13,
  author       = {Vassil Roussev and
                  Candice Quates},
  title        = {File fragment encoding classification - An empirical approach},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S69--S77},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.008},
  doi          = {10.1016/J.DIIN.2013.06.008},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoweSG13,
  author       = {Neil C. Rowe and
                  Riqui Schwamm and
                  Simson L. Garfinkel},
  title        = {Language translation for file paths},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S78--S86},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.009},
  doi          = {10.1016/J.DIIN.2013.06.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoweSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SonLKJLL13,
  author       = {Namheun Son and
                  Yunho Lee and
                  Dohyun Kim and
                  Joshua I. James and
                  Sangjin Lee and
                  Kyungho Lee},
  title        = {A study of user data integrity during acquisition of Android devices},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S3--S11},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.001},
  doi          = {10.1016/J.DIIN.2013.06.001},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SonLKJLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StewartU13,
  author       = {Jon Stewart and
                  Joel Uckelman},
  title        = {Unicode search of dirty data, or: How {I} learned to stop worrying
                  and love Unicode Technical Standard {\#}18},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S116--S125},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.013},
  doi          = {10.1016/J.DIIN.2013.06.013},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/StewartU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StuttgenC13,
  author       = {Johannes St{\"{u}}ttgen and
                  Michael Cohen},
  title        = {Anti-forensic resilient memory acquisition},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S105--S115},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.012},
  doi          = {10.1016/J.DIIN.2013.06.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StuttgenC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VomelS13,
  author       = {Stefan V{\"{o}}mel and
                  Johannes St{\"{u}}ttgen},
  title        = {An evaluation platform for forensic memory acquisition software},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S30--S40},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.004},
  doi          = {10.1016/J.DIIN.2013.06.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/VomelS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WhiteSF13,
  author       = {Andrew White and
                  Bradley L. Schatz and
                  Ernest Foo},
  title        = {Integrity verification of user space code},
  journal      = {Digit. Investig.},
  volume       = {10},
  number       = {Supplement},
  pages        = {S59--S68},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.diin.2013.06.007},
  doi          = {10.1016/J.DIIN.2013.06.007},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WhiteSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Brown12,
  author       = {Ralf D. Brown},
  title        = {Finding and identifying text in 900+ languages},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S34--S43},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.004},
  doi          = {10.1016/J.DIIN.2012.05.004},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Brown12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DengX0J12,
  author       = {Zhui Deng and
                  Dongyan Xu and
                  Xiangyu Zhang and
                  Xuxian Jiang},
  title        = {IntroLib: Efficient and transparent library call introspection for
                  malware forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S13--S23},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.013},
  doi          = {10.1016/J.DIIN.2012.05.013},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DengX0J12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DykstraS12,
  author       = {Josiah Dykstra and
                  Alan T. Sherman},
  title        = {Acquiring forensic evidence from infrastructure-as-a-service cloud
                  computing: Exploring and evaluating tools, trust, and techniques},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S90--S98},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.001},
  doi          = {10.1016/J.DIIN.2012.05.001},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DykstraS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fairbanks12,
  author       = {Kevin D. Fairbanks},
  title        = {An analysis of Ext4 for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S118--S130},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.010},
  doi          = {10.1016/J.DIIN.2012.05.010},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fairbanks12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FitzgeraldMMZ12,
  author       = {Simran Fitzgerald and
                  George Mathews and
                  Colin Morris and
                  Oles Zhulyn},
  title        = {Using {NLP} techniques for file fragment classification},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S44--S49},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.008},
  doi          = {10.1016/J.DIIN.2012.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FitzgeraldMMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel12a,
  author       = {Simson L. Garfinkel},
  title        = {Lessons learned writing digital forensics tools and managing a 30TB
                  digital evidence corpus},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S80--S89},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.002},
  doi          = {10.1016/J.DIIN.2012.05.002},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelNY12,
  author       = {Simson L. Garfinkel and
                  Alex J. Nelson and
                  Joel Young},
  title        = {A general strategy for differential forensic analysis},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S50--S59},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.003},
  doi          = {10.1016/J.DIIN.2012.05.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelNY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HandLGT12,
  author       = {Scott Hand and
                  Zhiqiang Lin and
                  Guofei Gu and
                  Bhavani Thuraisingham},
  title        = {Bin-Carver: Automatic recovery of binary executable files},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S108--S117},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.014},
  doi          = {10.1016/J.DIIN.2012.05.014},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HandLGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HargreavesP12,
  author       = {Christopher James Hargreaves and
                  Jonathan Patterson},
  title        = {An automated timeline reconstruction approach for digital forensic
                  investigations},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S69--S79},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.006},
  doi          = {10.1016/J.DIIN.2012.05.006},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/HargreavesP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JonesPW12,
  author       = {Brian Jones and
                  Syd Pleno and
                  Michael Wilkinson},
  title        = {The use of random sampling in investigations involving child abuse
                  material},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S99--S107},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.011},
  doi          = {10.1016/J.DIIN.2012.05.011},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JonesPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MutawaBM12,
  author       = {Noora Al Mutawa and
                  Ibrahim M. Baggili and
                  Andrew Marrington},
  title        = {Forensic analysis of social networking applications on mobile devices},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S24--S33},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.007},
  doi          = {10.1016/J.DIIN.2012.05.007},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MutawaBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevQ12,
  author       = {Vassil Roussev and
                  Candice Quates},
  title        = {Content triage with similarity digests: The {M57} case study},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S60--S68},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.012},
  doi          = {10.1016/J.DIIN.2012.05.012},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Rowe12,
  author       = {Neil C. Rowe},
  title        = {Testing the National Software Reference Library},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S131--S138},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.009},
  doi          = {10.1016/J.DIIN.2012.05.009},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Rowe12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WhiteSF12,
  author       = {Andrew White and
                  Bradley L. Schatz and
                  Ernest Foo},
  title        = {Surveying the user space through user allocations},
  journal      = {Digit. Investig.},
  volume       = {9},
  number       = {Supplement},
  pages        = {S3--S12},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.diin.2012.05.005},
  doi          = {10.1016/J.DIIN.2012.05.005},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WhiteSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Al-WehaibiSG11,
  author       = {Khawla Al{-}Wehaibi and
                  Tim Storer and
                  William Bradley Glisson},
  title        = {Augmenting password recovery with online profiling},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S25--S33},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.004},
  doi          = {10.1016/J.DIIN.2011.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Al-WehaibiSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeverlyGC11,
  author       = {Robert Beverly and
                  Simson L. Garfinkel and
                  Greg Cardwell},
  title        = {Forensic carving of network packets and associated data structures},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S78--S89},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.010},
  doi          = {10.1016/J.DIIN.2011.05.010},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeverlyGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Brown11,
  author       = {Ralf D. Brown},
  title        = {Reconstructing corrupt DEFLATEd files},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S125--S131},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.015},
  doi          = {10.1016/J.DIIN.2011.05.015},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Brown11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CohenBC11,
  author       = {Michael I. Cohen and
                  Darren Bilby and
                  Germano Caronni},
  title        = {Distributed forensics and incident response in the enterprise},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S101--S110},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.012},
  doi          = {10.1016/J.DIIN.2011.05.012},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CohenBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Grier11,
  author       = {Jonathan Grier},
  title        = {Detecting data theft using stochastic forensics},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S71--S77},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.009},
  doi          = {10.1016/J.DIIN.2011.05.009},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Grier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/InoueAJ11,
  author       = {Hajime Inoue and
                  Frank Adelstein and
                  Robert A. Joyce},
  title        = {Visualization in testing a volatile memory forensic tool},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S42--S51},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.006},
  doi          = {10.1016/J.DIIN.2011.05.006},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/InoueAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KingV11,
  author       = {Christopher King and
                  Timothy Vidas},
  title        = {Empirical analysis of solid state disk data retention when used with
                  contemporary operating systems},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S111--S117},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.013},
  doi          = {10.1016/J.DIIN.2011.05.013},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KingV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MarringtonBMC11,
  author       = {Andrew Marrington and
                  Ibrahim M. Baggili and
                  George M. Mohay and
                  Andrew J. Clark},
  title        = {{CAT} Detect (Computer Activity Timeline Detection): {A} tool for
                  detecting inconsistency in computer activity timelines},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S52--S61},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.007},
  doi          = {10.1016/J.DIIN.2011.05.007},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MarringtonBMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OhLL11,
  author       = {Junghoon Oh and
                  SeungBong Lee and
                  Sangjin Lee},
  title        = {Advanced evidence collection and analysis of web browser activity},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S62--S70},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.008},
  doi          = {10.1016/J.DIIN.2011.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OhLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OkolicaP11,
  author       = {James S. Okolica and
                  Gilbert L. Peterson},
  title        = {Extracting the windows clipboard from physical memory},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S118--S124},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.014},
  doi          = {10.1016/J.DIIN.2011.05.014},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OkolicaP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Roussev11,
  author       = {Vassil Roussev},
  title        = {An evaluation of forensic similarity hashes},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S34--S41},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.005},
  doi          = {10.1016/J.DIIN.2011.05.005},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Roussev11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShebaroC11,
  author       = {Bilal Shebaro and
                  Jedidiah R. Crandall},
  title        = {Privacy-preserving network flow recording},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S90--S100},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.011},
  doi          = {10.1016/J.DIIN.2011.05.011},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShebaroC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShieldsFM11,
  author       = {Clay Shields and
                  Ophir Frieder and
                  Mark Maloof},
  title        = {A system for the proactive, continuous, and efficient collection of
                  digital forensic evidence},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S3--S13},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.002},
  doi          = {10.1016/J.DIIN.2011.05.002},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShieldsFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Venema11,
  author       = {Wietse Z. Venema},
  title        = {Eleventh Annual {DFRWS} Conference},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S1--S2},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.001},
  doi          = {10.1016/J.DIIN.2011.05.001},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Venema11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VidasZC11,
  author       = {Timothy Vidas and
                  Chengye Zhang and
                  Nicolas Christin},
  title        = {Toward a general collection methodology for Android devices},
  journal      = {Digit. Investig.},
  volume       = {8},
  number       = {Supplement},
  pages        = {S14--S24},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.05.003},
  doi          = {10.1016/J.DIIN.2011.05.003},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/VidasZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Axelsson10,
  author       = {Stefan Axelsson},
  title        = {The Normalised Compression Distance as a file fragment classifier},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S24--S31},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.004},
  doi          = {10.1016/J.DIIN.2010.05.004},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Axelsson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BangYL10,
  author       = {Jewan Bang and
                  Byeongyeong Yoo and
                  Sangjin Lee},
  title        = {Secure {USB} bypassing tool},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S114--S120},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.014},
  doi          = {10.1016/J.DIIN.2010.05.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BangYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Carrier10,
  author       = {Brian D. Carrier},
  title        = {Different interpretations of {ISO9660} file systems},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S129--S134},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.016},
  doi          = {10.1016/J.DIIN.2010.05.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Carrier10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMNR10,
  author       = {Andrew Case and
                  Lodovico Marziale and
                  Cris Neckar and
                  Golden G. Richard III},
  title        = {Treasure and tragedy in \emph{kmem{\_}cache} mining for live forensics
                  investigation},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S41--S47},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.006},
  doi          = {10.1016/J.DIIN.2010.05.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseMR10,
  author       = {Andrew Case and
                  Lodovico Marziale and
                  Golden G. Richard III},
  title        = {Dynamic recreation of kernel data structures for live forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S32--S40},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.005},
  doi          = {10.1016/J.DIIN.2010.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CohenS10,
  author       = {Michael Cohen and
                  Bradley L. Schatz},
  title        = {Hash based disk imaging using {AFF4}},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S121--S128},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.015},
  doi          = {10.1016/J.DIIN.2010.05.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CohenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ContiBSSRSLP10,
  author       = {Gregory J. Conti and
                  Sergey Bratus and
                  Anna Shubina and
                  Benjamin Sangster and
                  Roy Ragsdale and
                  Matthew Supan and
                  Andrew Lichtenberg and
                  Robert Perez{-}Alemany},
  title        = {Automated mapping of large binary objects using primitive fragment
                  type classification},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S3--S12},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.002},
  doi          = {10.1016/J.DIIN.2010.05.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ContiBSSRSLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DistefanoMP10,
  author       = {Alessandro Distefano and
                  Gianluigi Me and
                  Francesco Pace},
  title        = {Android anti-forensics through a local paradigm},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S83--S94},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.011},
  doi          = {10.1016/J.DIIN.2010.05.011},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DistefanoMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel10,
  author       = {Simson L. Garfinkel},
  title        = {Digital forensics research: The next 10 years},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S64--S73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.009},
  doi          = {10.1016/J.DIIN.2010.05.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelNWR10,
  author       = {Simson L. Garfinkel and
                  Alex J. Nelson and
                  Douglas White and
                  Vassil Roussev},
  title        = {Using purpose-built functions and block hashes to enable small block
                  and sub-file forensics},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S13--S23},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.003},
  doi          = {10.1016/J.DIIN.2010.05.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelNWR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LiberatoreEKLS10,
  author       = {Marc Liberatore and
                  Robert Erdely and
                  Thomas Kerle and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {Forensic investigation of peer-to-peer file sharing networks},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S95--S103},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.012},
  doi          = {10.1016/J.DIIN.2010.05.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LiberatoreEKLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lyle10,
  author       = {James R. Lyle},
  title        = {If \emph{error rate} is such a simple concept, why don't {I} have
                  one for my forensic tool yet?},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S135--S139},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.017},
  doi          = {10.1016/J.DIIN.2010.05.017},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Lyle10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OkolicaP10,
  author       = {James S. Okolica and
                  Gilbert L. Peterson},
  title        = {Windows operating systems agnostic memory analysis},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S48--S56},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.007},
  doi          = {10.1016/J.DIIN.2010.05.007},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OkolicaP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ShebaroPC10,
  author       = {Bilal Shebaro and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Jedidiah R. Crandall},
  title        = {Leaving timing-channel fingerprints in hidden service log files},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S104--S113},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.013},
  doi          = {10.1016/J.DIIN.2010.05.013},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ShebaroPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/StevensC10,
  author       = {Richard M. Stevens and
                  Eoghan Casey},
  title        = {Extracting Windows command line details from physical memory},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S57--S63},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.008},
  doi          = {10.1016/J.DIIN.2010.05.008},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/StevensC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThingNC10,
  author       = {Vrizlynn L. L. Thing and
                  Kian{-}Yong Ng and
                  Ee{-}Chien Chang},
  title        = {Live memory forensics of mobile phones},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {Supplement},
  pages        = {S74--S82},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.diin.2010.05.010},
  doi          = {10.1016/J.DIIN.2010.05.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThingNC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Ayers09,
  author       = {Daniel Ayers},
  title        = {A second generation computer forensic analysis system},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S34--S42},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.013},
  doi          = {10.1016/J.DIIN.2009.06.013},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Ayers09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeebeSS09,
  author       = {Nicole Lang Beebe and
                  Sonia D. Stacy and
                  Dane Stuckey},
  title        = {Digital forensic implications of {ZFS}},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S99--S107},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.006},
  doi          = {10.1016/J.DIIN.2009.06.006},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeebeSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CohenGS09,
  author       = {Michael Cohen and
                  Simson L. Garfinkel and
                  Bradley L. Schatz},
  title        = {Extending the advanced forensic format to accommodate multiple data
                  sources, logical evidence, arbitrary information and forensic workflow},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S57--S68},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.010},
  doi          = {10.1016/J.DIIN.2009.06.010},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CohenGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GarfinkelFRD09,
  author       = {Simson L. Garfinkel and
                  Paul F. Farrell Jr. and
                  Vassil Roussev and
                  George W. Dinolt},
  title        = {Bringing science to digital forensics with standardized forensic corpora},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S2--S11},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.016},
  doi          = {10.1016/J.DIIN.2009.06.016},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GarfinkelFRD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GuoSB09,
  author       = {Yinghua Guo and
                  Jill Slay and
                  Jason Beckett},
  title        = {Validation and verification of computer forensic software tools -
                  Searching Function},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S12--S22},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.015},
  doi          = {10.1016/J.DIIN.2009.06.015},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/GuoSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HejaziTD09,
  author       = {Seyed Mahmood Hejazi and
                  Chamseddine Talhi and
                  Mourad Debbabi},
  title        = {Extraction of forensically sensitive information from windows physical
                  memory},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S121--S131},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.003},
  doi          = {10.1016/J.DIIN.2009.06.003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HejaziTD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KahvedzicK09,
  author       = {Damir Kahvedzic and
                  M. Tahar Kechadi},
  title        = {{DIALOG:} {A} framework for modeling, analysis and reuse of digital
                  forensic knowledge},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S23--S33},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.014},
  doi          = {10.1016/J.DIIN.2009.06.014},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KahvedzicK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KimPCLB09,
  author       = {Kibom Kim and
                  Sangseo Park and
                  Taejoo Chang and
                  Cheolwon Lee and
                  Sungjai Baek},
  title        = {Lessons learned from the construction of a Korean software reference
                  data set for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S108--S113},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.005},
  doi          = {10.1016/J.DIIN.2009.06.005},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KimPCLB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LevineL09,
  author       = {Brian Neil Levine and
                  Marc Liberatore},
  title        = {{DEX:} Digital evidence provenance supporting reproducibility and
                  comparison},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S48--S56},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.011},
  doi          = {10.1016/J.DIIN.2009.06.011},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LevineL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Maartmann-MoeTA09,
  author       = {Carsten Maartmann{-}Moe and
                  Steffen E. Thorkildsen and
                  Andr{\'{e}} {\AA}rnes},
  title        = {The persistence of memory: Forensic identification and extraction
                  of cryptographic keys},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S132--S140},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.002},
  doi          = {10.1016/J.DIIN.2009.06.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Maartmann-MoeTA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OlssonB09,
  author       = {Jens Olsson and
                  Martin Boldt},
  title        = {Computer forensic timeline visualization tool},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S78--S87},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.008},
  doi          = {10.1016/J.DIIN.2009.06.008},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/OlssonB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SencarM09,
  author       = {Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Identification and recovery of {JPEG} files with missing fragments},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S88--S98},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.007},
  doi          = {10.1016/J.DIIN.2009.06.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SencarM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThingY09,
  author       = {Vrizlynn L. L. Thing and
                  Hwei{-}Ming Ying},
  title        = {A novel time-memory trade-off method for password recovery},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S114--S120},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.004},
  doi          = {10.1016/J.DIIN.2009.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThingY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WatkinsMLH09,
  author       = {Kathryn Watkins and
                  Mike McWhorte and
                  Jeff Long and
                  Bill Hill},
  title        = {Teleporter: An analytically and forensically sound duplicate transfer
                  system},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S43--S47},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.012},
  doi          = {10.1016/J.DIIN.2009.06.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WatkinsMLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ZhuGJ09,
  author       = {Yuandong Zhu and
                  Pavel Gladyshev and
                  Joshua James},
  title        = {Using shellbag information to reconstruct user activities},
  journal      = {Digit. Investig.},
  volume       = {6},
  number       = {Supplement},
  pages        = {S69--S77},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.diin.2009.06.009},
  doi          = {10.1016/J.DIIN.2009.06.009},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ZhuGJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BaarAB08,
  author       = {Ruud B. van Baar and
                  Wouter Alink and
                  Alex van Ballegooij},
  title        = {Forensic memory analysis: Files mapped in memory},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S52--S57},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.014},
  doi          = {10.1016/J.DIIN.2008.05.014},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BaarAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BruecknerGAW08,
  author       = {Stephen Brueckner and
                  David Guaspari and
                  Frank Adelstein and
                  Joseph Weeks},
  title        = {Automated computer forensics training in a virtualized environment},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S105--S111},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.009},
  doi          = {10.1016/J.DIIN.2008.05.009},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BruecknerGAW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BurghardtF08,
  author       = {Aaron Burghardt and
                  Adam J. Feldman},
  title        = {Using the {HFS+} journal for deleted file recovery},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S76--S82},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.013},
  doi          = {10.1016/J.DIIN.2008.05.013},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BurghardtF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CalhounC08,
  author       = {William C. Calhoun and
                  Drue Coles},
  title        = {Predicting the types of file fragments},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S14--S20},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.005},
  doi          = {10.1016/J.DIIN.2008.05.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CalhounC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseCMRR08,
  author       = {Andrew Case and
                  Andrew Cristina and
                  Lodovico Marziale and
                  Golden G. Richard III and
                  Vassil Roussev},
  title        = {{FACE:} Automated digital evidence discovery and correlation},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S65--S75},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.008},
  doi          = {10.1016/J.DIIN.2008.05.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseCMRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Cohen08,
  author       = {Michael I. Cohen},
  title        = {PyFlag - An advanced network forensic framework},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S112--S120},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.016},
  doi          = {10.1016/J.DIIN.2008.05.016},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Cohen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/DistefanoM08,
  author       = {Alessandro Distefano and
                  Gianluigi Me},
  title        = {An overall assessment of Mobile Internal Acquisition Tool},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S121--S127},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.010},
  doi          = {10.1016/J.DIIN.2008.05.010},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/DistefanoM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dolan-Gavitt08,
  author       = {Brendan Dolan{-}Gavitt},
  title        = {Forensic analysis of the Windows registry in memory},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S26--S32},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.003},
  doi          = {10.1016/J.DIIN.2008.05.003},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Dolan-Gavitt08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/IqbalHFD08,
  author       = {Farkhund Iqbal and
                  Rachid Hadjidj and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {A novel approach of mining write-prints for authorship attribution
                  in e-mail forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S42--S51},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.001},
  doi          = {10.1016/J.DIIN.2008.05.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/IqbalHFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JoycePA08,
  author       = {Robert A. Joyce and
                  Judson Powers and
                  Frank Adelstein},
  title        = {{MEGA:} {A} tool for Mac {OS} {X} operating system and application
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S83--S90},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.011},
  doi          = {10.1016/J.DIIN.2008.05.011},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JoycePA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Kornblum08,
  author       = {Jesse D. Kornblum},
  title        = {Using {JPEG} quantization tables to identify imagery processed by
                  software},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S21--S25},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.004},
  doi          = {10.1016/J.DIIN.2008.05.004},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Kornblum08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeUH08,
  author       = {Jooyoung Lee and
                  Sung{-}Kyong Un and
                  Dowon Hong},
  title        = {High-speed search using Tarari content processor in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S91--S95},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.006},
  doi          = {10.1016/J.DIIN.2008.05.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeUH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LewthwaiteS08,
  author       = {Joseph Lewthwaite and
                  Victoria Smith},
  title        = {Limewire examinations},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S96--S104},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.017},
  doi          = {10.1016/J.DIIN.2008.05.017},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LewthwaiteS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Morgan08,
  author       = {Timothy D. Morgan},
  title        = {Recovering deleted data from the Windows registry},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S33--S41},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.002},
  doi          = {10.1016/J.DIIN.2008.05.002},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Morgan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/PalSM08,
  author       = {Anandabrata Pal and
                  Husrev T. Sencar and
                  Nasir D. Memon},
  title        = {Detecting file fragmentation point using sequential hypothesis testing},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S2--S13},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.015},
  doi          = {10.1016/J.DIIN.2008.05.015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/PalSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schuster08,
  author       = {Andreas Schuster},
  title        = {The impact of Microsoft Windows pool allocation strategies on memory
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S58--S64},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.007},
  doi          = {10.1016/J.DIIN.2008.05.007},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schuster08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThonnardD08,
  author       = {Olivier Thonnard and
                  Marc Dacier},
  title        = {A framework for attack patterns' discovery in honeynet data},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {Supplement},
  pages        = {S128--S139},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.05.012},
  doi          = {10.1016/J.DIIN.2008.05.012},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ThonnardD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AdelsteinJ07,
  author       = {Frank Adelstein and
                  Robert A. Joyce},
  title        = {File Marshal: Automatic extraction of peer-to-peer data},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {43--48},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.016},
  doi          = {10.1016/J.DIIN.2007.06.016},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AdelsteinJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArastehD07,
  author       = {Ali Reza Arasteh and
                  Mourad Debbabi},
  title        = {Forensic memory analysis: From stack and code to execution history},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {114--125},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.010},
  doi          = {10.1016/J.DIIN.2007.06.010},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ArastehD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArastehDSS07,
  author       = {Ali Reza Arasteh and
                  Mourad Debbabi and
                  Assaad Sakha and
                  Mohamed Mostafa Saleh},
  title        = {Analyzing multiple logs for forensic evidence},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {82--91},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.013},
  doi          = {10.1016/J.DIIN.2007.06.013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ArastehDSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BarikGSMM07,
  author       = {Mridul Sankar Barik and
                  Gaurav Gupta and
                  Shubhro Sinha and
                  Alok Mishra and
                  Chandan Mazumdar},
  title        = {An efficient technique for enhancing forensic capabilities of Ext2
                  file system},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {55--61},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.007},
  doi          = {10.1016/J.DIIN.2007.06.007},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BarikGSMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BeebeC07,
  author       = {Nicole Lang Beebe and
                  Jan Guynes Clark},
  title        = {Digital forensic text string searching: Improving information retrieval
                  effectiveness by thematically clustering search results},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {49--54},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.005},
  doi          = {10.1016/J.DIIN.2007.06.005},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BeebeC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BuchholzT07,
  author       = {Florian P. Buchholz and
                  Brett C. Tjaden},
  title        = {A brief study of time},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {31--42},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.004},
  doi          = {10.1016/J.DIIN.2007.06.004},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BuchholzT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Dolan-Gavitt07,
  author       = {Brendan Dolan{-}Gavitt},
  title        = {The {VAD} tree: {A} process-eye view of physical memory},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {62--64},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.008},
  doi          = {10.1016/J.DIIN.2007.06.008},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Dolan-Gavitt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel07,
  author       = {Simson L. Garfinkel},
  title        = {Carving contiguous and fragmented files with fast object validation},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {2--12},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.017},
  doi          = {10.1016/J.DIIN.2007.06.017},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LyleW07,
  author       = {James R. Lyle and
                  Mark Wozar},
  title        = {Issues with imaging drives containing faulty sectors},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {13--15},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.002},
  doi          = {10.1016/J.DIIN.2007.06.002},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LyleW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MarzialeRR07,
  author       = {Lodovico Marziale and
                  Golden G. Richard III and
                  Vassil Roussev},
  title        = {Massive threading: Using GPUs to increase the performance of digital
                  forensics tools},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {73--81},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.014},
  doi          = {10.1016/J.DIIN.2007.06.014},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MarzialeRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MastersT07,
  author       = {Gerry Masters and
                  Philip Turner},
  title        = {Forensic data recovery and examination of magnetic swipe card cloning
                  devices},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {16--22},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.018},
  doi          = {10.1016/J.DIIN.2007.06.018},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/MastersT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Murphey07,
  author       = {Rich Murphey},
  title        = {Automated Windows event log forensics},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {92--100},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.012},
  doi          = {10.1016/J.DIIN.2007.06.012},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Murphey07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevRM07,
  author       = {Vassil Roussev and
                  Golden G. Richard III and
                  Lodovico Marziale},
  title        = {Multi-resolution similarity hashing},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {105--113},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.011},
  doi          = {10.1016/J.DIIN.2007.06.011},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevRM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schatz07,
  author       = {Bradley L. Schatz},
  title        = {BodySnatcher: Towards reliable volatile memory acquisition by software},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {126--134},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.009},
  doi          = {10.1016/J.DIIN.2007.06.009},
  timestamp    = {Sat, 01 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schatz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schuster07,
  author       = {Andreas Schuster},
  title        = {Introducing the Microsoft Vista event log file format},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {65--72},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.015},
  doi          = {10.1016/J.DIIN.2007.06.015},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schuster07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SeifertSWKE07,
  author       = {Christian Seifert and
                  Ramon Steenson and
                  Ian Welch and
                  Peter Komisarczuk and
                  Barbara Endicott{-}Popovsky},
  title        = {Capture - {A} behavioral analysis tool for applications and documents},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {23--30},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.003},
  doi          = {10.1016/J.DIIN.2007.06.003},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SeifertSWKE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/TaylorEF07,
  author       = {Carol A. Taylor and
                  Barbara Endicott{-}Popovsky and
                  Deborah A. Frincke},
  title        = {Specifying digital forensics: {A} forensics policy approach},
  journal      = {Digit. Investig.},
  volume       = {4},
  number       = {Supplement},
  pages        = {101--104},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.diin.2007.06.006},
  doi          = {10.1016/J.DIIN.2007.06.006},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/TaylorEF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Adelstein06,
  author       = {Frank Adelstein},
  title        = {The proceedings of the Sixth Annual Digital Forensic Research Workshop
                  {(DFRWS} '06)},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {1--2},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.017},
  doi          = {10.1016/J.DIIN.2006.06.017},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Adelstein06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlinkBBV06,
  author       = {Wouter Alink and
                  R. A. F. Bhoedjang and
                  Peter A. Boncz and
                  Arjen P. de Vries},
  title        = {{XIRAF} - XML-based indexing and querying for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {50--58},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.016},
  doi          = {10.1016/J.DIIN.2006.06.016},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AlinkBBV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BrinsonRR06,
  author       = {Ashley Brinson and
                  Abigail Robinson and
                  Marcus K. Rogers},
  title        = {A cyber forensics ontology: Creating a new approach to studying cyber
                  forensics},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {37--43},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.008},
  doi          = {10.1016/J.DIIN.2006.06.008},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/BrinsonRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CarrierS06,
  author       = {Brian D. Carrier and
                  Eugene H. Spafford},
  title        = {Categories of digital investigation analysis techniques based on the
                  computer history model},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {121--130},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.011},
  doi          = {10.1016/J.DIIN.2006.06.011},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/CarrierS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Garfinkel06,
  author       = {Simson L. Garfinkel},
  title        = {Forensic feature extraction and cross-drive analysis},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {71--81},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.007},
  doi          = {10.1016/J.DIIN.2006.06.007},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Garfinkel06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Harris06,
  author       = {Ryan Harris},
  title        = {Arriving at an anti-forensics consensus: Examining how to define and
                  control the anti-forensics problem},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {44--49},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.005},
  doi          = {10.1016/J.DIIN.2006.06.005},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Harris06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Ieong06,
  author       = {Ricci S. C. Ieong},
  title        = {{FORZA} - Digital forensics investigation framework that incorporate
                  legal issues},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {29--36},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.004},
  doi          = {10.1016/J.DIIN.2006.06.004},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Ieong06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JeyaramanA06,
  author       = {Sundararaman Jeyaraman and
                  Mikhail J. Atallah},
  title        = {An empirical study of automatic event reconstruction systems},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {108--115},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.013},
  doi          = {10.1016/J.DIIN.2006.06.013},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/JeyaramanA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/KhannaMMACAD06,
  author       = {Nitin Khanna and
                  Aravind K. Mikkilineni and
                  Anthony F. Martone and
                  Gazi N. Ali and
                  George T.{-}C. Chiu and
                  Jan P. Allebach and
                  Edward J. Delp},
  title        = {A survey of forensic characterization methods for physical devices},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {17--28},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.014},
  doi          = {10.1016/J.DIIN.2006.06.014},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/KhannaMMACAD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Kornblum06,
  author       = {Jesse D. Kornblum},
  title        = {Identifying almost identical files using context triggered piecewise
                  hashing},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {91--97},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.015},
  doi          = {10.1016/J.DIIN.2006.06.015},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Kornblum06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/LeeSG06,
  author       = {Sangwon Lee and
                  David A. Shamma and
                  Bruce Gooch},
  title        = {Detecting false captioning using common-sense reasoning},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {65--70},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.006},
  doi          = {10.1016/J.DIIN.2006.06.006},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/LeeSG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Lyle06,
  author       = {James R. Lyle},
  title        = {A strategy for testing hardware write block devices},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {3--9},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.001},
  doi          = {10.1016/J.DIIN.2006.06.001},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Lyle06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RogersST06,
  author       = {Marcus K. Rogers and
                  Kate Seigfried and
                  Kirti Tidke},
  title        = {Self-reported computer criminal behavior: {A} psychological analysis},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {116--120},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.002},
  doi          = {10.1016/J.DIIN.2006.06.002},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RogersST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RoussevCBR06,
  author       = {Vassil Roussev and
                  Yixin Chen and
                  Timothy Bourg and
                  Golden G. Richard III},
  title        = {\emph{md5bloom}: Forensic filesystem hashing revisited},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {82--90},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.012},
  doi          = {10.1016/J.DIIN.2006.06.012},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RoussevCBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SchatzMC06,
  author       = {Bradley L. Schatz and
                  George M. Mohay and
                  Andrew J. Clark},
  title        = {A correlation method for establishing provenance of timestamps in
                  digital evidence},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {98--107},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.009},
  doi          = {10.1016/J.DIIN.2006.06.009},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/SchatzMC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schuster06,
  author       = {Andreas Schuster},
  title        = {Searching for processes and threads in Microsoft Windows memory dumps},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {10--16},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.010},
  doi          = {10.1016/J.DIIN.2006.06.010},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Schuster06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Turner06,
  author       = {Philip Turner},
  title        = {Selective and intelligent imaging using digital evidence bags},
  journal      = {Digit. Investig.},
  volume       = {3},
  number       = {Supplement},
  pages        = {59--64},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.diin.2006.06.003},
  doi          = {10.1016/J.DIIN.2006.06.003},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Turner06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/AdelsteinGR05,
  author       = {Frank Adelstein and
                  Yun Gao and
                  Golden G. Richard III},
  title        = {Automatically Creating Realistic Targets for Digital Forensics Investigation},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/adelstein\_falcon.pdf},
  timestamp    = {Fri, 17 Mar 2006 12:41:42 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/AdelsteinGR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/BogenD05,
  author       = {A. Chris Bogen and
                  David A. Dampier},
  title        = {Preparing for Large-Scale Investigations with Case Domain Modeling},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/bogen\_domainmodel.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/BogenD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/BuchholzF05,
  author       = {Florian P. Buchholz and
                  Courtney Falk},
  title        = {Design and Implementation of Zeitline: a Forensic Timeline Editor},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/buchholz\_zeitline.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/BuchholzF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/CarrierS05,
  author       = {Brian D. Carrier and
                  Eugene H. Spafford},
  title        = {Automated Digital Evidence Target Definition Using Outlier Analysis
                  and Existing Evidence},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/carrier\_targetdefn.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/CarrierS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/EcksteinJ05,
  author       = {Knut Eckstein and
                  Marko Jahnke},
  title        = {Data Hiding in Journaling File Systems},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/eckstein\_journal.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/EcksteinJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/Geiger05,
  author       = {Matthew Geiger},
  title        = {Evaluating Commercial Counter-Forensic Tools},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/geiger\_couterforensics.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/Geiger05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/GillamR05,
  author       = {William Blair Gillam and
                  Marc Rogers},
  title        = {File Hound: {A} Forensics Tool for First Responders},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/gillam\_filehound.pdf},
  timestamp    = {Mon, 21 Dec 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/GillamR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/KenneallyB05,
  author       = {Erin E. Kenneally and
                  Christopher L. T. Brown},
  title        = {Risk Sensitive Digital Evidence Collection},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/KenneallyB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/PanB05,
  author       = {Lei Pan and
                  Lynn Margaret Batten},
  title        = {Reproducibility of Digital Evidence in Forensic Investigations},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/pan\_reproducibility.pdf},
  timestamp    = {Tue, 08 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfrws/PanB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/RichardR05,
  author       = {Golden G. Richard III and
                  Vassil Roussev},
  title        = {Scalpel: {A} Frugal, High Performance File Carver},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/richard\_scalpel.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/RichardR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/SarmoriaC05,
  author       = {Christian G. Sarmoria and
                  Steve J. Chapin},
  title        = {Monitoring Access to Shared Memory-Mapped Files},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/sarmoria\_memorymap.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/SarmoriaC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/Turner05,
  author       = {Philip Turner},
  title        = {Unification of Digital Evidence from Disparate Sources (Digital Evidence
                  Bags)},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/turner\_evidencebags.pdf},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/Turner05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfrws/WangD05,
  author       = {Wei Wang and
                  Thomas E. Daniels},
  title        = {Network Forensics Analysis with Evidence Graphs},
  booktitle    = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  url          = {http://www.dfrws.org/2005/proceedings/wang\_evidencegraphs.pdf},
  timestamp    = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dfrws/WangD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dfrws/2005,
  title        = {Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop,
                  {DFRWS} 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August
                  17-19, 2005},
  year         = {2005},
  timestamp    = {Fri, 17 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dfrws/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics