default search action
Search dblp for Publications
export results for "stream:journals/di:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/di/AlSharifAA24, author = {Ziad A. Al{-}Sharif and Reema Al{-}Senjalawi and Omar A. Alzoubi}, title = {The effects of document's format, size, and storage media on memory forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301692}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301692}, doi = {10.1016/J.FSIDI.2024.301692}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlSharifAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AnmolS24, author = {Anmol Tigga and K. Sitara}, title = {Video source camera identification using fusion of texture features and noise fingerprint}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301746}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301746}, doi = {10.1016/J.FSIDI.2024.301746}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AnmolS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AzahariB24, author = {Afiqah Azahari and Davide Balzarotti}, title = {On the inadequacy of open-source application logs for digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301750}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301750}, doi = {10.1016/J.FSIDI.2024.301750}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AzahariB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaierBHL24, author = {Daniel Baier and Alexander Basse and Jan{-}Niclas Hilgert and Martin Lambertz}, title = {{TLS} key material identification and extraction in memory: Current state and future challenges}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301766}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301766}, doi = {10.1016/J.FSIDI.2024.301766}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaierBHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BergerMS24, author = {Cl{\'{e}}o Berger and Beno{\^{\i}}t Meylan and Thomas R. Souvignet}, title = {Uncertainty and error in location traces}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301841}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301841}, doi = {10.1016/J.FSIDI.2024.301841}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BergerMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BowenCBR24, author = {Christopher J. Bowen and Andrew Case and Ibrahim M. Baggili and Golden G. Richard III}, title = {A step in a new direction: {NVIDIA} {GPU} kernel driver memory forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301760}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301760}, doi = {10.1016/J.FSIDI.2024.301760}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BowenCBR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerHHSOS24, author = {Frank Breitinger and Jan{-}Niclas Hilgert and Christopher Hargreaves and John Sheppard and Rebekah Overdorf and Mark Scanlon}, title = {{DFRWS} {EU} 10-year review and future directions in Digital Forensic Research}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301685}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301685}, doi = {10.1016/J.FSIDI.2023.301685}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BreitingerHHSOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CasuGCB24, author = {Mirko Casu and Luca Guarnera and Pasquale Caponnetto and Sebastiano Battiato}, title = {GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301795}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301795}, doi = {10.1016/J.FSIDI.2024.301795}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CasuGCB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CookeM24, author = {Dan Cooke and Angus M. Marshall}, title = {Money laundering through video games, a criminals' playground}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301802}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301802}, doi = {10.1016/J.FSIDI.2024.301802}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CookeM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DeutschmannB24, author = {Matthias Deutschmann and Harald Baier}, title = {Ubi est indicium? On forensic analysis of the {UBI} file system}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301689}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301689}, doi = {10.1016/J.FSIDI.2023.301689}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DeutschmannB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DragonasLN24, author = {Evangelos Dragonas and Costas Lambrinoudakis and Panagiotis Nakoutis}, title = {Forensic analysis of OpenAI's ChatGPT mobile application}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301801}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301801}, doi = {10.1016/J.FSIDI.2024.301801}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DragonasLN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DreierVHBF24, author = {Lisa Marie Dreier and C{\'{e}}line Vanini and Christopher James Hargreaves and Frank Breitinger and Felix C. Freiling}, title = {Beyond timestamps: Integrating implicit timing information into digital forensic timelines}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301755}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301755}, doi = {10.1016/J.FSIDI.2024.301755}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DreierVHBF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DunsinGOV24, author = {Dipo Dunsin and Mohamed Chahine Ghanem and Karim Ouazzane and Vassil T. Vassilev}, title = {A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301675}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301675}, doi = {10.1016/J.FSIDI.2023.301675}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DunsinGOV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Ebbers24, author = {Simon Ebbers}, title = {Response from author}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301803}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301803}, doi = {10.1016/J.FSIDI.2024.301803}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Ebbers24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EbbersGBFS24, author = {Simon Ebbers and Stefan Gense and Mouad Bakkouch and Felix C. Freiling and Sebastian Schinzel}, title = {Grand theft {API:} {A} forensic analysis of vehicle cloud data}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301691}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301691}, doi = {10.1016/J.FSIDI.2023.301691}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EbbersGBFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EichhornSP24, author = {Maximilian Eichhorn and Janine Schneider and Gaston Pugliese}, title = {Well Played, Suspect! - Forensic examination of the handheld gaming console "Steam Deck"}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301688}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301688}, doi = {10.1016/J.FSIDI.2023.301688}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EichhornSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FayyazAE24, author = {Yasamin Fayyaz and Abdulaziz Almehmadi and Khalil El{-}Khatib}, title = {A hybrid artificial intelligence framework for enhancing digital forensic investigations of infotainment systems}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301751}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301751}, doi = {10.1016/J.FSIDI.2024.301751}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FayyazAE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Findlay24, author = {Benjamin Findlay}, title = {Techniques and methods for obtaining access to data protected by linux-based encryption - {A} reference guide for practitioners}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301662}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301662}, doi = {10.1016/J.FSIDI.2023.301662}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Findlay24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FlemingO24, author = {Murray Fleming and Oluwafemi Olukoya}, title = {A temporal analysis and evaluation of fuzzy hashing algorithms for Android malware analysis}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301770}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301770}, doi = {10.1016/J.FSIDI.2024.301770}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FlemingO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FriedlP24, author = {Sabrina Friedl and G{\"{u}}nther Pernul}, title = {IoT Forensics Readiness - influencing factors}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301768}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301768}, doi = {10.1016/J.FSIDI.2024.301768}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FriedlP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FukamiBG24, author = {Aya Fukami and Richard Buurke and Zeno Geradts}, title = {Exploiting {RPMB} authentication in a closed source {TEE} implementation}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301682}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301682}, doi = {10.1016/J.FSIDI.2023.301682}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FukamiBG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GharaibehBM24, author = {Taha Gharaibeh and Ibrahim Baggili and Anas Mahmoud}, title = {On enhancing memory forensics with {FAME:} Framework for advanced monitoring and execution}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301757}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301757}, doi = {10.1016/J.FSIDI.2024.301757}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GharaibehBM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrisposSA24, author = {George Grispos and Hudan Studiawan and Saed Alrabaee}, title = {Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301671}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301671}, doi = {10.1016/J.FSIDI.2023.301671}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrisposSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HanHLP24, author = {Jaehyeok Han and Mee Lan Han and Sangjin Lee and Jungheum Park}, title = {ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301725}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301725}, doi = {10.1016/J.FSIDI.2024.301725}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HanHLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HargreavesNC24, author = {Christopher Hargreaves and Alex Nelson and Eoghan Casey}, title = {An abstract model for digital forensic analysis tools - {A} foundation for systematic error mitigation analysis}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301679}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301679}, doi = {10.1016/J.FSIDI.2023.301679}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HargreavesNC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HarrisJP24, author = {Martyn Harris and Jessica Jacobson and Alessandro Provetti}, title = {Sentiment and time-series analysis of direct-message conversations}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301753}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301753}, doi = {10.1016/J.FSIDI.2024.301753}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HarrisJP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLB24, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Daniel Baier}, title = {Forensic implications of stacked file systems}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301678}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301678}, doi = {10.1016/J.FSIDI.2023.301678}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertLB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman24, author = {Graeme Horsman}, title = {Sources of error in digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301693}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301693}, doi = {10.1016/J.FSIDI.2024.301693}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanD24, author = {Graeme Horsman and Andrew Dodd}, title = {Competence in digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301840}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301840}, doi = {10.1016/J.FSIDI.2024.301840}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HorsmanD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JinWJKDWY24, author = {Xin Jin and Nan Wu and Qian Jiang and Yuru Kou and Hanxian Duan and Puming Wang and Shaowen Yao}, title = {A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301747}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301747}, doi = {10.1016/J.FSIDI.2024.301747}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JinWJKDWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JungHPC24, author = {Jiheon Jung and Sangchul Han and Minkyu Park and Seong{-}je Cho}, title = {Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301752}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301752}, doi = {10.1016/J.FSIDI.2024.301752}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JungHPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KangHKK24, author = {Soojin Kang and Uk Hur and Giyoon Kim and Jongsung Kim}, title = {Forensic analysis and data decryption of tencent meeting in windows environment}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301818}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301818}, doi = {10.1016/J.FSIDI.2024.301818}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KangHKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhanAATC24, author = {Wasif Khan and Saed Alrabaee and Mousa Al{-}Kfairy and Jie Tang and Kim{-}Kwang Raymond Choo}, title = {Compiler-provenance identification in obfuscated binaries using vision transformers}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301764}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301764}, doi = {10.1016/J.FSIDI.2024.301764}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KhanAATC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimLP24, author = {Dohun Kim and Sangjin Lee and Jungheum Park}, title = {Decrypting IndexedDB in private mode of Gecko-based browsers}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301763}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301763}, doi = {10.1016/J.FSIDI.2024.301763}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KimLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KingraAK24, author = {Staffy Kingra and Naveen Aggarwal and Nirmal Kaur}, title = {SFormer: An end-to-end spatio-temporal transformer architecture for deepfake detection}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301817}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301817}, doi = {10.1016/J.FSIDI.2024.301817}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KingraAK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LindenmeierHGRF24, author = {Christian Lindenmeier and Andreas Hammer and Jan Gruber and Jonas R{\"{o}}ckl and Felix C. Freiling}, title = {Key extraction-based lawful access to encrypted data: Taxonomy and survey}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301796}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301796}, doi = {10.1016/J.FSIDI.2024.301796}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LindenmeierHGRF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MahmoodAAFR24, author = {Haroon Mahmood and Maliha Arshad and Irfan Ahmed and Sana Fatima and Hafeez Ur Rehman}, title = {Comparative study of IoT forensic frameworks}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301748}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301748}, doi = {10.1016/J.FSIDI.2024.301748}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MahmoodAAFR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MangeardTMY24, author = {Philippe Mangeard and Bhaskar Tejaswi and Mohammad Mannan and Amr M. Youssef}, title = {{WARNE:} {A} stalkerware evidence collection tool}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301677}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301677}, doi = {10.1016/J.FSIDI.2023.301677}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MangeardTMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McKeownAS24, author = {Sean McKeown and Peter Aaby and Andreas Steyven}, title = {{PHASER:} Perceptual hashing algorithms evaluation and results - An open source forensic framework}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301680}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301680}, doi = {10.1016/J.FSIDI.2023.301680}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McKeownAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MeerBJD24, author = {Vincent van der Meer and Jeroen van den Bos and Hugo Jonker and Laurent Dassen}, title = {Problem solved: {A} reliable, deterministic method for {JPEG} fragmentation point detection}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301687}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301687}, doi = {10.1016/J.FSIDI.2023.301687}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MeerBJD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MicheletB24, author = {Ga{\"{e}}tan Michelet and Frank Breitinger}, title = {ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301683}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301683}, doi = {10.1016/J.FSIDI.2023.301683}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MicheletB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MombelliLB24, author = {Samuele Mombelli and James R. Lyle and Frank Breitinger}, title = {FAIRness in digital forensics datasets' metadata - and how to improve it}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301681}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301681}, doi = {10.1016/J.FSIDI.2023.301681}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MombelliLB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MouraNF24, author = {Antonio Artur Moura and Napole{\~{a}}o Nepomuceno and Vasco Furtado}, title = {Enhancing speaker identification in criminal investigations through clusterization and rank-based scoring}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301765}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301765}, doi = {10.1016/J.FSIDI.2024.301765}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MouraNF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NavanesanLSZS24, author = {Lojenaa Navanesan and Nhien{-}An Le{-}Khac and Mark Scanlon and Kasun De Zoysa and Asanka P. Sayakkara}, title = {Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301684}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301684}, doi = {10.1016/J.FSIDI.2023.301684}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NavanesanLSZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NgJB24, author = {Magdalene Ng and Jade James and Ray Bull}, title = {"What you say in the lab, stays in the lab": {A} reflexive thematic analysis of current challenges and future directions of digital forensic investigations in the {UK}}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301839}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301839}, doi = {10.1016/J.FSIDI.2024.301839}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NgJB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nogel24, author = {M{\`{o}}nika Nogel}, title = {Some areas where digital forensics can support the addressing of legal challenges linked to forensic genetic genealogy}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301696}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301696}, doi = {10.1016/J.FSIDI.2024.301696}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Nogel24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OhKKK24, author = {Dong Bin Oh and Donghyun Kim and Huy Kang Kim}, title = {volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301756}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301756}, doi = {10.1016/J.FSIDI.2024.301756}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OhKKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OjedaHernandezLM24, author = {Manuel Ojeda{-}Hern{\'{a}}ndez and Domingo L{\'{o}}pez{-}Rodr{\'{\i}}guez and {\'{A}}ngel Mora}, title = {A Formal Concept Analysis approach to hierarchical description of malware threats}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301797}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301797}, doi = {10.1016/J.FSIDI.2024.301797}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OjedaHernandezLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OnikABW24, author = {Abdur Rahman Onik and Ruba Alsmadi and Ibrahim Baggili and Andrew M. Webb}, title = {So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301686}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301686}, doi = {10.1016/J.FSIDI.2023.301686}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OnikABW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OnikABW24a, author = {Abdur Rahman Onik and Ruba Alsmadi and Ibrahim Baggili and Andrew M. Webb}, title = {Corrigendum to "So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum" {[FSIDI} 48 {(2024)} 301686]}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301767}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301767}, doi = {10.1016/J.FSIDI.2024.301767}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OnikABW24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OnikSAB24, author = {Abdur Rahman Onik and Trevor T. Spinosa and Abdulla M. Asad and Ibrahim Baggili}, title = {Hit and run: Forensic vehicle event reconstruction through driver-based cloud data from Progressive's snapshot application}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301762}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301762}, doi = {10.1016/J.FSIDI.2024.301762}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OnikSAB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkLLJKBCL24, author = {Nam In Park and Ji Woo Lee and Seong Ho Lim and Oc{-}Yeub Jeon and Jin{-}Hwan Kim and Jun Seok Byun and Chanjun Chun and Jung Hwan Lee}, title = {Advanced forensic method to authenticate audio files from Tizen-based Samsung Galaxy Watches}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301697}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301697}, doi = {10.1016/J.FSIDI.2024.301697}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkLLJKBCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SalemH24, author = {Yaman Salem and Mohammad M. N. Hamarsheh}, title = {Forensically analyzing IoT smart camera using MAoIDFF-IoT framework}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301829}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301829}, doi = {10.1016/J.FSIDI.2024.301829}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SalemH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandhyaK24, author = {Sandhya and Abhishek Kashyap}, title = {A novel method for real-time object-based copy-move tampering localization in videos using fine-tuned {YOLO} {V8}}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301663}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301663}, doi = {10.1016/J.FSIDI.2023.301663}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandhyaK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SavchenkoOF24, author = {Ella Savchenko and Jenny Ottmann and Felix C. Freiling}, title = {In the time loop: Data remanence in main memory of virtual machines}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301758}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301758}, doi = {10.1016/J.FSIDI.2024.301758}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SavchenkoOF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchmittB24, author = {Veronica Schmitt and Emlyn Butterfield}, title = {Digital forensics in healthcare: An analysis of data associated with a {CPAP} machine}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301661}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301661}, doi = {10.1016/J.FSIDI.2023.301661}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchmittB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchmutzRF24, author = {Dominic Schmutz and Robin Rapp and Benjamin Fehrensen}, title = {Forensic analysis of hook Android malware}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301769}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301769}, doi = {10.1016/J.FSIDI.2024.301769}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchmutzRF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderEDH24, author = {Janine Schneider and Maximilian Eichhorn and Lisa Marie Dreier and Christopher Hargreaves}, title = {Applying digital stratigraphy to the problem of recycled storage media}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301761}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301761}, doi = {10.1016/J.FSIDI.2024.301761}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SchneiderEDH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SharmaA24, author = {Pankaj Sharma and Lalit Kumar Awasthi}, title = {Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301794}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301794}, doi = {10.1016/J.FSIDI.2024.301794}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SharmaA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinS24, author = {Yeonghun Shin and Taeshik Shon}, title = {Towards a practical usage for the Sleuth Kit supporting file system add-ons}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301799}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301799}, doi = {10.1016/J.FSIDI.2024.301799}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Soni24, author = {Nishchal Soni}, title = {Letter to editor regarding article, "The effects of document's format, size, and storage media on memory forensics"}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301745}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301745}, doi = {10.1016/J.FSIDI.2024.301745}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Soni24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Soni24a, author = {Nishchal Soni}, title = {Letter to Editor regarding article, "Grand theft {API:} {A} forensic analysis of vehicle cloud data"}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301800}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301800}, doi = {10.1016/J.FSIDI.2024.301800}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Soni24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SoniB24, author = {Nishchal Soni and Chitra Barotia}, title = {Letter to editor regarding article, "digital forensics in healthcare: An analysis of data associated with a {CPAP} machine"}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301749}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301749}, doi = {10.1016/J.FSIDI.2024.301749}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SoniB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SoniKA24, author = {Nishchal Soni and Manpreet Kaur and Khalid Aziz}, title = {Decoding digital interactions: An extensive study of TeamViewer's Forensic Artifacts across Windows and android platforms}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301838}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301838}, doi = {10.1016/J.FSIDI.2024.301838}, timestamp = {Thu, 31 Oct 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SoniKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SoniKB24, author = {Nishchal Soni and Manpreet Kaur and Vishwas Bhardwaj}, title = {A forensic analysis of AnyDesk Remote Access application by using various forensic tools and techniques}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301695}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301695}, doi = {10.1016/J.FSIDI.2024.301695}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SoniKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SpennemannSS24, author = {Dirk H. R. Spennemann and Rudolf J. Spennemann and Clare L. Singh}, title = {Examining and detecting academic misconduct in written documents using revision save identifier numbers in {MS} Word as exemplified by multiple scenarios}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {51}, pages = {301821}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301821}, doi = {10.1016/J.FSIDI.2024.301821}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SpennemannSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Suryal24, author = {Akarshan Suryal}, title = {Leveraging metadata in social media forensic investigations: Unravelling digital clues- {A} survey study}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301798}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301798}, doi = {10.1016/J.FSIDI.2024.301798}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Suryal24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasBransFCHS24, author = {Fabien Thomas{-}Brans and Aya Fukami and Q. Clement and Thibaut Heckmann and Damien Sauveron}, title = {Case of study for in situ memory reading on damaged MultiMedia Card}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301698}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301698}, doi = {10.1016/J.FSIDI.2024.301698}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThomasBransFCHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VaniniHBB24, author = {C{\'{e}}line Vanini and Christopher James Hargreaves and Harm van Beek and Frank Breitinger}, title = {Was the clock correct? Exploring timestamp interpretation through time anchors for digital forensic event reconstruction}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301759}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301759}, doi = {10.1016/J.FSIDI.2024.301759}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/VaniniHBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VasilarasPR24, author = {Alexandros Vasilaras and Nikolaos Papadoudis and Panagiotis Rizomiliotis}, title = {Artificial intelligence in mobile forensics: {A} survey of current status, a use case analysis and {AI} alignment objectives}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301737}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301737}, doi = {10.1016/J.FSIDI.2024.301737}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VasilarasPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WaguespackSMVA24, author = {Karley M. Waguespack and Kaitlyn J. Smith and Olame A. Muliri and Ramyapandian Vijayakanthan and Aisha I. Ali{-}Gombe}, title = {{MARS:} The first line of defense for IoT incident response}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301754}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301754}, doi = {10.1016/J.FSIDI.2024.301754}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WaguespackSMVA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WolfGB24, author = {Dennis Wolf and Thomas G{\"{o}}bel and Harald Baier}, title = {Hypervisor-based data synthesis: On its potential to tackle the curse of client-side agent remnants in forensic image generation}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301690}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301690}, doi = {10.1016/J.FSIDI.2023.301690}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WolfGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24, title = {Welcome to the 11th annual {DFRWS} Europe conference!}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301694}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301694}, doi = {10.1016/J.FSIDI.2024.301694}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24a, title = {{DFRWS} {USA} 2024 Baton Rouge}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301704}, year = {2024}, url = {https://doi.org/10.1016/s2666-2817(24)00016-7}, doi = {10.1016/S2666-2817(24)00016-7}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24b, title = {{DFRWS} {APAC} 2024 Brisbane}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301705}, year = {2024}, url = {https://doi.org/10.1016/s2666-2817(24)00017-9}, doi = {10.1016/S2666-2817(24)00017-9}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24c, title = {The role of R{\&}D in combating digital deception}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301732}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301732}, doi = {10.1016/J.FSIDI.2024.301732}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24d, title = {Twenty-Fourth {DFRWS} {USA} 2024}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301771}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301771}, doi = {10.1016/J.FSIDI.2024.301771}, timestamp = {Mon, 09 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/X24d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24e, title = {Editorial}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301772}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301772}, doi = {10.1016/J.FSIDI.2024.301772}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24f, title = {{DFRWS} {APAC} 2024 Brisbane}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301790}, year = {2024}, url = {https://doi.org/10.1016/s2666-2817(24)00113-6}, doi = {10.1016/S2666-2817(24)00113-6}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24g, title = {{DFRWS} Euro 2025 {BRNO}}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {49}, pages = {301791}, year = {2024}, url = {https://doi.org/10.1016/s2666-2817(24)00114-8}, doi = {10.1016/S2666-2817(24)00114-8}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24h, title = {Navigating the digital labyrinth: Forensics in the age of {AI}}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {50}, pages = {301820}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301820}, doi = {10.1016/J.FSIDI.2024.301820}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZengFWZLW24, author = {Chunyan Zeng and Shixiong Feng and Zhifeng Wang and Yuhao Zhao and Kun Li and Xiangkui Wan}, title = {Audio source recording device recognition based on representation learning of sequential Gaussian mean matrix}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301676}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301676}, doi = {10.1016/J.FSIDI.2023.301676}, timestamp = {Tue, 03 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZengFWZLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AagaardDAC23, author = {Posie Aagaard and Bijan Dinyarian and Omar Abduljabbar and Kim{-}Kwang Raymond Choo}, title = {Family locating sharing app forensics: Life360 as a case study}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301478}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301478}, doi = {10.1016/J.FSIDI.2022.301478}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AagaardDAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AnLH23, author = {Sang Hyuk An and Sangjin Lee and Jaehyeok Han}, title = {Data reconstruction and recovery of deduplicated files having non-resident attributes in {NTFS} volume}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301571}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301571}, doi = {10.1016/J.FSIDI.2023.301571}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AnLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndreoliLDH23, author = {Anthony Andreoli and Anis Lounis and Mourad Debbabi and Aiman Hanna}, title = {On the prevalence of software supply chain attacks: Empirical study and investigative framework}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301508}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301508}, doi = {10.1016/J.FSIDI.2023.301508}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndreoliLDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AssumpcaoRMEV23, author = {Matheus Bichara de Assump{\c{c}}{\~{a}}o and Marcelo Abdalla dos Reis and Marcos Roberto Marcondes and Pedro Monteiro da Silva Eleuterio and Victor Hugo Vieira}, title = {Forensic method for decrypting TPM-protected BitLocker volumes using Intel {DCI}}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301514}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301514}, doi = {10.1016/J.FSIDI.2023.301514}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AssumpcaoRMEV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AwadRRAP23, author = {Rima Asmar Awad and Muhammad Haris Rais and Michael Rogers and Irfan Ahmed and Vincent C. Paquit}, title = {Towards generic memory forensic framework for programmable logic controllers}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301513}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301513}, doi = {10.1016/J.FSIDI.2023.301513}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AwadRRAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BabianoMD23, author = {Luis Fernandez de Loaysa Babiano and Richard Macfarlane and Simon R. Davies}, title = {Evaluation of live forensic techniques, towards Salsa20-Based cryptographic ransomware mitigation}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301572}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301572}, doi = {10.1016/J.FSIDI.2023.301572}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BabianoMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BlankesteijnFG23, author = {Matthe{\"{u}}s B. Blankesteijn and Aya Fukami and Zeno J. M. H. Geradts}, title = {Assessing data remnants in modern smartphones after factory reset}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301587}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301587}, doi = {10.1016/J.FSIDI.2023.301587}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BlankesteijnFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChoiBLP23, author = {Geun{-}Yeong Choi and Jewan Bang and Sangjin Lee and Jungheum Park}, title = {\emph{Chracer}: Memory analysis of Chromium-based browsers}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301613}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301613}, doi = {10.1016/J.FSIDI.2023.301613}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChoiBLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChoiL23, author = {Hoyong Choi and Sangjin Lee}, title = {Forensic analysis of {SQL} server transaction log in unallocated area of file system}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301605}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301605}, doi = {10.1016/J.FSIDI.2023.301605}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChoiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DolejskaKVP23, author = {Daniel Dolejska and Michal Koutensk{\'{y}} and Vladim{\'{\i}}r Vesel{\'{y}} and Jan Pluskal}, title = {Busting up Monopoly: Methods for modern darknet marketplace forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301604}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301604}, doi = {10.1016/J.FSIDI.2023.301604}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DolejskaKVP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DominguesFF23, author = {Patr{\'{\i}}cio Domingues and Jos{\'{e}} Carlos Francisco and Miguel Frade}, title = {Post-mortem digital forensics analysis of the Zepp Life android application}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301555}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301555}, doi = {10.1016/J.FSIDI.2023.301555}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DominguesFF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DubettierGGR23, author = {Adrien Dubettier and Tanguy Gernot and Emmanuel Giguet and Christophe Rosenberger}, title = {File type identification tools for digital investigations}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301574}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301574}, doi = {10.1016/J.FSIDI.2023.301574}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DubettierGGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DudaniBRM23, author = {Sahil Dudani and Ibrahim Baggili and David R. Raymond and Randolph Marchany}, title = {The current state of cryptocurrency forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301576}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301576}, doi = {10.1016/J.FSIDI.2023.301576}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DudaniBRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FahndrichHPRBL23, author = {Johannes F{\"{a}}hndrich and Wilfried Honekamp and Roman Povalej and Heiko Rittelmeier and Silvio Berner and Dirk Labudde}, title = {Digital forensics and strong {AI:} {A} structured literature review}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301617}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301617}, doi = {10.1016/J.FSIDI.2023.301617}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FahndrichHPRBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FernandesA23, author = {Pedro Fernandes and M{\'{a}}rio Antunes}, title = {Benford's law applied to digital forensic analysis}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301515}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301515}, doi = {10.1016/J.FSIDI.2023.301515}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FernandesA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FernandezAlvarezR23, author = {Pedro Fern{\'{a}}ndez{-}{\'{A}}lvarez and Ricardo J. Rodr{\'{\i}}guez}, title = {Module extraction and {DLL} hijacking detection via single or multiple memory dumps}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301505}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301505}, doi = {10.1016/J.FSIDI.2023.301505}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FernandezAlvarezR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Findlay23, author = {Benjamin Findlay}, title = {A review of \emph{thumbnail images} artefacts in the Linux desktop and a methodology to add provenance to deleted files, using the \emph{thumbnail images} artefact in combination with \emph{recent files} history, and \emph{Trash} artefacts}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301498}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301498}, doi = {10.1016/J.FSIDI.2022.301498}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Findlay23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GongCYT23, author = {Yanan Gong and Kam{-}Pui Chow and Siu Ming Yiu and Hing{-}Fung Ting}, title = {Analyzing the peeling chain patterns on the Bitcoin blockchain}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301614}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301614}, doi = {10.1016/J.FSIDI.2023.301614}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GongCYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GostojicV23, author = {Milica Matijevic Gostojic and Zeljko Vukovic}, title = {A knowledge-based system for supporting the soundness of digital forensic investigations}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301601}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301601}, doi = {10.1016/J.FSIDI.2023.301601}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GostojicV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GruberHF23, author = {Jan Gruber and Christopher James Hargreaves and Felix C. Freiling}, title = {Contamination of digital evidence: Understanding an underexposed risk}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301501}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301501}, doi = {10.1016/J.FSIDI.2023.301501}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GruberHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuptaVZ23, author = {Khushi Gupta and Cihan Varol and Bing Zhou}, title = {Digital forensic analysis of discord on google chrome}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301479}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301479}, doi = {10.1016/J.FSIDI.2022.301479}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GuptaVZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeathMA23, author = {Howard Heath and {\'{A}}ine MacDermott and Alex Akinbi}, title = {Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data?}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301585}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301585}, doi = {10.1016/J.FSIDI.2023.301585}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HeathMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertSJL23, author = {Jan{-}Niclas Hilgert and Roman Schell and Carlo Jakobs and Martin Lambertz}, title = {About the applicability of Apache2 web server memory forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301610}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301610}, doi = {10.1016/J.FSIDI.2023.301610}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertSJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HiranoK23, author = {Manabu Hirano and Ryotaro Kobayashi}, title = {{FIMAR:} Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301603}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301603}, doi = {10.1016/J.FSIDI.2023.301603}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HiranoK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HolmesB23, author = {Arran Holmes and William J. Buchanan}, title = {A framework for live host-based Bitcoin wallet forensics and triage}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301486}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301486}, doi = {10.1016/J.FSIDI.2022.301486}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HolmesB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman23, author = {Graeme Horsman}, title = {Can signs of digital coercive control be evidenced in mobile operating system settings? - {A} guide for first responders}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301483}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301483}, doi = {10.1016/J.FSIDI.2022.301483}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HurKKK23, author = {Uk Hur and Giyoon Kim and Soojin Kang and Jongsung Kim}, title = {Forensic analysis for multi-platform Cisco Webex}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301659}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301659}, doi = {10.1016/J.FSIDI.2023.301659}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HurKKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IrshadLLL23, author = {Muhammad Irshad and Sea Ran Cleon Liew and Ngai{-}Fong Law and Ka Hong Loo}, title = {CAM\({}_{\mbox{ID}}\): An assuasive approach to reveal source camera through inconspicuous evidence}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301616}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301616}, doi = {10.1016/J.FSIDI.2023.301616}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IrshadLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JenningsSE23, author = {Luke Jennings and Matthew Sorell and Hugo G. Espinosa}, title = {Interpreting the location data extracted from the Apple Health database}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301504}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301504}, doi = {10.1016/J.FSIDI.2023.301504}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JenningsSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JounLP23, author = {Jihun Joun and Sangjin Lee and Jungheum Park}, title = {Discovering spoliation of evidence through identifying traces on deleted files in macOS}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301502}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301502}, doi = {10.1016/J.FSIDI.2023.301502}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JounLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JounLP23a, author = {Jihun Joun and Sangjin Lee and Jungheum Park}, title = {Data remnants analysis of document files in Windows: Microsoft 365 as a case study}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301612}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301612}, doi = {10.1016/J.FSIDI.2023.301612}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JounLP23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KadhaNBD23, author = {Vijayakumar Kadha and V. V. N. J. Sri Lakshmi Nandikattu and Sambit Bakshi and Santos Kumar Das}, title = {Forensic analysis of manipulation chains: {A} deep residual network for detecting JPEG-manipulation-JPEG}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301623}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301623}, doi = {10.1016/J.FSIDI.2023.301623}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KadhaNBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KantaCS23, author = {Aikaterini Kanta and Iwen Coisel and Mark Scanlon}, title = {Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301507}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301507}, doi = {10.1016/J.FSIDI.2023.301507}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KantaCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KerrHYKS23, author = {Michael Kerr and Fengling Han and Xun Yi and Andrei Kelarev and Ron G. van Schyndel}, title = {A non-invasive method for the cataloguing and authentication of surveillance video using on-camera blockchain participation, machine learning and signal analysis}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301573}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301573}, doi = {10.1016/J.FSIDI.2023.301573}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KerrHYKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimOS23, author = {Donghyun Kim and Subin Oh and Taeshik Shon}, title = {Digital forensic approaches for metaverse ecosystems}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301608}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301608}, doi = {10.1016/J.FSIDI.2023.301608}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimPL23, author = {Jieon Kim and Jungheum Park and Sangjin Lee}, title = {An improved IoT forensic model to identify interconnectivity between things}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301499}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301499}, doi = {10.1016/J.FSIDI.2022.301499}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KowalskiKK23, author = {Piotr A. Kowalski and Maciej Kusy and Karol Kocierz}, title = {The forensic information identification based on machine learning algorithms}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301619}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301619}, doi = {10.1016/J.FSIDI.2023.301619}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KowalskiKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LarsenNL23, author = {Ole Halvar Larsen and Hung Q. Ngo and Nhien{-}An Le{-}Khac}, title = {A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301622}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301622}, doi = {10.1016/J.FSIDI.2023.301622}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LarsenNL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeHJP23, author = {Jung Hwan Lee and Bumsu Hyeon and Oc{-}Yeub Jeon and Nam In Park}, title = {Analysis of real-time operating systems' file systems: Built-in cameras from vehicles}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301500}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301500}, doi = {10.1016/J.FSIDI.2023.301500}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeeHJP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeLKLK23, author = {Eunji Lee and Seo Yeon Lee and Hyeon Kwon and Sungjin Lee and Gi Bum Kim}, title = {Identification of data wiping tools based on deletion patterns in ReFS {\textdollar}Logfile}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301607}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301607}, doi = {10.1016/J.FSIDI.2023.301607}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeeLKLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LorenzSCST23, author = {Scott Lorenz and Stanley Stinehour and Anitha Chennamaneni and Abdul B. Subhani and Damiano Torre}, title = {IoT forensic analysis: {A} family of experiments with Amazon Echo devices}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301541}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301541}, doi = {10.1016/J.FSIDI.2023.301541}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LorenzSCST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McKeownB23, author = {Sean McKeown and William J. Buchanan}, title = {Hamming distributions of popular perceptual hashing techniques}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301509}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301509}, doi = {10.1016/J.FSIDI.2023.301509}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McKeownB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MettigGCR23, author = {Raphaela Mettig and Charles Glass and Andrew Case and Golden G. Richard III}, title = {Assessing the threat of Rosetta 2 on Apple Silicon devices}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301618}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301618}, doi = {10.1016/J.FSIDI.2023.301618}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MettigGCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MuriasLM23, author = {Juli{\'{a}}n Garc{\'{\i}}a Murias and Douglas Levick and Sean McKeown}, title = {A forensic analysis of streaming platforms on Android {OS}}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301485}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301485}, doi = {10.1016/J.FSIDI.2022.301485}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MuriasLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Neale23, author = {Christopher Neale}, title = {Fool me once: {A} systematic review of techniques to authenticate digital artefacts}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301516}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301516}, doi = {10.1016/J.FSIDI.2023.301516}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Neale23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NgoL23, author = {Hung Q. Ngo and Nhien{-}An Le{-}Khac}, title = {Ontology-based case study management towards bridging training and actual investigation gaps in digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301621}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301621}, doi = {10.1016/J.FSIDI.2023.301621}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NgoL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NisiotiLMP23, author = {Antonia Nisioti and George Loukas and Alexios Mylonas and Emmanouil Panaousis}, title = {Forensics for multi-stage cyber incidents: Survey and future directions}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301480}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301480}, doi = {10.1016/J.FSIDI.2022.301480}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NisiotiLMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NissanWA23, author = {Mahfuzul I. Nissan and James Wagner and Sharmin Aktar}, title = {Database memory forensics: {A} machine learning approach to reverse-engineer query activity}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301503}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301503}, doi = {10.1016/J.FSIDI.2023.301503}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NissanWA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NordvikA23, author = {Rune Nordvik and Stefan Axelsson}, title = {Corrigendum to "It is about time-do exFAT implementations handle timestamps correctly?" [Forensic Science International: Digital Investigation 42-43 {(2022)} 301476]}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301542}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301542}, doi = {10.1016/J.FSIDI.2023.301542}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NordvikA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NunesDF23, author = {Fabian Nunes and Patr{\'{\i}}cio Domingues and Miguel Frade}, title = {Post-mortem digital forensic analysis of the Garmin Connect application for Android}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301624}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301624}, doi = {10.1016/J.FSIDI.2023.301624}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NunesDF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/QamhanAS23, author = {Mustafa A. Qamhan and Yousef Ajami Alotaibi and Sid{-}Ahmed Selouani}, title = {Transformer for authenticating the source microphone in digital audio forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301539}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301539}, doi = {10.1016/J.FSIDI.2023.301539}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/QamhanAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RaisAA23, author = {Muhammad Haris Rais and Muhammad Ahsan and Irfan Ahmed}, title = {FRoMEPP: Digital forensic readiness framework for material extrusion based 3D printing process}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301510}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301510}, doi = {10.1016/J.FSIDI.2023.301510}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RaisAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RathoreNSS23, author = {Hemant Rathore and Adarsh Nandanwar and Sanjay K. Sahay and Mohit Sewak}, title = {Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301511}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301511}, doi = {10.1016/J.FSIDI.2023.301511}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RathoreNSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RaymerMA23, author = {Emma Raymer and {\'{A}}ine MacDermott and Alex Akinbi}, title = {Virtual reality forensics: Forensic analysis of Meta Quest 2}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301658}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301658}, doi = {10.1016/J.FSIDI.2023.301658}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RaymerMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoopakKPA23, author = {Monika Roopak and Saad Khan and Simon Parkinson and Rachel Armitage}, title = {Comparison of deep learning classification models for facial image age estimation in digital forensic investigations}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301637}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301637}, doi = {10.1016/J.FSIDI.2023.301637}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RoopakKPA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SadineniPB23, author = {Lakshminarayana Sadineni and Emmanuel S. Pilli and Ramesh Babu Battula}, title = {ProvLink-IoT: {A} novel provenance model for Link-Layer Forensics in IoT networks}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301600}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301600}, doi = {10.1016/J.FSIDI.2023.301600}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SadineniPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandvikFAA23, author = {Jens{-}Petter Sandvik and Katrin Franke and Habtamu Abie and Andr{\'{e}} {\AA}rnes}, title = {Evidence in the fog - Triage in fog computing systems}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301506}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301506}, doi = {10.1016/J.FSIDI.2023.301506}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandvikFAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ScanlonBHHS23, author = {Mark Scanlon and Frank Breitinger and Christopher Hargreaves and Jan{-}Niclas Hilgert and John Sheppard}, title = {ChatGPT for digital forensic investigation: The good, the bad, and the unknown}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301609}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301609}, doi = {10.1016/J.FSIDI.2023.301609}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ScanlonBHHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ScanlonNG23, author = {Mark Scanlon and Bruce J. Nikkel and Zeno J. M. H. Geradts}, title = {Digital forensic investigation in the age of ChatGPT}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301543}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301543}, doi = {10.1016/J.FSIDI.2023.301543}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ScanlonNG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SoltaniH23, author = {Somayeh Soltani and Seyed{-}Amin Hosseini{-}Seno}, title = {Detecting the software usage on a compromised system: {A} triage solution for digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, pages = {301484}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2022.301484}, doi = {10.1016/J.FSIDI.2022.301484}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SoltaniH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SonKJBP23, author = {Jihun Son and Gyubin Kim and Hyunwoo Jung and Jewan Bang and Jungheum Park}, title = {\emph{IF-DSS}: {A} forensic investigation framework for decentralized storage services}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301611}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301611}, doi = {10.1016/J.FSIDI.2023.301611}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SonKJBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SongO23, author = {Kwangkeun Song and Dong Bin Oh}, title = {Bike computer forensics: An efficient and robust method for {FIT} file recovery}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, number = {Supplement}, pages = {301606}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301606}, doi = {10.1016/J.FSIDI.2023.301606}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SongO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Spichiger23, author = {Hannes Spichiger}, title = {A likelihood ratio approach for the evaluation of single point device locations}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {44}, number = {Supplement}, pages = {301512}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301512}, doi = {10.1016/J.FSIDI.2023.301512}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Spichiger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Stoykova23, author = {Radina Stoykova}, title = {\emph{Encrochat}: The hacker with a warrant and fair trials?}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301602}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301602}, doi = {10.1016/J.FSIDI.2023.301602}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Stoykova23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StoykovaF23, author = {Radina Stoykova and Katrin Franke}, title = {Reliability validation enabling framework {(RVEF)} for digital forensics in criminal investigations}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301554}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301554}, doi = {10.1016/J.FSIDI.2023.301554}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/StoykovaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SundeF23, author = {Nina Sunde and Virginia N. L. Franqueira}, title = {Adding transparency to uncertainty: An argument-based method for evaluative opinions}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301657}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301657}, doi = {10.1016/J.FSIDI.2023.301657}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SundeF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TokC23, author = {Yee Ching Tok and Sudipta Chattopadhyay}, title = {Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301540}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301540}, doi = {10.1016/J.FSIDI.2023.301540}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TokC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TrozzeDK23, author = {Arianna Trozze and Toby Davies and Bennett Kleinberg}, title = {Of degens and defrauders: Using open-source investigative tools to investigate decentralized finance frauds and money laundering}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {46}, pages = {301575}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301575}, doi = {10.1016/J.FSIDI.2023.301575}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TrozzeDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WestlakeG23, author = {Bryce Westlake and Enrique Guerra}, title = {Using file and folder naming and structuring to improve automated detection of child sexual abuse images on the Dark Web}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301620}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301620}, doi = {10.1016/J.FSIDI.2023.301620}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WestlakeG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X23, title = {Editorial}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301670}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301670}, doi = {10.1016/J.FSIDI.2023.301670}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZandwijkLB23, author = {Jan Peter van Zandwijk and Kim Lensen and Abdul Boztas}, title = {Have you been upstairs? On the accuracy of registrations of ascended and descended floors in iPhones}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {47}, pages = {301660}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301660}, doi = {10.1016/J.FSIDI.2023.301660}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZandwijkLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AkbariAEKLB22, author = {Younes Akbari and Somaya Al{-}M{\'{a}}adeed and Omar Elharrouss and Fouad Khelifi and Ashref Lawgaly and Ahmed Bouridane}, title = {Digital forensic analysis for source video identification: {A} survey}, journal = {Digit. Investig.}, volume = {41}, pages = {301390}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301390}, doi = {10.1016/J.FSIDI.2022.301390}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AkbariAEKLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AkilalK22, author = {Abdellah Akilal and M. Tahar Kechadi}, title = {An improved forensic-by-design framework for cloud computing with systems engineering standard compliance}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301315}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301315}, doi = {10.1016/J.FSIDI.2021.301315}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AkilalK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AkinbiMI22, author = {Alex Akinbi and {\'{A}}ine MacDermott and Aras Masood Ismael}, title = {A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301470}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301470}, doi = {10.1016/J.FSIDI.2022.301470}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AkinbiMI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BahamazavaN22, author = {Katsiaryna Bahamazava and Rohan Nanda}, title = {The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301377}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301377}, doi = {10.1016/J.FSIDI.2022.301377}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BahamazavaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BangPL22, author = {Jewan Bang and Jungheum Park and Sangjin Lee}, title = {Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301376}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301376}, doi = {10.1016/J.FSIDI.2022.301376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BangPL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BarralJTRGHSN22, author = {Hadrien Barral and Georges{-}Axel Jaloyan and Fabien Thomas{-}Brans and Matthieu Regnery and R{\'{e}}mi G{\'{e}}raud{-}Stewart and Thibaut Heckmann and Thomas R. Souvignet and David Naccache}, title = {A forensic analysis of the Google Home: repairing compressed data without error correction}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301437}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301437}, doi = {10.1016/J.FSIDI.2022.301437}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BarralJTRGHSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BorgTBCFC22, author = {Mark Borg and Andr{\'{e}} Tabone and Alexandra Bonnici and Stefania Cristina and Reuben A. Farrugia and Kenneth P. Camilleri}, title = {Detecting and ranking pornographic content in videos}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301436}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301436}, doi = {10.1016/J.FSIDI.2022.301436}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BorgTBCFC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerZQ22, author = {Frank Breitinger and Xiaolu Zhang and Darren Quick}, title = {A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301443}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301443}, doi = {10.1016/J.FSIDI.2022.301443}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BreitingerZQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CalderoniM22, author = {Luca Calderoni and Antonio Magnani}, title = {The impact of face image compression in future generation electronic identity documents}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301345}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301345}, doi = {10.1016/J.FSIDI.2022.301345}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CalderoniM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChamotGH22, author = {Frederic Chamot and Zeno J. M. H. Geradts and Evert Haasdijk}, title = {Deepfake forensics: Cross-manipulation robustness of feedforward- and recurrent convolutional forgery detection methods}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301374}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301374}, doi = {10.1016/J.FSIDI.2022.301374}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChamotGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ClosserB22, author = {Dayton Closser and Elias Bou{-}Harb}, title = {A live digital forensics approach for quantum mechanical computers}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301341}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301341}, doi = {10.1016/J.FSIDI.2022.301341}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ClosserB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DaviesMB22, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {NapierOne: {A} modern mixed file data set alternative to Govdocs1}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301330}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301330}, doi = {10.1016/J.FSIDI.2021.301330}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DaviesMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DavisMA22, author = {Megan Davis and Bridget T. McInnes and Irfan Ahmed}, title = {Forensic investigation of instant messaging services on linux {OS:} Discord and Slack as case studies}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301401}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301401}, doi = {10.1016/J.FSIDI.2022.301401}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DavisMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fernandez-Alvarez22, author = {Pedro Fern{\'{a}}ndez{-}{\'{A}}lvarez and Ricardo J. Rodr{\'{\i}}guez}, title = {Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301342}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301342}, doi = {10.1016/J.FSIDI.2022.301342}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fernandez-Alvarez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GobelMTBM22, author = {Thomas G{\"{o}}bel and Stephan Maltan and Jan T{\"{u}}rr and Harald Baier and Florian Mann}, title = {ForTrace - {A} holistic forensic data set synthesis framework}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301344}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301344}, doi = {10.1016/J.FSIDI.2022.301344}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GobelMTBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GobelUBB22, author = {Thomas G{\"{o}}bel and Frieder Uhlig and Harald Baier and Frank Breitinger}, title = {{FRASHER} - {A} framework for automated evaluation of similarity hashing}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301407}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301407}, doi = {10.1016/J.FSIDI.2022.301407}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GobelUBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GomezM0N22, author = {Juan Manuel Castelo G{\'{o}}mez and Javier Carrillo Mond{\'{e}}jar and Jos{\'{e}} Luis Mart{\'{\i}}nez Mart{\'{\i}}nez and Jorge Navarro{-}Garc{\'{\i}}a}, title = {Forensic analysis of the Xiaomi Mi Smart Sensor Set}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301451}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301451}, doi = {10.1016/J.FSIDI.2022.301451}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GomezM0N22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GoncalvesDSAB22, author = {Patrik Gon{\c{c}}alves and Klara Dolos and Michelle Stebner and Andreas Attenberger and Harald Baier}, title = {Revisiting the dataset gap problem - On availability, assessment and perspective of mobile forensic corpora}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301439}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301439}, doi = {10.1016/J.FSIDI.2022.301439}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GoncalvesDSAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GongCYT22, author = {Yanan Gong and Kam{-}Pui Chow and Siu{-}Ming Yiu and Hing{-}Fung Ting}, title = {Sensitivity analysis for a Bitcoin simulation model}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301449}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301449}, doi = {10.1016/J.FSIDI.2022.301449}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GongCYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GruberVBF22, author = {Jan Gruber and Lena L. Voigt and Zinaida Benenson and Felix C. Freiling}, title = {Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301438}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301438}, doi = {10.1016/J.FSIDI.2022.301438}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GruberVBF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HadgkissMPVN22, author = {Melissa Hadgkiss and Sarah Morris and Stacey Paget and Adrian Ventress and Karl Norris}, title = {Cheap as chips: An accessible chip off acquisition method for ball grid array {(BGA)} integrated circuits in digital investigations}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301481}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301481}, doi = {10.1016/J.FSIDI.2022.301481}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HadgkissMPVN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HiranoHK22, author = {Manabu Hirano and Ryo Hodota and Ryotaro Kobayashi}, title = {RanSAP: An open dataset of ransomware storage access patterns for training machine learning models}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301314}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301314}, doi = {10.1016/J.FSIDI.2021.301314}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HiranoHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman22, author = {Graeme Horsman}, title = {Conducting a 'manual examination' of a device as part of a digital investigation}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301331}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301331}, doi = {10.1016/J.FSIDI.2021.301331}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman22a, author = {Graeme Horsman}, title = {Defining principles for preserving privacy in digital forensic examinations}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301350}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301350}, doi = {10.1016/J.FSIDI.2022.301350}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IqbalKMSH22, author = {Farkhund Iqbal and Zainab Khalid and Andrew Marrington and Babar Shah and Patrick C. K. Hung}, title = {Forensic investigation of Google Meet for memory and browser artifacts}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301448}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301448}, doi = {10.1016/J.FSIDI.2022.301448}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IqbalKMSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JacobN22, author = {Rijo Jacob and Alastair Nisbet}, title = {A forensic investigation framework for Internet of Things monitoring}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301482}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301482}, doi = {10.1016/J.FSIDI.2022.301482}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JacobN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JakobsLH22, author = {Carlo Jakobs and Martin Lambertz and Jan{-}Niclas Hilgert}, title = {ssdeeper: Evaluating and improving ssdeep}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301402}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301402}, doi = {10.1016/J.FSIDI.2022.301402}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JakobsLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Jaquet-Chiffelle22, author = {David{-}Olivier Jaquet{-}Chiffelle and Eoghan Casey and Jonathan Bourquenoud}, title = {Corrigendum to "Tamperproof timestamped provenance ledger using blockchain technology{\({_\ast}\)}" [Forens. Sci. Int.: Digit. Invest. 33 {(2020)} 300977]}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301332}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301332}, doi = {10.1016/J.FSIDI.2022.301332}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Jaquet-Chiffelle22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JohnsonVSGB22, author = {Hailey Johnson and Karl Volk and Robert Serafin and Cinthya Grajeda and Ibrahim M. Baggili}, title = {Alt-tech social forensics: Forensic analysis of alternative social networking applications}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301406}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301406}, doi = {10.1016/J.FSIDI.2022.301406}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JohnsonVSGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhaireK22, author = {Pushpajit Khaire and Praveen Kumar}, title = {A semi-supervised deep learning based video anomaly detection framework using {RGB-D} for surveillance of real-world critical environments}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301346}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301346}, doi = {10.1016/J.FSIDI.2022.301346}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhaireK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhanjiAAKA22, author = {Salam Ismail Rasheed Khanji and Omar Alfandi and Liza Ahmad and Lubna Kakkengal and Mousa Al{-}Kfairy}, title = {A systematic analysis on the readiness of Blockchain integration in IoT forensics}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301472}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301472}, doi = {10.1016/J.FSIDI.2022.301472}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhanjiAAKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimKSYSLK22, author = {Soram Kim and Giyoon Kim and Sumin Shin and Byungchul Youn and Jian Song and Insoo Lee and Jongsung Kim}, title = {Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301353}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301353}, doi = {10.1016/J.FSIDI.2022.301353}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimKSYSLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KingraAK22, author = {Staffy Kingra and Naveen Aggarwal and Nirmal Kaur}, title = {LBPNet: Exploiting texture descriptor for deepfake detection}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301452}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301452}, doi = {10.1016/J.FSIDI.2022.301452}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KingraAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LamshoftNHVD22, author = {Kevin Lamsh{\"{o}}ft and Tom Neubert and Jonas Hielscher and Claus Vielhauer and Jana Dittmann}, title = {Knock, knock, log: Threat analysis, detection {\&} mitigation of covert channels in syslog using port scans as cover}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301335}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301335}, doi = {10.1016/J.FSIDI.2022.301335}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LamshoftNHVD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LiSL22, author = {Qi Li and Giuliano Sovernigo and Xiaodong Lin}, title = {BlackFeather: {A} framework for background noise forensics}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301396}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301396}, doi = {10.1016/J.FSIDI.2022.301396}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LiSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MacDermottMISHM22, author = {{\'{A}}ine MacDermott and Michal Motylinski and Farkhund Iqbal and Kellyann Stamp and Mohammed Hussain and Andrew Marrington}, title = {Using deep learning to detect social media 'trolls'}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301446}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301446}, doi = {10.1016/J.FSIDI.2022.301446}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MacDermottMISHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MannaCAR22, author = {Modhuparna Manna and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Memory analysis of .NET and .Net Core applications}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301404}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301404}, doi = {10.1016/J.FSIDI.2022.301404}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MannaCAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Marshall22, author = {Angus M. Marshall}, title = {The unwanted effects of imprecise language in forensic science standards}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301349}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301349}, doi = {10.1016/J.FSIDI.2022.301349}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Marshall22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NealeKPYN22, author = {Christopher Neale and Ian Kennedy and Blaine A. Price and Yijun Yu and Bashar Nuseibeh}, title = {The case for Zero Trust Digital Forensics}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301352}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301352}, doi = {10.1016/J.FSIDI.2022.301352}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NealeKPYN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NguyenOA22, author = {Thanh Nguyen and Meni Orenbach and Ahmad Atamli}, title = {Live system call trace reconstruction on Linux}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301398}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301398}, doi = {10.1016/J.FSIDI.2022.301398}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NguyenOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nikkel22, author = {Bruce J. Nikkel}, title = {Editorial}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301388}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301388}, doi = {10.1016/J.FSIDI.2022.301388}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Nikkel22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NikkelG22, author = {Bruce J. Nikkel and Zeno Geradts}, title = {Editorial}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301487}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301487}, doi = {10.1016/J.FSIDI.2022.301487}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NikkelG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NordvikA22, author = {Rune Nordvik and Stefan Axelsson}, title = {It is about time-Do exFAT implementations handle timestamps correctly?}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301476}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301476}, doi = {10.1016/J.FSIDI.2022.301476}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NordvikA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkL22, author = {Sungha Park and Sangjin Lee}, title = {DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301450}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301450}, doi = {10.1016/J.FSIDI.2022.301450}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkLYK22, author = {Myungseo Park and Sehoon Lee and Okyeon Yi and Jongsung Kim}, title = {A study on data acquisition based on the Huawei smartphone backup protocol}, journal = {Digit. Investig.}, volume = {41}, pages = {301393}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301393}, doi = {10.1016/J.FSIDI.2022.301393}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkLYK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ProfTC22, author = {Felix Olu Bankole and Ayankunle A. Taiwo and Ivan Claims}, title = {An extended digital forensic readiness and maturity model}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301348}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301348}, doi = {10.1016/J.FSIDI.2022.301348}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ProfTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RaisALA22, author = {Muhammad Haris Rais and Rima Asmar Awad and Juan Lopez Jr. and Irfan Ahmed}, title = {Memory forensic analysis of a programmable logic controller in industrial control systems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301339}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301339}, doi = {10.1016/J.FSIDI.2022.301339}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RaisALA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Rana0R22, author = {Md. Mehedi Rahman Rana and Abul Hasnat and G. M. Atiqur Rahaman}, title = {{SMIFD-1000:} Social media image forgery detection database}, journal = {Digit. Investig.}, volume = {41}, pages = {301392}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301392}, doi = {10.1016/J.FSIDI.2022.301392}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Rana0R22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SadineniPB22, author = {Lakshminarayana Sadineni and Emmanuel S. Pilli and Ramesh Babu Battula}, title = {ProvNet-IoT: Provenance based network layer forensics in Internet of Things}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301441}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301441}, doi = {10.1016/J.FSIDI.2022.301441}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SadineniPB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandvikFAA22, author = {Jens{-}Petter Sandvik and Katrin Franke and Habtamu Abie and Andr{\'{e}} {\AA}rnes}, title = {Quantifying data volatility for IoT forensics with examples from Contiki {OS}}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301343}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301343}, doi = {10.1016/J.FSIDI.2022.301343}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandvikFAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderDLDF22, author = {Janine Schneider and Linus D{\"{u}}sel and Benedikt Lorch and Julia Drafz and Felix C. Freiling}, title = {Prudent design principles for digital tampering experiments}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301334}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301334}, doi = {10.1016/J.FSIDI.2022.301334}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderDLDF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderEF22, author = {Janine Schneider and Maximilian Eichhorn and Felix C. Freiling}, title = {Ambiguous file system partitions}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301399}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301399}, doi = {10.1016/J.FSIDI.2022.301399}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderEF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SentanoeDR22, author = {Stewart Sentanoe and Thomas Dangl and Hans P. Reiser}, title = {\emph{KVMIveggur}: Flexible, secure, and efficient support for self-service virtual machine introspection}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301397}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301397}, doi = {10.1016/J.FSIDI.2022.301397}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SentanoeDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SentanoeR22, author = {Stewart Sentanoe and Hans P. Reiser}, title = {\emph{SSHkex}: Leveraging virtual machine introspection for extracting {SSH} keys and decrypting {SSH} network traffic}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301337}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301337}, doi = {10.1016/J.FSIDI.2022.301337}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SentanoeR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SewakSR22, author = {Mohit Sewak and Sanjay K. Sahay and Hemant Rathore}, title = {Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for malware detection and forensics}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301444}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301444}, doi = {10.1016/J.FSIDI.2022.301444}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SewakSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SewakSR22a, author = {Mohit Sewak and Sanjay K. Sahay and Hemant Rathore}, title = {GreenForensics: Deep hybrid edge-cloud detection and forensics system for battery-performance-balance conscious devices}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301445}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301445}, doi = {10.1016/J.FSIDI.2022.301445}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SewakSR22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShiCG22, author = {Chen Shi and Chris Chao{-}Chun Cheng and Yong Guan}, title = {LibDroid: Summarizing information flow of android native libraries via static analysis}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301405}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301405}, doi = {10.1016/J.FSIDI.2022.301405}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShiCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinCS22, author = {Jiho Shin and Hyunpyo Choi and Jung{-}Taek Seo}, title = {A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301354}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301354}, doi = {10.1016/J.FSIDI.2022.301354}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinKKK22, author = {Sumin Shin and Giyoon Kim and Soram Kim and Jongsung Kim}, title = {Forensic analysis of note and journal applications}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301355}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301355}, doi = {10.1016/J.FSIDI.2022.301355}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinKKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SinghKGCS22, author = {Monika Singh and Anviksha Khunteta and Mohona Ghosh and Donghoon Chang and Somitra Kumar Sanadhya}, title = {FbHash-E: {A} time and memory efficient version of FbHash similarity hashing algorithm}, journal = {Digit. Investig.}, volume = {41}, pages = {301375}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301375}, doi = {10.1016/J.FSIDI.2022.301375}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SinghKGCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Solanke22, author = {Abiodun A. Solanke}, title = {Explainable digital forensics {AI:} Towards mitigating distrust in AI-based digital forensics analysis using interpretable models}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301403}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301403}, doi = {10.1016/J.FSIDI.2022.301403}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Solanke22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sommer22, author = {Peter Sommer}, title = {Evidence from hacking: {A} few tiresome problems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301333}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301333}, doi = {10.1016/J.FSIDI.2022.301333}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sommer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SonKOK22, author = {Jihun Son and Yeong Woong Kim and Dong Bin Oh and Kyounggon Kim}, title = {Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301347}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301347}, doi = {10.1016/J.FSIDI.2022.301347}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SonKOK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StoykovaAFA22, author = {Radina Stoykova and Stig Andersen and Katrin Franke and Stefan Axelsson}, title = {Reliability assessment of digital forensic investigations in the Norwegian police}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301351}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301351}, doi = {10.1016/J.FSIDI.2022.301351}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/StoykovaAFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SuTP22, author = {Kaiqing Su and Nili Tian and Qing Pan}, title = {Multimedia source identification using an improved weight photo response non-uniformity noise extraction model in short compressed videos}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301473}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301473}, doi = {10.1016/J.FSIDI.2022.301473}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SuTP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SumailaB22, author = {Faisal Sumaila and Hayretdin Bahsi}, title = {Digital forensic analysis of mobile automotive maintenance applications}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301440}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301440}, doi = {10.1016/J.FSIDI.2022.301440}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SumailaB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sunde22, author = {Nina Sunde}, title = {Strategies for safeguarding examiner objectivity and evidence reliability during digital forensic investigations}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301317}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301317}, doi = {10.1016/J.FSIDI.2021.301317}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sunde22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TaylorKAA22, author = {Sarah K. Taylor and Steve Ho{-}yong Kim and Khairul Akram Zainol Ariffin and Siti Norul Huda Sheikh Abdullah}, title = {A comprehensive forensic preservation methodology for crypto wallets}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301477}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301477}, doi = {10.1016/J.FSIDI.2022.301477}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TaylorKAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThierryM22, author = {Aur{\'{e}}lien Thierry and Tilo M{\"{u}}ller}, title = {A systematic approach to understanding {MACB} timestamps on Unix-like systems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301338}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301338}, doi = {10.1016/J.FSIDI.2022.301338}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThierryM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasEB22, author = {Tyler Thomas and Tiffanie Edwards and Ibrahim M. Baggili}, title = {BlockQuery: Toward forensically sound cryptocurrency investigation}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301340}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301340}, doi = {10.1016/J.FSIDI.2022.301340}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThomasEB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThorntonZ22, author = {Greg Thornton and Pooneh Bagheri Zadeh}, title = {An investigation into Unmanned Aerial System {(UAS)} forensics: Data extraction {\&} analysis}, journal = {Digit. Investig.}, volume = {41}, pages = {301379}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301379}, doi = {10.1016/J.FSIDI.2022.301379}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThorntonZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TironsakkulMEJ22, author = {Tin Tironsakkul and Manuel Maarek and Andrea Eross and Mike Just}, title = {Context matters: Methods for Bitcoin tracking}, journal = {Digit. Investig.}, volume = {42-43}, pages = {301475}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301475}, doi = {10.1016/J.FSIDI.2022.301475}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TironsakkulMEJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VasilarasDKR22, author = {Alexandros Vasilaras and Donatos Dosis and Michael Kotsis and Panagiotis Rizomiliotis}, title = {Retrieving deleted records from Telegram}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301447}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301447}, doi = {10.1016/J.FSIDI.2022.301447}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VasilarasDKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VinkSBZ22, author = {Marouschka Vink and Marjan Sjerps and Abdul Boztas and Jan Peter van Zandwijk}, title = {Likelihood ratio method for the interpretation of iPhone health app data in digital forensics}, journal = {Digit. Investig.}, volume = {41}, pages = {301389}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301389}, doi = {10.1016/J.FSIDI.2022.301389}, timestamp = {Mon, 11 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VinkSBZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WangLCC22, author = {Tianyi Wang and Ming Liu and Wei Cao and Kam{-}Pui Chow}, title = {Deepfake noise investigation and detection}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301395}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301395}, doi = {10.1016/J.FSIDI.2022.301395}, timestamp = {Mon, 28 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WangLCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WangZDTB22, author = {Enoch Wang and Samuel Zurowski and Orion Duffy and Tyler Thomas and Ibrahim M. Baggili}, title = {Juicing {V8:} {A} primary account for the memory forensics of the {V8} JavaScript engine}, journal = {Digit. Investig.}, volume = {42}, number = {Supplement}, pages = {301400}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301400}, doi = {10.1016/J.FSIDI.2022.301400}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WangZDTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WuSDL22, author = {Songyang Wu and Wenqi Sun and Zhiguo Ding and Shanjun Liu}, title = {Cloud Evidence Tracing System: An integrated forensics investigation system for large-scale public cloud platform}, journal = {Digit. Investig.}, volume = {41}, pages = {301391}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301391}, doi = {10.1016/J.FSIDI.2022.301391}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WuSDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YangKBLP22, author = {Jihyeok Yang and Jieon Kim and Jewan Bang and Sangjin Lee and Jungheum Park}, title = {{CATCH:} Cloud Data Acquisition through Comprehensive and Hybrid Approaches}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301442}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301442}, doi = {10.1016/J.FSIDI.2022.301442}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/YangKBLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZubairAYA22, author = {Nauman Zubair and Adeen Ayub and Hyunguk Yoo and Irfan Ahmed}, title = {{PEM:} Remote forensic acquisition of {PLC} memory in industrial control systems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301336}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301336}, doi = {10.1016/J.FSIDI.2022.301336}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZubairAYA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AbbasHSZ21, author = {Syed Ghazanfar Abbas and Fabiha Hashmat and Ghalib A. Shah and Kashif Zafar}, title = {Generic signature development for IoT Botnet families}, journal = {Digit. Investig.}, volume = {38}, pages = {301224}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301224}, doi = {10.1016/J.FSIDI.2021.301224}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AbbasHSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AbrahamNMTR21, author = {Joshua Abraham and Ronnie Ng and Marie Morelato and Mark Tahtouh and Claude Roux}, title = {Automatically classifying crime scene images using machine learning methodologies}, journal = {Digit. Investig.}, volume = {39}, pages = {301273}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301273}, doi = {10.1016/J.FSIDI.2021.301273}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AbrahamNMTR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AhmedKLB21, author = {Farah Ahmed and Fouad Khelifi and Ashref Lawgaly and Ahmed Bouridane}, title = {A machine learning-based approach for picture acquisition timeslot prediction using defective pixels}, journal = {Digit. Investig.}, volume = {39}, pages = {301311}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301311}, doi = {10.1016/J.FSIDI.2021.301311}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AhmedKLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AkinbiO21, author = {Alex Akinbi and Ehizojie Ojie}, title = {Forensic analysis of open-source {XMPP} multi-client social networking apps on iOS devices}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301122}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301122}, doi = {10.1016/J.FSIDI.2021.301122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AkinbiO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Alam21, author = {Shahid Alam}, title = {Applying Natural Language Processing for detecting malicious patterns in Android applications}, journal = {Digit. Investig.}, volume = {39}, pages = {301270}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301270}, doi = {10.1016/J.FSIDI.2021.301270}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Alam21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlendalAD21, author = {Gunnar Alendal and Stefan Axelsson and Geir Olav Dyrkolbotn}, title = {Chip chop - smashing the mobile phone secure chip for fun and digital forensics}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301191}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301191}, doi = {10.1016/J.FSIDI.2021.301191}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AlendalAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndaDBLS21, author = {Felix Anda and Edward Dixon and Elias Bou{-}Harb and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Vec2UAge: Enhancing underage age estimation performance through facial embeddings}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301119}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301119}, doi = {10.1016/J.FSIDI.2021.301119}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndaDBLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaracchiSIGP21, author = {Daniele Baracchi and Dasara Shullani and Massimo Iuliani and Damiano Giani and Alessandro Piva}, title = {Camera Obscura: Exploiting in-camera processing for image counter forensics}, journal = {Digit. Investig.}, volume = {38}, pages = {301213}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301213}, doi = {10.1016/J.FSIDI.2021.301213}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaracchiSIGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Barr-SmithFLRRS21, author = {Frederick Barr{-}Smith and Thomas Farrant and Benjamin Leonard{-}Lagarde and Danny Rigby and Sash Rigby and Frederick Sibley{-}Calder}, title = {Dead Man's Switch: Forensic Autopsy of the Nintendo Switch}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301110}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301110}, doi = {10.1016/J.FSIDI.2021.301110}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Barr-SmithFLRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BotacinMCHG21, author = {Marcus Botacin and Vitor Hugo Galhardo Moia and Fabricio Ceschin and Marco Aur{\'{e}}lio Amaral Henriques and Andr{\'{e}} Gr{\'{e}}gio}, title = {Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios}, journal = {Digit. Investig.}, volume = {38}, pages = {301220}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301220}, doi = {10.1016/J.FSIDI.2021.301220}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BotacinMCHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BuquerinCH21, author = {Kevin Klaus Gomez Buquerin and Christopher Corbett and Hans{-}Joachim Hof}, title = {A generalized approach to automotive forensics}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301111}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301111}, doi = {10.1016/J.FSIDI.2021.301111}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BuquerinCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChengSGG21, author = {Chris Chao{-}Chun Cheng and Chen Shi and Neil Zhenqiang Gong and Yong Guan}, title = {LogExtractor: Extracting digital evidence from android log messages via string and taint analysis}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301193}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301193}, doi = {10.1016/J.FSIDI.2021.301193}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChengSGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChoiPL21, author = {Jisung Choi and Jungheum Park and Sangjin Lee}, title = {Forensic exploration on windows File History}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301134}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301134}, doi = {10.1016/J.FSIDI.2021.301134}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChoiPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChopadeP21, author = {Rupali M. Chopade and Vinod Keshaorao Pachghare}, title = {A data recovery technique for Redis using internal dictionary structure}, journal = {Digit. Investig.}, volume = {38}, pages = {301218}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301218}, doi = {10.1016/J.FSIDI.2021.301218}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChopadeP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DominguesAF21, author = {Patr{\'{\i}}cio Domingues and Lu{\'{\i}}s Miguel Andrade and Miguel Frade}, title = {Microsoft's Your Phone environment from a digital forensic perspective}, journal = {Digit. Investig.}, volume = {38}, pages = {301177}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301177}, doi = {10.1016/J.FSIDI.2021.301177}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DominguesAF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FaustTMF21, author = {Fabian Faust and Aur{\'{e}}lien Thierry and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Selective Imaging of File System Data on Live Systems}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301115}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301115}, doi = {10.1016/J.FSIDI.2021.301115}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FaustTMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FukamiSG21, author = {Aya Fukami and Radina Stoykova and Zeno J. M. H. Geradts}, title = {A new model for forensic data extraction from encrypted mobile devices}, journal = {Digit. Investig.}, volume = {38}, pages = {301169}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301169}, doi = {10.1016/J.FSIDI.2021.301169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FukamiSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GeXQZ21, author = {Song Ge and Ming Xu and Tong Qiao and Ning Zheng}, title = {A novel file carving algorithm for docker container logs recorded by json-file logging driver}, journal = {Digit. Investig.}, volume = {39}, pages = {301272}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301272}, doi = {10.1016/J.FSIDI.2021.301272}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GeXQZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GeradtsN21, author = {Zeno J. M. H. Geradts and Bruce J. Nikkel}, title = {Change and diversity}, journal = {Digit. Investig.}, volume = {37}, pages = {301206}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301206}, doi = {10.1016/J.FSIDI.2021.301206}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GeradtsN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GomezMGM21, author = {Juan Manuel Castelo G{\'{o}}mez and Javier Carrillo Mond{\'{e}}jar and Jos{\'{e}} Rold{\'{a}}n G{\'{o}}mez and Jos{\'{e}} Luis Mart{\'{\i}}nez Mart{\'{\i}}nez}, title = {Developing an IoT forensic methodology. {A} concept proposal}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301114}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301114}, doi = {10.1016/J.FSIDI.2021.301114}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GomezMGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Gozukara21, author = {Furkan G{\"{o}}z{\"{u}}kara}, title = {Challenges and possible severe legal consequences of application users identification from CNG-Logs}, journal = {Digit. Investig.}, volume = {39}, pages = {301312}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301312}, doi = {10.1016/J.FSIDI.2021.301312}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Gozukara21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrossBM21, author = {Tobias Gro{\ss} and Marcel Busch and Tilo M{\"{u}}ller}, title = {One key to rule them all: Recovering the master key from {RAM} to break Android's file-based encryption}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301113}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301113}, doi = {10.1016/J.FSIDI.2021.301113}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrossBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuarnieriFGCJ21, author = {Gabriele Guarnieri and Marco Fontani and Francesco Guzzi and Sergio Carrato and Martino Jerian}, title = {Perspective registration and multi-frame super-resolution of license plates in surveillance videos}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301087}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2020.301087}, doi = {10.1016/J.FSIDI.2020.301087}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GuarnieriFGCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HabibniaH21, author = {Babak Habibnia and Jan{-}Niclas Hilgert}, title = {Selected Papers and Extended Abstracts of the Eighth Annual {DFRWS} Europe Conference}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301148}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301148}, doi = {10.1016/J.FSIDI.2021.301148}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HabibniaH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HasanabadiLG21, author = {Saeed Shafiee Hasanabadi and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {A memory-based game-theoretic defensive approach for digital forensic investigators}, journal = {Digit. Investig.}, volume = {38}, pages = {301214}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301214}, doi = {10.1016/J.FSIDI.2021.301214}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HasanabadiLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HauTTNT21, author = {Nguyen Xuan Hau and Thai Son Tran and Le Van Thinh and Kim Duy Nguyen and Dinhtu Truong}, title = {Learning Spatio-temporal features to detect manipulated facial videos created by the Deepfake techniques}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301108}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301108}, doi = {10.1016/J.FSIDI.2021.301108}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HauTTNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSSN21, author = {Thibaut Heckmann and Thomas R. Souvignet and Damien Sauveron and David Naccache}, title = {Medical Equipment Used for Forensic Data Extraction: {A} low-cost solution for forensic laboratories not provided with expensive diagnostic or advanced repair equipment}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301092}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2020.301092}, doi = {10.1016/J.FSIDI.2020.301092}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HoltD21, author = {Thomas Holt and Diana S. Dolliver}, title = {Exploring digital evidence recognition among front-line law enforcement officers at fatal crash scenes}, journal = {Digit. Investig.}, volume = {37}, pages = {301167}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301167}, doi = {10.1016/J.FSIDI.2021.301167}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HoltD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman21, author = {Graeme Horsman}, title = {Contemporaneous notes for digital forensic examinations}, journal = {Digit. Investig.}, volume = {37}, pages = {301173}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301173}, doi = {10.1016/J.FSIDI.2021.301173}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman21a, author = {Graeme Horsman}, title = {Defining '\emph{service levels}' for digital forensic science organisations}, journal = {Digit. Investig.}, volume = {38}, pages = {301178}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301178}, doi = {10.1016/J.FSIDI.2021.301178}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman21b, author = {Graeme Horsman}, title = {Decision support for first responders and digital device prioritisation}, journal = {Digit. Investig.}, volume = {38}, pages = {301219}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301219}, doi = {10.1016/J.FSIDI.2021.301219}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanL21, author = {Graeme Horsman and James R. Lyle}, title = {Dataset construction challenges for digital forensics}, journal = {Digit. Investig.}, volume = {38}, pages = {301264}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301264}, doi = {10.1016/J.FSIDI.2021.301264}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HorsmanL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HranickyBRSSMM21, author = {Radek Hranick{\'{y}} and Frank Breitinger and Ondrej Rysav{\'{y}} and John Sheppard and Florin Schaedler and Holger Morgenstern and Simon Malik}, title = {What do incident response practitioners need to know? {A} skillmap for the years ahead}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301184}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301184}, doi = {10.1016/J.FSIDI.2021.301184}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HranickyBRSSMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HurPKPLK21, author = {Uk Hur and Myungseo Park and Giyoon Kim and Younjai Park and Insoo Lee and Jongsung Kim}, title = {Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 {(2019)} 200890]}, journal = {Digit. Investig.}, volume = {37}, pages = {301180}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301180}, doi = {10.1016/J.FSIDI.2021.301180}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HurPKPLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JarrettM21, author = {Matt Jarrett and Sarah Morris}, title = {Purple dawn: Dead disk forensics on Google's Fuchsia operating system}, journal = {Digit. Investig.}, volume = {39}, pages = {301269}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301269}, doi = {10.1016/J.FSIDI.2021.301269}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JarrettM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KangKPK21, author = {Soojin Kang and Giyoon Kim and Myungseo Park and Jongsung Kim}, title = {Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS}, journal = {Digit. Investig.}, volume = {39}, pages = {301310}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301310}, doi = {10.1016/J.FSIDI.2021.301310}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KangKPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KantaCCS21, author = {Aikaterini Kanta and Sein Coray and Iwen Coisel and Mark Scanlon}, title = {How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301186}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301186}, doi = {10.1016/J.FSIDI.2021.301186}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KantaCCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimKK21, author = {Hyunmin Kim and InSeok Kim and Kyounggon Kim}, title = {{AIBFT:} Artificial Intelligence Browser Forensic Toolkit}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301091}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2020.301091}, doi = {10.1016/J.FSIDI.2020.301091}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimKPPLK21, author = {Giyoon Kim and Soram Kim and Myungseo Park and Younjai Park and Insoo Lee and Jongsung Kim}, title = {Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data}, journal = {Digit. Investig.}, volume = {37}, pages = {301138}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301138}, doi = {10.1016/J.FSIDI.2021.301138}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimKPPLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimPK21, author = {Giyoon Kim and Myungseo Park and Jongsung Kim}, title = {A study on {LG} content lock and data acquisition from apps based on content lock function}, journal = {Digit. Investig.}, volume = {39}, pages = {301284}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301284}, doi = {10.1016/J.FSIDI.2021.301284}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KimPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KumarA21, author = {Ravin Kumar and Animesh Kumar Agrawal}, title = {Drone {GPS} data analysis for flight path reconstruction: {A} study on DJI, Parrot {\&} Yuneec make drones}, journal = {Digit. Investig.}, volume = {38}, pages = {301182}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301182}, doi = {10.1016/J.FSIDI.2021.301182}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KumarA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LanaganC21, author = {Sean Lanagan and Kim{-}Kwang Raymond Choo}, title = {On the need for {AI} to triage encrypted data containers in {U.S.} law enforcement applications}, journal = {Digit. Investig.}, volume = {38}, pages = {301217}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301217}, doi = {10.1016/J.FSIDI.2021.301217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LanaganC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeMD21, author = {Anh Duc Le and Justin P. L. McGuinness and Edward Dixon}, title = {ChunkedHCs algorithm for authorship verification problems: Reddit case study}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301185}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301185}, doi = {10.1016/J.FSIDI.2021.301185}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeMSLS21, author = {Quan Le and Luis Miralles{-}Pechu{\'{a}}n and Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis}, journal = {Digit. Investig.}, volume = {39}, pages = {301308}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301308}, doi = {10.1016/J.FSIDI.2021.301308}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LeMSLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MaggioCAR21, author = {Ryan D. Maggio and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Seance: Divination of tool-breaking changes in forensically important binaries}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301189}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301189}, doi = {10.1016/J.FSIDI.2021.301189}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MaggioCAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MahrCMGB21, author = {Andrew Mahr and Meghan Cichon and Sophia Mateo and Cinthya Grajeda and Ibrahim M. Baggili}, title = {Zooming into the pandemic! {A} forensic analysis of the Zoom Application}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301107}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301107}, doi = {10.1016/J.FSIDI.2021.301107}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MahrCMGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MannaCAR21, author = {Modhuparna Manna and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Modern macOS userland runtime analysis}, journal = {Digit. Investig.}, volume = {38}, pages = {301221}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301221}, doi = {10.1016/J.FSIDI.2021.301221}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MannaCAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ManralS21, author = {Bharat Manral and Gaurav Somani}, title = {Establishing forensics capabilities in the presence of superuser insider threats}, journal = {Digit. Investig.}, volume = {38}, pages = {301263}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301263}, doi = {10.1016/J.FSIDI.2021.301263}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ManralS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Mar-RaaveBMH21, author = {Joanna Rose Del Mar{-}Raave and Hayretdin Bahsi and Leo Mrsic and Kresimir Hausknecht}, title = {A machine learning-based forensic tool for image classification - {A} design science approach}, journal = {Digit. Investig.}, volume = {38}, pages = {301265}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301265}, doi = {10.1016/J.FSIDI.2021.301265}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Mar-RaaveBMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Marshall21, author = {Angus M. Marshall}, title = {Digital forensic tool verification: An evaluation of options for establishing trustworthiness}, journal = {Digit. Investig.}, volume = {38}, pages = {301181}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301181}, doi = {10.1016/J.FSIDI.2021.301181}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Marshall21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Martin-PerezRB21, author = {Miguel Mart{\'{\i}}n{-}P{\'{e}}rez and Ricardo J. Rodr{\'{\i}}guez and Frank Breitinger}, title = {Bringing order to approximate matching: Classification and attacks on similarity digest algorithms}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301120}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301120}, doi = {10.1016/J.FSIDI.2021.301120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Martin-PerezRB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MatthewsLS21, author = {Richard Matthews and Kieren Lovell and Matthew Sorell}, title = {Ghost protocol - Snapchat as a method of surveillance}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301112}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301112}, doi = {10.1016/J.FSIDI.2021.301112}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MatthewsLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MaybirC21, author = {James Maybir and Brendan Chapman}, title = {Web scraping of ecstasy user reports as a novel tool for detecting drug market trends}, journal = {Digit. Investig.}, volume = {37}, pages = {301172}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301172}, doi = {10.1016/J.FSIDI.2021.301172}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MaybirC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MazzoliniMPV21, author = {Daniela Mazzolini and Paolo Mignone and Patrizia Pavan and Gennaro Vessio}, title = {An easy-to-explain decision support framework for forensic analysis of dynamic signatures}, journal = {Digit. Investig.}, volume = {38}, pages = {301216}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301216}, doi = {10.1016/J.FSIDI.2021.301216}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MazzoliniMPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McCulloughAOB21, author = {Syria McCullough and Stella Abudu and Ebere Onwubuariri and Ibrahim M. Baggili}, title = {Another brick in the wall: An exploratory analysis of digital forensics programs in the United States}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301187}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301187}, doi = {10.1016/J.FSIDI.2021.301187}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/McCulloughAOB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NaikJSYBI21, author = {Nitin Naik and Paul Jenkins and Nick Savage and Longzhi Yang and Tossapon Boongoen and Natthakan Iam{-}On}, title = {Fuzzy-import hashing: {A} static analysis technique for malware detection}, journal = {Digit. Investig.}, volume = {37}, pages = {301139}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301139}, doi = {10.1016/J.FSIDI.2021.301139}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NaikJSYBI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NegraoD21, author = {Miguel Negr{\~{a}}o and Patr{\'{\i}}cio Domingues}, title = {SpeechToText: An open-source software for automatic detection and transcription of voice recordings in digital forensics}, journal = {Digit. Investig.}, volume = {38}, pages = {301223}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301223}, doi = {10.1016/J.FSIDI.2021.301223}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NegraoD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NeshenkoBF21, author = {Nataliia Neshenko and Elias Bou{-}Harb and Borko Furht}, title = {A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301198}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301198}, doi = {10.1016/J.FSIDI.2021.301198}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NeshenkoBF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NgejaneESM21, author = {Cynthia H. Ngejane and Jan H. P. Eloff and Tshephisho J. Sefara and Vukosi Ntsakisi Marivate}, title = {Digital forensics supported by machine learning for the detection of online sexual predatory chats}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301109}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301109}, doi = {10.1016/J.FSIDI.2021.301109}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NgejaneESM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NikkelG21, author = {Bruce J. Nikkel and Zeno J. M. H. Geradts}, title = {Journal roles and responsibilities: Simplification and optimization}, journal = {Digit. Investig.}, volume = {38}, pages = {301282}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301282}, doi = {10.1016/J.FSIDI.2021.301282}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NikkelG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NishshankaSAWP21, author = {Bandula Nishshanka and Chris Shepherd and Randika Ariyarathna and Lalindu Weerakkody and Jayanga Palihena}, title = {An android-based field investigation tool to estimate the potential trajectories of perforated {AK} bullets in 1 mm sheet metal surfaces}, journal = {Digit. Investig.}, volume = {38}, pages = {301267}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301267}, doi = {10.1016/J.FSIDI.2021.301267}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NishshankaSAWP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NordvikSFAT21, author = {Rune Nordvik and Radina Stoykova and Katrin Franke and Stefan Axelsson and Fergus Toolan}, title = {Reliability validation for file system interpretation}, journal = {Digit. Investig.}, volume = {37}, pages = {301174}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301174}, doi = {10.1016/J.FSIDI.2021.301174}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NordvikSFAT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OShaughnessyB21, author = {Stephen O'Shaughnessy and Frank Breitinger}, title = {Malware family classification via efficient Huffman features}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301192}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301192}, doi = {10.1016/J.FSIDI.2021.301192}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OShaughnessyB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OhLH21, author = {Junghoon Oh and Sangjin Lee and Hyunuk Hwang}, title = {{NTFS} Data Tracker: Tracking file data history based on {\textdollar}LogFile}, journal = {Digit. Investig.}, volume = {39}, pages = {301309}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301309}, doi = {10.1016/J.FSIDI.2021.301309}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OhLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PantaleonSHJB21, author = {Lutta Pantaleon and Mohamed H. Sedky and Mohamed Hassan and Uchitha Jayawickrama and Benhur Bakhtiari Bastaki}, title = {The complexity of internet of things forensics: {A} state-of-the-art review}, journal = {Digit. Investig.}, volume = {38}, pages = {301210}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301210}, doi = {10.1016/J.FSIDI.2021.301210}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PantaleonSHJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkKPLK21, author = {Myungseo Park and Giyoon Kim and Younjai Park and Insoo Lee and Jongsung Kim}, title = {Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 {(2019)} 200890]}, journal = {Digit. Investig.}, volume = {39}, pages = {301179}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301179}, doi = {10.1016/J.FSIDI.2021.301179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkKPLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkLLBNJL21, author = {Nam In Park and Ji Woo Lee and Seong Ho Lim and Jun Seok Byun and Gi{-}Hyun Na and Oc{-}Yeub Jeon and Jung Hwan Lee}, title = {Energy-based linear {PCM} audio recovery method of impaired {MP4} file stored in dashboard camera memory}, journal = {Digit. Investig.}, volume = {39}, pages = {301274}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301274}, doi = {10.1016/J.FSIDI.2021.301274}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ParkLLBNJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PorterNTA21, author = {Kyle Porter and Rune Nordvik and Fergus Toolan and Stefan Axelsson}, title = {Timestamp prefix carving for filesystem metadata extraction}, journal = {Digit. Investig.}, volume = {38}, pages = {301266}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301266}, doi = {10.1016/J.FSIDI.2021.301266}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PorterNTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RaisALA21, author = {Muhammad Haris Rais and Rima Asmar Awad and Juan Lopez Jr. and Irfan Ahmed}, title = {JTAG-based {PLC} memory acquisition framework for industrial control systems}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301196}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301196}, doi = {10.1016/J.FSIDI.2021.301196}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RaisALA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RakKF21, author = {Roman Rak and Dagmar Kopencova and Miroslav Felcan}, title = {Digital vehicle identity - Digital {VIN} in forensic and technical practice}, journal = {Digit. Investig.}, volume = {39}, pages = {301307}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301307}, doi = {10.1016/J.FSIDI.2021.301307}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RakKF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RathoreSSS21, author = {Hemant Rathore and Adithya Samavedhi and Sanjay K. Sahay and Mohit Sewak}, title = {Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301183}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301183}, doi = {10.1016/J.FSIDI.2021.301183}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RathoreSSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RouhiBM21, author = {Rahimeh Rouhi and Flavio Bertini and Danilo Montesi}, title = {User profiles' image clustering for digital investigations}, journal = {Digit. Investig.}, volume = {38}, pages = {301171}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301171}, doi = {10.1016/J.FSIDI.2021.301171}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RouhiBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandvikFAA21, author = {Jens{-}Petter Sandvik and Katrin Franke and Habtamu Abie and Andr{\'{e}} {\AA}rnes}, title = {Coffee forensics - Reconstructing data in IoT devices running Contiki {OS}}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301188}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301188}, doi = {10.1016/J.FSIDI.2021.301188}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandvikFAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchipperSL21, author = {Guido Cornelis Schipper and Rudy Seelt and Nhien{-}An Le{-}Khac}, title = {Forensic analysis of Matrix protocol and Riot.im application}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301118}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301118}, doi = {10.1016/J.FSIDI.2021.301118}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchipperSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SerhalL21, author = {Cezar Serhal and Nhien{-}An Le{-}Khac}, title = {Machine learning based approach to analyze file meta data for smart phone file triage}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301194}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301194}, doi = {10.1016/J.FSIDI.2021.301194}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SerhalL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SesterHSL21, author = {Joachim Sester and Darren R. Hayes and Mark Scanlon and Nhien{-}An Le{-}Khac}, title = {A comparative study of support vector machine and neural networks for file type identification using n-gram analysis}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301121}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301121}, doi = {10.1016/J.FSIDI.2021.301121}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SesterHSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SharmaKK21, author = {Shweta Sharma and C. Rama Krishna and Rakesh Kumar}, title = {RansomDroid: Forensic analysis and detection of Android Ransomware using unsupervised machine learning technique}, journal = {Digit. Investig.}, volume = {37}, pages = {301168}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301168}, doi = {10.1016/J.FSIDI.2021.301168}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SharmaKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SihagVS21, author = {Vikas Sihag and Manu Vardhan and Pradeep Singh}, title = {{BLADE:} Robust malware detection against obfuscation in android}, journal = {Digit. Investig.}, volume = {38}, pages = {301176}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301176}, doi = {10.1016/J.FSIDI.2021.301176}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SihagVS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SilvaVSBACCSLJ21, author = {Iaslan Silva and Jo{\~{a}}o Marcos do Valle and Gabriel Souza and Jaine Budke and Daniel Ara{\'{u}}jo and Bruno Carvalho and N{\'{e}}lio Cacho and Henrique Sales and Frederico Lopes and Rivaldo Silva Junior}, title = {Using micro-services and artificial intelligence to analyze images in criminal evidences}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301197}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301197}, doi = {10.1016/J.FSIDI.2021.301197}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SilvaVSBACCSLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sparling21, author = {Aaron Sparling}, title = {Twenty first Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301262}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301262}, doi = {10.1016/J.FSIDI.2021.301262}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Sparling21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SteinebachZB21, author = {Martin Steinebach and Sascha Zenglein and Katharina Brandl}, title = {Phishing detection on tor hidden services}, journal = {Digit. Investig.}, volume = {36 Supplement}, pages = {301117}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301117}, doi = {10.1016/J.FSIDI.2021.301117}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SteinebachZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SundeD21, author = {Nina Sunde and Itiel E. Dror}, title = {A hierarchy of expert performance {(HEP)} applied to digital forensics: Reliability and biasability in digital forensics decision making}, journal = {Digit. Investig.}, volume = {37}, pages = {301175}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301175}, doi = {10.1016/J.FSIDI.2021.301175}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SundeD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SundeH21, author = {Nina Sunde and Graeme Horsman}, title = {Part 2: The Phase-oriented Advice and Review Structure {(PARS)} for digital forensic investigations}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301074}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2020.301074}, doi = {10.1016/J.FSIDI.2020.301074}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SundeH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TartBPEWMH21, author = {Matthew Tart and Iain Brodie and Nicholas Patrick{-}Gleed and Brian Edwards and Kevin Weeks and Robert Moore and Richard Haseler}, title = {Cell site analysis; use and reliability of survey methods}, journal = {Digit. Investig.}, volume = {38}, pages = {301222}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301222}, doi = {10.1016/J.FSIDI.2021.301222}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TartBPEWMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasPNB21, author = {Tyler Thomas and Mathew Piscitelli and Bhavik Ashok Nahar and Ibrahim M. Baggili}, title = {Duck Hunt: Memory forensics of {USB} attack platforms}, journal = {Digit. Investig.}, volume = {37 Supplement}, pages = {301190}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301190}, doi = {10.1016/J.FSIDI.2021.301190}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThomasPNB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ToffaliniOGZB21, author = {Flavio Toffalini and Andrea Oliveri and Mariano Graziano and Jianying Zhou and Davide Balzarotti}, title = {The evidence beyond the wall: Memory forensics in {SGX} environments}, journal = {Digit. Investig.}, volume = {39}, pages = {301313}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301313}, doi = {10.1016/J.FSIDI.2021.301313}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ToffaliniOGZB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TsuchiyaH21, author = {Yoichi Tsuchiya and Naoki Hiramoto}, title = {Dark web in the dark: Investigating when transactions take place on cryptomarkets}, journal = {Digit. Investig.}, volume = {36}, number = {Supplement}, pages = {301093}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2020.301093}, doi = {10.1016/J.FSIDI.2020.301093}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TsuchiyaH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/UmHL21, author = {Minji Um and Jaehyeok Han and Sangjin Lee}, title = {File fingerprinting of the {ZIP} format for identifying and tracking provenance}, journal = {Digit. Investig.}, volume = {39}, pages = {301271}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301271}, doi = {10.1016/J.FSIDI.2021.301271}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/UmHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YehudaSGTZ21, author = {Raz Ben Yehuda and Erez Shlingbaum and Yuval Gershfeld and Shaked Tayouri and Nezer Jacob Zaidenberg}, title = {Hypervisor memory acquisition for {ARM}}, journal = {Digit. Investig.}, volume = {37}, pages = {301106}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2020.301106}, doi = {10.1016/J.FSIDI.2020.301106}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/YehudaSGTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZandwijkB21, author = {Jan Peter van Zandwijk and Abdul Boztas}, title = {The phone reveals your motion: Digital traces of walking, driving and other movements on iPhones}, journal = {Digit. Investig.}, volume = {37}, pages = {301170}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301170}, doi = {10.1016/J.FSIDI.2021.301170}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZandwijkB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZenoB21, author = {Zeno and Bruce}, title = {Deep learning, bias and turnaround time}, journal = {Digit. Investig.}, volume = {39}, pages = {301318}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301318}, doi = {10.1016/J.FSIDI.2021.301318}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZenoB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhangBLO21, author = {Xiaolu Zhang and Frank Breitinger and Engelbert Luechinger and Stephen O'Shaughnessy}, title = {Android application forensics: {A} survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations}, journal = {Digit. Investig.}, volume = {39}, pages = {301285}, year = {2021}, url = {https://doi.org/10.1016/j.fsidi.2021.301285}, doi = {10.1016/J.FSIDI.2021.301285}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZhangBLO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndaLS20, author = {Felix Anda and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {DeepUAge: Improving Underage Age Estimation Accuracy to Aid {CSEM} Investigation}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300921}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300921}, doi = {10.1016/J.FSIDI.2020.300921}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndaLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeekBBESU20, author = {Harm M. A. van Beek and Jeroen van den Bos and Abdul Boztas and E. J. van Eijk and R. Schramp and M. Ugen}, title = {Digital forensics as a service: Stepping up the game}, journal = {Digit. Investig.}, volume = {35}, pages = {301021}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301021}, doi = {10.1016/J.FSIDI.2020.301021}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BeekBBESU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bernacki20, author = {Jaroslaw Bernacki}, title = {A survey on digital camera identification methods}, journal = {Digit. Investig.}, volume = {34}, pages = {300983}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300983}, doi = {10.1016/J.FSIDI.2020.300983}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Bernacki20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Billard20, author = {David Billard}, title = {Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300911}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300911}, doi = {10.1016/J.FSIDI.2020.300911}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Billard20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BolleCJ20, author = {Timothy Boll{\'{e}} and Eoghan Casey and Ma{\"{e}}lig Jacquet}, title = {The role of evaluations in reaching decisions using automated systems supporting forensic analysis}, journal = {Digit. Investig.}, volume = {34}, pages = {301016}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301016}, doi = {10.1016/J.FSIDI.2020.301016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BolleCJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BurriCBJ20, author = {Xavier Burri and Eoghan Casey and Timothy Boll{\'{e}} and David{-}Olivier Jaquet{-}Chiffelle}, title = {Chronological independently verifiable electronic chain of custody ledger using blockchain technology}, journal = {Digit. Investig.}, volume = {33}, pages = {300976}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300976}, doi = {10.1016/J.FSIDI.2020.300976}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BurriCBJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMMR20, author = {Andrew Case and Ryan D. Maggio and Modhuparna Manna and Golden G. Richard III}, title = {Memory Analysis of macOS Page Queues}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301004}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301004}, doi = {10.1016/J.FSIDI.2020.301004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey20, author = {Eoghan Casey}, title = {Standardization of forming and expressing preliminary evaluative opinions on digital evidence}, journal = {Digit. Investig.}, volume = {32}, pages = {200888}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200888}, doi = {10.1016/J.FSIDI.2019.200888}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey20a, author = {Eoghan Casey}, title = {Editorial - Crisis or opportunity?}, journal = {Digit. Investig.}, volume = {32}, pages = {300961}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300961}, doi = {10.1016/J.FSIDI.2020.300961}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey20b, author = {Eoghan Casey}, title = {Strengthening trust: Integration of digital investigation and forensic science}, journal = {Digit. Investig.}, volume = {33}, pages = {301000}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301000}, doi = {10.1016/J.FSIDI.2020.301000}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey20c, author = {Eoghan Casey}, title = {Editorial: The epic story of scientific interpretation in digital investigations}, journal = {Digit. Investig.}, volume = {34}, pages = {301063}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301063}, doi = {10.1016/J.FSIDI.2020.301063}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey20d, author = {Eoghan Casey}, title = {Editorial - Delivering digital forensic science as a service}, journal = {Digit. Investig.}, volume = {35}, pages = {301095}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301095}, doi = {10.1016/J.FSIDI.2020.301095}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey20d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyJSRS20, author = {Eoghan Casey and David{-}Olivier Jaquet{-}Chiffelle and Hannes Spichiger and El{\'{e}}nore Ryser and Thomas R. Souvignet}, title = {Structuring the Evaluation of Location-Related Mobile Device Evidence}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300928}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300928}, doi = {10.1016/J.FSIDI.2020.300928}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyJSRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChenZHYL20, author = {Shijie Chen and Chengqiang Zhao and Lingling Huang and Jing Yuan and Mingzhe Liu}, title = {Study and implementation on the application of blockchain in electronic evidence generation}, journal = {Digit. Investig.}, volume = {35}, pages = {301001}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301001}, doi = {10.1016/J.FSIDI.2020.301001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChenZHYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CunhaSLR20, author = {Daniel de Oliveira Cunha and Edmar A. Silva and Jorge Albuquerque Lambert and Rafael O. Ribeiro}, title = {Peritus Framework: Towards multimedia evidence analysis uniformization in brazilian distributed forensic model}, journal = {Digit. Investig.}, volume = {35}, pages = {301089}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301089}, doi = {10.1016/J.FSIDI.2020.301089}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CunhaSLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DaviesMB20, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Evaluation of live forensic techniques in ransomware attack mitigation}, journal = {Digit. Investig.}, volume = {33}, pages = {300979}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300979}, doi = {10.1016/J.FSIDI.2020.300979}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DaviesMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DolosMAS20, author = {Klara Dolos and Conrad Meyer and Andreas Attenberger and Jessica Steinberger}, title = {Driver identification using in-vehicle digital data in the forensic context of a hit and run accident}, journal = {Digit. Investig.}, volume = {35}, pages = {301090}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301090}, doi = {10.1016/J.FSIDI.2020.301090}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DolosMAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DoraiAPP20, author = {Gokila Dorai and Sudhir Aggarwal and Neet Patel and Charisa Powell}, title = {{VIDE} - Vault App Identification and Extraction System for iOS Devices}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301007}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301007}, doi = {10.1016/J.FSIDI.2020.301007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DoraiAPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DysonBB20, author = {Simon Dyson and William J. Buchanan and Liam Bell}, title = {Scenario-based creation and digital investigation of ethereum {ERC20} tokens}, journal = {Digit. Investig.}, volume = {32}, pages = {200894}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200894}, doi = {10.1016/J.FSIDI.2019.200894}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DysonBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FangZHL20, author = {Yong Fang and Cuirong Zhao and Cheng Huang and Liang Liu}, title = {SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods}, journal = {Digit. Investig.}, volume = {35}, pages = {300981}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300981}, doi = {10.1016/J.FSIDI.2020.300981}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FangZHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FranqueiraH20, author = {Virginia N. L. Franqueira and Graeme Horsman}, title = {Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300923}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300923}, doi = {10.1016/J.FSIDI.2020.300923}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FranqueiraH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FrowisGHRP20, author = {Michael Fr{\"{o}}wis and Thilo Gottschalk and Bernhard Haslhofer and Christian R{\"{u}}ckert and Paulina Pesch}, title = {Safeguarding the evidential value of forensic cryptocurrency investigations}, journal = {Digit. Investig.}, volume = {33}, pages = {200902}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200902}, doi = {10.1016/J.FSIDI.2019.200902}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FrowisGHRP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GalbraithSS20, author = {Christopher Galbraith and Padhraic Smyth and Hal S. Stern}, title = {Statistical Methods for the Forensic Analysis of Geolocated Event Data}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301009}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301009}, doi = {10.1016/J.FSIDI.2020.301009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GalbraithSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HarshanyBBG20, author = {Edward Harshany and Ryan Benton and David Bourrie and William Bradley Glisson}, title = {Big Data Forensics: Hadoop 3.2.0 Reconstruction}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300909}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300909}, doi = {10.1016/J.FSIDI.2020.300909}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HarshanyBBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HasanabadiLG20, author = {Saeed Shafiee Hasanabadi and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {A game-theoretic defensive approach for forensic investigators against rootkits}, journal = {Digit. Investig.}, volume = {33}, pages = {200909}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.200909}, doi = {10.1016/J.FSIDI.2020.200909}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HasanabadiLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HasanabadiLG20a, author = {Saeed Shafiee Hasanabadi and Arash Habibi Lashkari and Ali A. Ghorbani}, title = {A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour}, journal = {Digit. Investig.}, volume = {35}, pages = {301024}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301024}, doi = {10.1016/J.FSIDI.2020.301024}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HasanabadiLG20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HassenfeldtJB20, author = {Courtney Hassenfeldt and Jillian Jacques and Ibrahim M. Baggili}, title = {Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging {\&} Tagging of Digital Devices in Immersive Virtual Reality}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301011}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301011}, doi = {10.1016/J.FSIDI.2020.301011}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HassenfeldtJB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HirabayashiKYIH20, author = {Manato Hirabayashi and Kenji Kurosawa and Ryo Yokota and Daisuke Imoto and Yoshinori Hawai and Norimitsu Akiba and Ken'ichi Tsuchiya and Hidetoshi Kakuda and Kosuke Tanabe and Masakatsu Honma}, title = {Flying object detection system using an omnidirectional camera}, journal = {Digit. Investig.}, volume = {35}, pages = {301027}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301027}, doi = {10.1016/J.FSIDI.2020.301027}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HirabayashiKYIH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HiramotoT20, author = {Naoki Hiramoto and Yoichi Tsuchiya}, title = {Measuring dark web marketplaces via Bitcoin transactions: From birth to independence}, journal = {Digit. Investig.}, volume = {35}, pages = {301086}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301086}, doi = {10.1016/J.FSIDI.2020.301086}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HiramotoT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HoKCLL20, author = {Shuyuan Mary Ho and Da{-}Yu Kao and Ming{-}Jung Chiu{-}Huang and Wenyi Li and Chung{-}Jui Lai}, title = {Detecting Cyberbullying "Hotspots" on Twitter: {A} Predictive Analytics Approach}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300906}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300906}, doi = {10.1016/J.FSIDI.2020.300906}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HoKCLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman20, author = {Graeme Horsman}, title = {Digital Evidence Certainty Descriptors (DECDs)}, journal = {Digit. Investig.}, volume = {32}, pages = {200896}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200896}, doi = {10.1016/J.FSIDI.2019.200896}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman20a, author = {Graeme Horsman}, title = {Opinion: Does the field of digital forensics have a consistency problem?}, journal = {Digit. Investig.}, volume = {33}, pages = {300970}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300970}, doi = {10.1016/J.FSIDI.2020.300970}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman20b, author = {Graeme Horsman}, title = {The challenge of identifying historic 'private browsing' sessions on suspect devices}, journal = {Digit. Investig.}, volume = {34}, pages = {300980}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300980}, doi = {10.1016/J.FSIDI.2020.300980}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanS20, author = {Graeme Horsman and Nina Sunde}, title = {Part 1: The need for peer review in digital forensics}, journal = {Digit. Investig.}, volume = {35}, pages = {301062}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301062}, doi = {10.1016/J.FSIDI.2020.301062}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HorsmanS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Jaquet-Chiffelle20, author = {David{-}Olivier Jaquet{-}Chiffelle and Eoghan Casey and Jonathan Bourquenoud}, title = {Tamperproof timestamped provenance ledger using blockchain technology}, journal = {Digit. Investig.}, volume = {33}, pages = {300977}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300977}, doi = {10.1016/J.FSIDI.2020.300977}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Jaquet-Chiffelle20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JeghamKAM20, author = {Imen Jegham and Anouar Ben Khalifa and Ihsen Alouani and Mohamed Ali Mahjoub}, title = {Vision-based human action recognition: An overview and real world challenges}, journal = {Digit. Investig.}, volume = {32}, pages = {200901}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200901}, doi = {10.1016/J.FSIDI.2019.200901}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JeghamKAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KantaCS20, author = {Aikaterini Kanta and Iwen Coisel and Mark Scanlon}, title = {A survey exploring open source Intelligence for smarter password cracking}, journal = {Digit. Investig.}, volume = {35}, pages = {301075}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301075}, doi = {10.1016/J.FSIDI.2020.301075}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KantaCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarafiliWL20, author = {Erisa Karafili and Linna Wang and Emil C. Lupu}, title = {An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300925}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300925}, doi = {10.1016/J.FSIDI.2020.300925}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarafiliWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarresandDA20, author = {Martin Karresand and Geir Olav Dyrkolbotn and Stefan Axelsson}, title = {An Empirical Study of the {NTFS} Cluster Allocation Behavior Over Time}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301008}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301008}, doi = {10.1016/J.FSIDI.2020.301008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarresandDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimL20, author = {Dohyun Kim and Sangjin Lee}, title = {Study of identifying and managing the potential evidence for effective Android forensics}, journal = {Digit. Investig.}, volume = {33}, pages = {200897}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200897}, doi = {10.1016/J.FSIDI.2019.200897}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimPLPLK20, author = {Giyoon Kim and Myungseo Park and Sehoon Lee and Younjai Park and Insoo Lee and Jongsung Kim}, title = {A study on the decryption methods of telegram {X} and BBM-Enterprise databases in mobile and {PC}}, journal = {Digit. Investig.}, volume = {35}, pages = {300998}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300998}, doi = {10.1016/J.FSIDI.2020.300998}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KimPLPLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KoerhuisKL20, author = {Wiebe Koerhuis and M. Tahar Kechadi and Nhien{-}An Le{-}Khac}, title = {Forensic analysis of privacy-oriented cryptocurrencies}, journal = {Digit. Investig.}, volume = {33}, pages = {200891}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200891}, doi = {10.1016/J.FSIDI.2019.200891}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KoerhuisKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lallie20, author = {Harjinder Singh Lallie}, title = {Dashcam forensics: {A} preliminary analysis of 7 dashcam devices}, journal = {Digit. Investig.}, volume = {33}, pages = {200910}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.200910}, doi = {10.1016/J.FSIDI.2020.200910}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Lallie20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LatzoBF20, author = {Tobias Latzo and Julian Brost and Felix C. Freiling}, title = {BMCLeech: Introducing Stealthy Memory Forensics to {BMC}}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300919}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300919}, doi = {10.1016/J.FSIDI.2020.300919}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LatzoBF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeEVF20, author = {Hee{-}Eun Lee and Tatiana Ermakova and Vasilis Ververis and Benjamin Fabian}, title = {Detecting child sexual abuse material: {A} comprehensive survey}, journal = {Digit. Investig.}, volume = {34}, pages = {301022}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301022}, doi = {10.1016/J.FSIDI.2020.301022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeeEVF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LusettiSD20, author = {Monia Lusetti and Luca Salsi and Andrea Dallatana}, title = {A blockchain based solution for the custody of digital files in forensic medicine}, journal = {Digit. Investig.}, volume = {35}, pages = {301017}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301017}, doi = {10.1016/J.FSIDI.2020.301017}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LusettiSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MatthewsFS20, author = {Richard Matthews and Nick Falkner and Matthew Sorell}, title = {Reverse engineering the Raspberry Pi Camera {V2:} {A} study of pixel non-uniformity using a scanning electron microscope}, journal = {Digit. Investig.}, volume = {32}, pages = {200900}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200900}, doi = {10.1016/J.FSIDI.2019.200900}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MatthewsFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MothiJW20, author = {Dinesh Mothi and Helge Janicke and Isabel Wagner}, title = {A novel principle to validate digital forensic models}, journal = {Digit. Investig.}, volume = {33}, pages = {200904}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.200904}, doi = {10.1016/J.FSIDI.2020.200904}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MothiJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MullanRF20, author = {Patrick Mullan and Christian Riess and Felix C. Freiling}, title = {Towards Open-Set Forensic Source Grouping on {JPEG} Header Information}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300916}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300916}, doi = {10.1016/J.FSIDI.2020.300916}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MullanRF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nelson20a, author = {Alex Nelson}, title = {Twentieth Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301028}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301028}, doi = {10.1016/J.FSIDI.2020.301028}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Nelson20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nikkel20, author = {Bruce J. Nikkel}, title = {Fintech forensics: Criminal investigation and digital evidence in financial technologies}, journal = {Digit. Investig.}, volume = {33}, pages = {200908}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.200908}, doi = {10.1016/J.FSIDI.2020.200908}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Nikkel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NordvikPTAF20, author = {Rune Nordvik and Kyle Porter and Fergus Toolan and Stefan Axelsson and Katrin Franke}, title = {Generic Metadata Time Carving}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301005}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301005}, doi = {10.1016/J.FSIDI.2020.301005}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NordvikPTAF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OdogwuGH20, author = {Kingson Chinedu Odogwu and Pavel Gladyshev and Babak Habibnia}, title = {{PNG} Data Detector for {DECA}}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300910}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300910}, doi = {10.1016/J.FSIDI.2020.300910}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OdogwuGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OliveiraJrZN20, author = {Edson OliveiraJr and Avelino F. Zorzo and Charles Varlei Neu}, title = {Towards a conceptual model for promoting digital forensics experiments}, journal = {Digit. Investig.}, volume = {35}, pages = {301014}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301014}, doi = {10.1016/J.FSIDI.2020.301014}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OliveiraJrZN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PalmbachB20, author = {David Palmbach and Frank Breitinger}, title = {Artifacts for Detecting Timestamp Manipulation in {NTFS} on Windows and Their Reliability}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300920}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300920}, doi = {10.1016/J.FSIDI.2020.300920}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PalmbachB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PalutkeBRS20, author = {Ralph Palutke and Frank Block and Patrick Reichenberger and Dominik Stripeika}, title = {Hiding Process Memory Via Anti-Forensic Techniques}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301012}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301012}, doi = {10.1016/J.FSIDI.2020.301012}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PalutkeBRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkYK20, author = {Myungseo Park and Okyeon Yi and Jongsung Kim}, title = {A methodology for the decryption of encrypted smartphone backup data on android platform: {A} case study on the latest samsung smartphone backup system}, journal = {Digit. Investig.}, volume = {35}, pages = {301026}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301026}, doi = {10.1016/J.FSIDI.2020.301026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkYK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PetroniGIRM20, author = {Benedito Cristiano Aparecido Petroni and Rodrigo Franco Gon{\c{c}}alves and Paulo S{\'{e}}rgio de Arruda Ign{\'{a}}cio and Jacqueline Zonichenn Reis and Geraldo Jose Dolce Uzum Martins}, title = {Smart contracts applied to a functional architecture for storage and maintenance of digital chain of custody using blockchain}, journal = {Digit. Investig.}, volume = {34}, pages = {300985}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300985}, doi = {10.1016/J.FSIDI.2020.300985}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PetroniGIRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PluskalBR20, author = {Jan Pluskal and Frank Breitinger and Ondrej Rysav{\'{y}}}, title = {Netfox detective: {A} novel open-source network forensics analysis tool}, journal = {Digit. Investig.}, volume = {35}, pages = {301019}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301019}, doi = {10.1016/J.FSIDI.2020.301019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PluskalBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PradeGD20, author = {Paul Prade and Tobias Gro{\ss} and Andreas Dewald}, title = {Forensic Analysis of the Resilient File System (ReFS) Version 3.4}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300915}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300915}, doi = {10.1016/J.FSIDI.2020.300915}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PradeGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/QasimSA20, author = {Syed Ali Qasim and Jared M. Smith and Irfan Ahmed}, title = {Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301013}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301013}, doi = {10.1016/J.FSIDI.2020.301013}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/QasimSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/QuanWYZP20, author = {Weize Quan and Kai Wang and Dong{-}Ming Yan and Xiaopeng Zhang and Denis Pellerin}, title = {Learn with diversity and from harder samples: Improving the generalization of CNN-Based detection of computer-generated images}, journal = {Digit. Investig.}, volume = {35}, pages = {301023}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301023}, doi = {10.1016/J.FSIDI.2020.301023}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/QuanWYZP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RahmanT20, author = {Rizwan Ur Rahman and Deepak Singh Tomar}, title = {A new web forensic framework for bot crime investigation}, journal = {Digit. Investig.}, volume = {33}, pages = {300943}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300943}, doi = {10.1016/J.FSIDI.2020.300943}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RahmanT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RibauxS20, author = {Olivier Ribaux and Thomas R. Souvignet}, title = {"Hello are you available?" Dealing with online frauds and the role of forensic science}, journal = {Digit. Investig.}, volume = {33}, pages = {300978}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300978}, doi = {10.1016/J.FSIDI.2020.300978}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RibauxS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RyserSC20, author = {El{\'{e}}nore Ryser and Hannes Spichiger and Eoghan Casey}, title = {Structured decision making in investigations involving digital and multimedia evidence}, journal = {Digit. Investig.}, volume = {34}, pages = {301015}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301015}, doi = {10.1016/J.FSIDI.2020.301015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RyserSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SaleemSNBI20, author = {Sajid Saleem and Fazli Subhan and Noman Naseer and Abdul Bais and Ammara Imtiaz}, title = {Forensic speaker recognition: {A} new method based on extracting accent and language information from short utterances}, journal = {Digit. Investig.}, volume = {34}, pages = {300982}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300982}, doi = {10.1016/J.FSIDI.2020.300982}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SaleemSNBI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SampaioN20, author = {Jose F. P. Sampaio and Francisco Assis de Oliveira Nascimento}, title = {Detection of {AMR} double compression using compressed-domain speech features}, journal = {Digit. Investig.}, volume = {33}, pages = {200907}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.200907}, doi = {10.1016/J.FSIDI.2020.200907}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SampaioN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SayakkaraLS20, author = {Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {EMvidence: {A} Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300907}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300907}, doi = {10.1016/J.FSIDI.2020.300907}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SayakkaraLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SayakkaraLS20a, author = {Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301003}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301003}, doi = {10.1016/J.FSIDI.2020.301003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SayakkaraLS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SayakkaraMLS20, author = {Asanka P. Sayakkara and Luis Miralles{-}Pechu{\'{a}}n and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300927}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300927}, doi = {10.1016/J.FSIDI.2020.300927}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SayakkaraMLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderDMF20, author = {Janine Schneider and Hans{-}Peter Deifel and Stefan Milius and Felix C. Freiling}, title = {Unifying Metadata-Based Storage Reconstruction and Carving with {LAYR}}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301006}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301006}, doi = {10.1016/J.FSIDI.2020.301006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderDMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderWF20, author = {Janine Schneider and Julian Wolf and Felix C. Freiling}, title = {Tampering with Digital Evidence is Hard: The Case of Main Memory Images}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300924}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300924}, doi = {10.1016/J.FSIDI.2020.300924}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SeyyarG20, author = {M. Bas Seyyar and Zeno J. M. H. Geradts}, title = {Privacy impact assessment in large-scale digital forensic investigations}, journal = {Digit. Investig.}, volume = {33}, pages = {200906}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.200906}, doi = {10.1016/J.FSIDI.2020.200906}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SeyyarG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinKKYJS20, author = {Yeonghun Shin and Hyungchan Kim and Sungbum Kim and Dongkyun Yoo and Wooyeon Jo and Taeshik Shon}, title = {Certificate Injection-Based Encrypted Traffic Forensics in {AI} Speaker Ecosystem}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301010}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301010}, doi = {10.1016/J.FSIDI.2020.301010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinKKYJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sikos20, author = {Leslie F. Sikos}, title = {Packet analysis for network forensics: {A} comprehensive survey}, journal = {Digit. Investig.}, volume = {32}, pages = {200892}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200892}, doi = {10.1016/J.FSIDI.2019.200892}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sikos20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SinghS20, author = {Gurinder Singh and Kulbir Singh}, title = {Digital image forensic approach based on the second-order statistical analysis of {CFA} artifacts}, journal = {Digit. Investig.}, volume = {32}, pages = {200899}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200899}, doi = {10.1016/J.FSIDI.2019.200899}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SinghS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SokolRLH20, author = {Pavol Sokol and Laura R{\'{o}}zenfeldov{\'{a}} and Katar{\'{\i}}na Lucivjansk{\'{a}} and Jakub Harasta}, title = {{IP} Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300918}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300918}, doi = {10.1016/J.FSIDI.2020.300918}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SokolRLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SteelNOQ20, author = {Chad M. S. Steel and Emily Newman and Suzanne O'Rourke and Ethel Quayle}, title = {An integrative review of historical technology and countermeasure usage trends in online child sexual exploitation material offenders}, journal = {Digit. Investig.}, volume = {33}, pages = {300971}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300971}, doi = {10.1016/J.FSIDI.2020.300971}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SteelNOQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasPSB20, author = {Tyler Thomas and Mathew Piscitelli and Ilya Shavrov and Ibrahim M. Baggili}, title = {Memory {FORESHADOW:} Memory FOREnSics of HArDware CryptOcurrency wallets - {A} Tool and Visualization Framework}, journal = {Digit. Investig.}, volume = {33 Supplement}, pages = {301002}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301002}, doi = {10.1016/J.FSIDI.2020.301002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThomasPSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TokWC20, author = {Yee Ching Tok and Chundong Wang and Sudipta Chattopadhyay}, title = {Stitcher: Correlating digital forensic evidence on internet-of-things devices}, journal = {Digit. Investig.}, volume = {35}, pages = {301071}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301071}, doi = {10.1016/J.FSIDI.2020.301071}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TokWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TorabiBAD20, author = {Sadegh Torabi and Elias Bou{-}Harb and Chadi Assi and Mourad Debbabi}, title = {A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300922}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300922}, doi = {10.1016/J.FSIDI.2020.300922}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TorabiBAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TullyCCDIW20, author = {Gillian Tully and Neil Cohen and David Compton and Gareth Davies and Roy Isbell and Tim Watson}, title = {Quality standards for digital forensics: Learning from experience in England {\&} Wales}, journal = {Digit. Investig.}, volume = {32}, pages = {200905}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.200905}, doi = {10.1016/J.FSIDI.2020.200905}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TullyCCDIW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/UrozR20, author = {Daniel Uroz and Ricardo J. Rodr{\'{\i}}guez}, title = {On Challenges in Verifying Trusted Executable Files in Memory Forensics}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300917}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300917}, doi = {10.1016/J.FSIDI.2020.300917}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/UrozR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WuBO20, author = {Tina Wu and Frank Breitinger and Stephen O'Shaughnessy}, title = {Digital forensic tools: Recent advances and enhancing the status quo}, journal = {Digit. Investig.}, volume = {34}, pages = {300999}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300999}, doi = {10.1016/J.FSIDI.2020.300999}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WuBO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YokotaHTIHAKTHK20, author = {Ryo Yokota and Yoshinori Hawai and Ken'ichi Tsuchiya and Daisuke Imoto and Manato Hirabayashi and Norimitsu Akiba and Hidetoshi Kakuda and Kosuke Tanabe and Masakatsu Honma and Kenji Kurosawa}, title = {A revisited visual-based geolocalization framework for forensic investigation support tools}, journal = {Digit. Investig.}, volume = {35}, pages = {301088}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301088}, doi = {10.1016/J.FSIDI.2020.301088}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/YokotaHTIHAKTHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YucelK20, author = {Cagatay Yucel and Ahmet Koltuksuz}, title = {Imaging and evaluating the memory access for malware}, journal = {Digit. Investig.}, volume = {32}, pages = {200903}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2019.200903}, doi = {10.1016/J.FSIDI.2019.200903}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/YucelK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhangUBC20, author = {Xiaolu Zhang and Oren Upton and Nicole Lang Beebe and Kim{-}Kwang Raymond Choo}, title = {IoT Botnet Forensics: {A} Comprehensive Digital Forensic Case Study on Mirai Botnet Servers}, journal = {Digit. Investig.}, volume = {32 Supplement}, pages = {300926}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.300926}, doi = {10.1016/J.FSIDI.2020.300926}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZhangUBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeDW19, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {On the feasibility of binary authorship characterization}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S3--S11}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.028}, doi = {10.1016/J.DIIN.2019.01.028}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndaLKBBLS19, author = {Felix Anda and David Lillis and Aikaterini Kanta and Brett A. Becker and Elias Bou{-}Harb and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Improving the accuracy of automated facial age estimation to aid {CSEM} investigations}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S142}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.024}, doi = {10.1016/J.DIIN.2019.01.024}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndaLKBBLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArshadJHB19, author = {Humaira Arshad and Aman Jantan and Gan Keng Hoon and Anila Sahar Butt}, title = {A multilayered semantic framework for integrated forensic acquisition on social media}, journal = {Digit. Investig.}, volume = {29}, pages = {147--158}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.002}, doi = {10.1016/J.DIIN.2019.04.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ArshadJHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArshadJO19, author = {Humaira Arshad and Aman Jantan and Esther Omolara}, title = {Evidence collection and forensics on social networks: Research challenges and directions}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {126--138}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.02.001}, doi = {10.1016/J.DIIN.2019.02.001}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ArshadJO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AtwalSL19, author = {Tajvinder Singh Atwal and Mark Scanlon and Nhien{-}An Le{-}Khac}, title = {Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S105--S115}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.019}, doi = {10.1016/J.DIIN.2019.01.019}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AtwalSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BahjatJ19, author = {Ahmed A. Bahjat and Jim Jones}, title = {Deleted file fragment dating by analysis of allocated neighbors}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S60--S67}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.015}, doi = {10.1016/J.DIIN.2019.01.015}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BahjatJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BlockD19, author = {Frank Block and Andreas Dewald}, title = {Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S3--S12}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.008}, doi = {10.1016/J.DIIN.2019.04.008}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BlockD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ButkovicMUT19, author = {Asmir Butkovic and Sasa Mrdovic and Suleyman Uludag and Anel Tanovic}, title = {Geographic profiling for serial cybercrime investigation}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {176--182}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2018.12.001}, doi = {10.1016/J.DIIN.2018.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ButkovicMUT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Carnovale19, author = {Catherine Carnovale}, title = {Publisher's note}, journal = {Digit. Investig.}, volume = {30}, pages = {174}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.08.003}, doi = {10.1016/J.DIIN.2019.08.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Carnovale19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseJFMASR19, author = {Andrew Case and Mohammad M. Jalalzai and Md Firoz{-}Ul{-}Amin and Ryan D. Maggio and Aisha I. Ali{-}Gombe and Mingxuan Sun and Golden G. Richard III}, title = {HookTracer: {A} System for Automated and Accessible {API} Hooks Analysis}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S104--S112}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.011}, doi = {10.1016/J.DIIN.2019.04.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseJFMASR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey19, author = {Eoghan Casey}, title = {Interrelations between digital investigation and forensic science}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {1}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.008}, doi = {10.1016/J.DIIN.2019.03.008}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey19a, author = {Eoghan Casey}, title = {Maturation of digital forensics}, journal = {Digit. Investig.}, volume = {29}, pages = {1}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.05.002}, doi = {10.1016/J.DIIN.2019.05.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey19b, author = {Eoghan Casey}, title = {Trust in digital evidence}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.fsidi.2019.200898}, doi = {10.1016/J.FSIDI.2019.200898}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyBGSBN19, author = {Eoghan Casey and Sean Barnum and Ryan Griffith and Jonathan Snyder and Harm M. A. van Beek and Alex J. Nelson}, title = {Corrigendum to 'Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language' [Digital Investigation 22C {(2017)} 14-45]}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {183--187}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2018.10.001}, doi = {10.1016/J.DIIN.2018.10.001}, timestamp = {Sun, 22 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyBGSBN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyGN19, author = {Eoghan Casey and Zeno J. M. H. Geradts and Bruce J. Nikkel}, title = {Panoramic perspective of Digital Investigation}, journal = {Digit. Investig.}, volume = {30}, pages = {173}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.100886}, doi = {10.1016/J.DIIN.2019.100886}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyGN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyLBB19, author = {Peter Casey and Rebecca Lindsay{-}Decusati and Ibrahim M. Baggili and Frank Breitinger}, title = {Inception: Virtual Space in Memory Space in Real Space - Memory Forensics of Immersive Virtual Reality with the {HTC} Vive}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S13--S21}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.007}, doi = {10.1016/J.DIIN.2019.04.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CaseyLBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyNH19, author = {Eoghan Casey and Alex J. Nelson and Jessica Hyde}, title = {Standardization of file recovery classification and authentication}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.06.004}, doi = {10.1016/J.DIIN.2019.06.004}, timestamp = {Sun, 22 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyNH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChangGSSW19, author = {Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya and Monika Singh and Douglas R. White}, title = {FbHash: {A} New Similarity Hashing Scheme for Digital Forensics}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S113--S123}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.006}, doi = {10.1016/J.DIIN.2019.04.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChangGSSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChoiYHK19, author = {Jusop Choi and Jaegwan Yu and Sangwon Hyun and Hyoungshick Kim}, title = {Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and {QQ} messenger}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S50--S59}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.011}, doi = {10.1016/J.DIIN.2019.01.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChoiYHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChopadeP19, author = {Rupali M. Chopade and Vinod Keshaorao Pachghare}, title = {Ten years of critical review on database forensics research}, journal = {Digit. Investig.}, volume = {29}, pages = {180--197}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.001}, doi = {10.1016/J.DIIN.2019.04.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChopadeP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DebinskiBM19, author = {Mark Debinski and Frank Breitinger and Parvathy Mohan}, title = {Timeline2GUI: {A} Log2Timeline {CSV} parser and training scenarios}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {34--43}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2018.12.004}, doi = {10.1016/J.DIIN.2018.12.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DebinskiBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DominguesFAS19, author = {Patr{\'{\i}}cio Domingues and Miguel Frade and Lu{\'{\i}}s Miguel Andrade and Jo{\~{a}}o Victor Silva}, title = {Digital forensic artifacts of the Your Phone application in Windows 10}, journal = {Digit. Investig.}, volume = {30}, pages = {32--42}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.06.003}, doi = {10.1016/J.DIIN.2019.06.003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DominguesFAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FidalgoAFG19, author = {Eduardo Fidalgo and Enrique Alegre and Laura Fern{\'{a}}ndez{-}Robles and V{\'{\i}}ctor Gonz{\'{a}}lez{-}Castro}, title = {Classifying suspicious content in tor darknet through Semantic Attention Keypoint Filtering}, journal = {Digit. Investig.}, volume = {30}, pages = {12--22}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.05.004}, doi = {10.1016/J.DIIN.2019.05.004}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FidalgoAFG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FukamiN19, author = {Aya Fukami and Kazuhiro Nishimura}, title = {Forensic Analysis of Water Damaged Mobile Devices}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S71--S79}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.009}, doi = {10.1016/J.DIIN.2019.04.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FukamiN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GregorioAV19, author = {Jes{\'{u}}s Gregorio and Bernardo Alarcos and Alfredo Gardel Vicente}, title = {Forensic analysis of Nucleus {RTOS} on {MTK} smartwatches}, journal = {Digit. Investig.}, volume = {29}, pages = {55--66}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.007}, doi = {10.1016/J.DIIN.2019.03.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GregorioAV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrivnaD19, author = {Tom{\'{a}}s Grivna and Jakub Dr{\'{a}}pal}, title = {Attacks on the confidentiality, integrity and availability of data and computer systems in the criminal case law of the Czech Republic}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {1--13}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2018.12.002}, doi = {10.1016/J.DIIN.2018.12.002}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrivnaD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Habibnia19, author = {Babak Habibnia}, title = {The proceedings of the Sixth Annual {DFRWS} Europe Conference}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S1--S2}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.001}, doi = {10.1016/J.DIIN.2019.03.001}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Habibnia19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HadgkissMP19, author = {Melissa Hadgkiss and Sarah Morris and Stacey Paget}, title = {Sifting through the ashes: Amazon Fire {TV} stick acquisition and analysis}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {112--118}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.003}, doi = {10.1016/J.DIIN.2019.01.003}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HadgkissMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HargreavesM19, author = {Christopher James Hargreaves and Angus M. Marshall}, title = {SyncTriage: Using synchronisation artefacts to optimise acquisition order}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S134--S140}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.022}, doi = {10.1016/J.DIIN.2019.01.022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HargreavesM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannMMAN19, author = {Thibaut Heckmann and James P. McEvoy and Konstantinos Markantonakis and Raja Naeem Akram and David Naccache}, title = {Removing epoxy underfill between neighbouring components using acid for component chip-off}, journal = {Digit. Investig.}, volume = {29}, pages = {198--209}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.003}, doi = {10.1016/J.DIIN.2019.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannMMAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSN19, author = {Thibaut Heckmann and Thomas R. Souvignet and David Naccache}, title = {Decrease of energy deposited during laser decapsulation attacks by dyeing and pigmenting the {ECA:} Application to the forensic micro-repair of wire bonding}, journal = {Digit. Investig.}, volume = {29}, pages = {210--218}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.004}, doi = {10.1016/J.DIIN.2019.04.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeoSYYY19, author = {Hee{-}Soo Heo and Byung{-}Min So and Il{-}Ho Yang and Sung{-}Hyun Yoon and Ha{-}Jin Yu}, title = {Automated recovery of damaged audio files using deep neural networks}, journal = {Digit. Investig.}, volume = {30}, pages = {117--126}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.007}, doi = {10.1016/J.DIIN.2019.07.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeoSYYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLRS19, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Mariia Rybalka and Roman Schell}, title = {Syntactical Carving of PNGs and Automated Generation of Reproducible Datasets}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S22--S30}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.014}, doi = {10.1016/J.DIIN.2019.04.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertLRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HongYO19, author = {Jin Hyung Hong and Yoonmo Yang and Byung Tae Oh}, title = {Detection of frame deletion in HEVC-Coded video in the compressed domain}, journal = {Digit. Investig.}, volume = {30}, pages = {23--31}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.06.002}, doi = {10.1016/J.DIIN.2019.06.002}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HongYO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman19, author = {Graeme Horsman}, title = {Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support {(DERDS)} framework}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {146--151}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.007}, doi = {10.1016/J.DIIN.2019.01.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman19a, author = {Graeme Horsman}, title = {Tool testing and reliability issues in the field of digital forensics}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {163--175}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.009}, doi = {10.1016/J.DIIN.2019.01.009}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman19b, author = {Graeme Horsman}, title = {Reconstructing cached video stream content: - Part 2}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.fsidi.2019.200893}, doi = {10.1016/J.FSIDI.2019.200893}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanFJ19, author = {Graeme Horsman and Benjamin Findlay and Tim James}, title = {Developing a 'router examination at scene' standard operating procedure for crime scene investigators in the United Kingdom}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {152--162}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.010}, doi = {10.1016/J.DIIN.2019.01.010}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HorsmanFJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HranickyZRK19, author = {Radek Hranick{\'{y}} and Luk{\'{a}}s Zobal and Ondrej Rysav{\'{y}} and Dusan Kol{\'{a}}r}, title = {Distributed password cracking with {BOINC} and hashcat}, journal = {Digit. Investig.}, volume = {30}, pages = {161--172}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.08.001}, doi = {10.1016/J.DIIN.2019.08.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HranickyZRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HurPKPLK19, author = {Uk Hur and Myungseo Park and Giyoon Kim and Younjai Park and Insoo Lee and Jongsung Kim}, title = {Data acquisition methods using backup data decryption of Sony smartphones}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.fsidi.2019.200890}, doi = {10.1016/J.FSIDI.2019.200890}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HurPKPLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IkuesanV19, author = {Adeyemi R. Ikuesan and Hein S. Venter}, title = {Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?}, journal = {Digit. Investig.}, volume = {30}, pages = {73--89}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.003}, doi = {10.1016/J.DIIN.2019.07.003}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IkuesanV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JeongL19, author = {Doowon Jeong and Sangjin Lee}, title = {Forensic signature for tracking storage devices: Analysis of {UEFI} firmware image, disk signature and windows artifacts}, journal = {Digit. Investig.}, volume = {29}, pages = {21--27}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.02.004}, doi = {10.1016/J.DIIN.2019.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JeongL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JinWY19, author = {Chao Jin and Rangding Wang and Diqun Yan}, title = {Source smartphone identification by exploiting encoding characteristics of recorded speech}, journal = {Digit. Investig.}, volume = {29}, pages = {129--146}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.003}, doi = {10.1016/J.DIIN.2019.03.003}, timestamp = {Mon, 21 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JinWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JoSKYKKJONS19, author = {Wooyeon Jo and Yeonghun Shin and Hyungchan Kim and Dongkyun Yoo and Donghyun Kim and Cheulhoon Kang and Jongmin Jin and Jungkyung Oh and Bitna Na and Taeshik Shon}, title = {Digital Forensic Practices and Methodologies for {AI} Speaker Ecosystems}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S80--S93}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.013}, doi = {10.1016/J.DIIN.2019.04.013}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JoSKYKKJONS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JohnstonE19, author = {Pamela Johnston and Eyad Elyan}, title = {A review of digital video tampering: From simple editing to full synthesis}, journal = {Digit. Investig.}, volume = {29}, pages = {67--81}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.006}, doi = {10.1016/J.DIIN.2019.03.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JohnstonE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarakucukD19, author = {Ahmet Karak{\"{u}}{\c{c}}{\"{u}}k and Ahmet Emir Dirik}, title = {{PRNU} based source camera attribution for image sets anonymized with patch-match algorithm}, journal = {Digit. Investig.}, volume = {30}, pages = {43--51}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.06.001}, doi = {10.1016/J.DIIN.2019.06.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarakucukD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarbabD19, author = {ElMouatez Billah Karbab and Mourad Debbabi}, title = {MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S77--S87}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.017}, doi = {10.1016/J.DIIN.2019.01.017}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarbabD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarresandAD19, author = {Martin Karresand and Stefan Axelsson and Geir Olav Dyrkolbotn}, title = {Using {NTFS} Cluster Allocation Behavior to Find the Location of User Data}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S51--S60}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.018}, doi = {10.1016/J.DIIN.2019.04.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarresandAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Khatri19, author = {Yogesh Khatri}, title = {Investigating spotlight internals to extract metadata}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {96--103}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.005}, doi = {10.1016/J.DIIN.2019.01.005}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Khatri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KouokamD19, author = {Emmanuel Kiegaing Kouokam and Ahmet Emir Dirik}, title = {PRNU-based source device attribution for YouTube videos}, journal = {Digit. Investig.}, volume = {29}, pages = {91--100}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.005}, doi = {10.1016/J.DIIN.2019.03.005}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KouokamD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LatzoPF19, author = {Tobias Latzo and Ralph Palutke and Felix C. Freiling}, title = {A universal taxonomy and survey of forensic memory acquisition techniques}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {56--69}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.001}, doi = {10.1016/J.DIIN.2019.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LatzoPF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LieblerB19, author = {Lorenz Liebler and Harald Baier}, title = {Towards exact and inexact approximate matching of executable binaries}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S12--S21}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.027}, doi = {10.1016/J.DIIN.2019.01.027}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LieblerB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LieblerSBB19, author = {Lorenz Liebler and Patrick Schmitt and Harald Baier and Frank Breitinger}, title = {On efficiency of artifact lookup strategies in digital forensics}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S116--S125}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.020}, doi = {10.1016/J.DIIN.2019.01.020}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LieblerSBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LimSRK19, author = {Charles Lim and Suryadi and Kalamullah Ramli and Yohanes Syailendra Kotualubun}, title = {Mal-Flux: Rendering hidden code of packed binary executable}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {83--95}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.004}, doi = {10.1016/J.DIIN.2019.01.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LimSRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LoneM19, author = {Auqib Hamid Lone and Roohie Naaz Mir}, title = {Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {44--55}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.002}, doi = {10.1016/J.DIIN.2019.01.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LoneM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Macia-Fernandez19, author = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Jos{\'{e}} Antonio G{\'{o}}mez{-}Hern{\'{a}}ndez and Margarita Robles and Pedro Garc{\'{\i}}a{-}Teodoro}, title = {Blockchain-based forensic system for collection and preservation of network service evidences}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S141}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.023}, doi = {10.1016/J.DIIN.2019.01.023}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Macia-Fernandez19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MargagliottiBR19, author = {Giulia Margagliotti and Timothy Boll{\'{e}} and Quentin Rossy}, title = {Worldwide analysis of crimes by the traces of their online media coverage: The case of jewellery store robberies}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.fsidi.2019.200889}, doi = {10.1016/J.FSIDI.2019.200889}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MargagliottiBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MarshallM19, author = {Angus M. Marshall and Peter Miller}, title = {CaseNote: Mobile phone call data obfuscation {\&} techniques for call correlation}, journal = {Digit. Investig.}, volume = {29}, pages = {82--90}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.004}, doi = {10.1016/J.DIIN.2019.03.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MarshallM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MatthewsSF19, author = {Richard Matthews and Matthew Sorell and Nickolas J. G. Falkner}, title = {An analysis of optical contributions to a photo-sensor's ballistic fingerprints}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {139--145}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.02.002}, doi = {10.1016/J.DIIN.2019.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MatthewsSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McLarenRBT19, author = {Peter McLaren and Gordon Russell and William J. Buchanan and Zhiyuan Tan}, title = {Decrypting live {SSH} traffic in virtual environments}, journal = {Digit. Investig.}, volume = {29}, pages = {109--117}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.010}, doi = {10.1016/J.DIIN.2019.03.010}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McLarenRBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MengB19, author = {Christian Meng and Harald Baier}, title = {bring2lite: {A} Structural Concept and Tool for Forensic Data Analysis and Recovery of Deleted SQLite Records}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S31--S41}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.017}, doi = {10.1016/J.DIIN.2019.04.017}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MengB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MuirLB19, author = {Matt Muir and Petra Leimich and William J. Buchanan}, title = {A Forensic Audit of the Tor Browser Bundle}, journal = {Digit. Investig.}, volume = {29}, pages = {118--128}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.009}, doi = {10.1016/J.DIIN.2019.03.009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MuirLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MullanRF19, author = {Patrick Mullan and Christian Riess and Felix C. Freiling}, title = {Forensic source identification using {JPEG} image headers: The case of smartphones}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S68--S76}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.016}, doi = {10.1016/J.DIIN.2019.01.016}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MullanRF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Murphy19, author = {William F. Murphy}, title = {Investigating the incidence of sexual assault in martial arts coaching using media reports}, journal = {Digit. Investig.}, volume = {30}, pages = {90--93}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.001}, doi = {10.1016/J.DIIN.2019.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Murphy19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MutawaBFMR19, author = {Noora Al Mutawa and Joanne Bryce and Virginia N. L. Franqueira and Andrew Marrington and Janet C. Read}, title = {Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {70--82}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2018.12.003}, doi = {10.1016/J.DIIN.2018.12.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MutawaBFMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NicolettiB19, author = {Marco Nicoletti and Massimo Bernaschi}, title = {Forensic analysis of Microsoft Skype for Business}, journal = {Digit. Investig.}, volume = {29}, pages = {159--179}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.012}, doi = {10.1016/J.DIIN.2019.03.012}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NicolettiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NordvikGTA19, author = {Rune Nordvik and Henry Georges and Fergus Toolan and Stefan Axelsson}, title = {Reverse engineering of ReFS}, journal = {Digit. Investig.}, volume = {30}, pages = {127--147}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.004}, doi = {10.1016/J.DIIN.2019.07.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NordvikGTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NordvikTA19, author = {Rune Nordvik and Fergus Toolan and Stefan Axelsson}, title = {Using the object {ID} index as an investigative approach for {NTFS} file systems}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S30--S39}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.013}, doi = {10.1016/J.DIIN.2019.01.013}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NordvikTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkKPLK19, author = {Myungseo Park and Giyoon Kim and Younjai Park and Insoo Lee and Jongsung Kim}, title = {Decrypting password-based encrypted backup data for Huawei smartphones}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {119--125}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.008}, doi = {10.1016/J.DIIN.2019.01.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkKPLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PessolanoRSX19, author = {Gus Pessolano and Huw Read and Iain Sutherland and Konstantinos Xynos}, title = {Forensic Analysis of the Nintendo 3DS {NAND}}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S61--S70}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.015}, doi = {10.1016/J.DIIN.2019.04.015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PessolanoRSX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PontoST19, author = {Kevin Ponto and Simon Smith and Ross Tredinnick}, title = {Methods for detecting manipulations in 3D scan data}, journal = {Digit. Investig.}, volume = {30}, pages = {101--107}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.009}, doi = {10.1016/J.DIIN.2019.07.009}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PontoST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PortoLFVIPV19, author = {Lucas Faria Porto and Laise Nascimento Correia Lima and Marta Regina Pinheiro Flores and Andrea Valsecchi and {\'{O}}scar Ib{\'{a}}{\~{n}}ez and Carlos Eduardo Machado Palhares and Flavio de Barros Vidal}, title = {Automatic cephalometric landmarks detection on frontal faces: An approach based on supervised learning techniques}, journal = {Digit. Investig.}, volume = {30}, pages = {108--116}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.008}, doi = {10.1016/J.DIIN.2019.07.008}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PortoLFVIPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PourBVNPC19, author = {Morteza Safaei Pour and Elias Bou{-}Harb and Kavita Varma and Nataliia Neshenko and Dimitris A. Pados and Kim{-}Kwang Raymond Choo}, title = {Comprehending the IoT cyber threat landscape: {A} data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S40--S49}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.014}, doi = {10.1016/J.DIIN.2019.01.014}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PourBVNPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RenduchintalaJK19, author = {Ankit Renduchintala and Farha Jahan and Raghav Khanna and Ahmad Y. Javaid}, title = {A comprehensive micro unmanned aerial vehicle (UAV/Drone) forensic framework}, journal = {Digit. Investig.}, volume = {30}, pages = {52--72}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.002}, doi = {10.1016/J.DIIN.2019.07.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RenduchintalaJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SanchezGBH19, author = {Laura S{\'{a}}nchez and Cinthya Grajeda and Ibrahim M. Baggili and Cory Lloyd Hall}, title = {A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, {\&} Safer Presentation for Investigating Child Sexual Abuse Material {(CSAM)}}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S124--S142}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.005}, doi = {10.1016/J.DIIN.2019.04.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SanchezGBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SayakkaraLS19, author = {Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics}, journal = {Digit. Investig.}, volume = {29}, pages = {43--54}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.002}, doi = {10.1016/J.DIIN.2019.03.002}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SayakkaraLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SayakkaraLS19a, author = {Asanka P. Sayakkara and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S94--S103}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.012}, doi = {10.1016/J.DIIN.2019.04.012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SayakkaraLS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schatz19, author = {Bradley L. Schatz}, title = {{AFF4-L:} {A} Scalable Open Logical Evidence Container}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S143--S149}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.016}, doi = {10.1016/J.DIIN.2019.04.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schatz19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ServidaC19, author = {Francesco Servida and Eoghan Casey}, title = {IoT forensic challenges and opportunities for digital traces}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S22--S29}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.012}, doi = {10.1016/J.DIIN.2019.01.012}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ServidaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShielO19, author = {Ian Shiel and Stephen O'Shaughnessy}, title = {Improving file-level fuzzy hashes for malware variant classification}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S88--S94}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.018}, doi = {10.1016/J.DIIN.2019.01.018}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShielO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShukanAOA19, author = {Aliya Shukan and Aitugan Abdizhami and Gulnar Ospanova and Dana Abdakimova}, title = {Crime control in the sphere of information technologies in the Republic of Turkey}, journal = {Digit. Investig.}, volume = {30}, pages = {94--100}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.005}, doi = {10.1016/J.DIIN.2019.07.005}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShukanAOA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SinghSK19, author = {Manmeet Singh and Maninder Singh and Sanmeet Kaur}, title = {Detecting bot-infected machines using {DNS} fingerprinting}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {14--33}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2018.12.005}, doi = {10.1016/J.DIIN.2018.12.005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SinghSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SitaraM19, author = {K. Sitara and Babu M. Mehtre}, title = {Differentiating synthetic and optical zooming for passive video forgery detection: An anti-forensic perspective}, journal = {Digit. Investig.}, volume = {30}, pages = {1--11}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.05.001}, doi = {10.1016/J.DIIN.2019.05.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SitaraM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SoltaniH19, author = {Somayeh Soltani and Seyed{-}Amin Hosseini{-}Seno}, title = {A formal model for event reconstruction in digital forensic investigation}, journal = {Digit. Investig.}, volume = {30}, pages = {148--160}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.07.006}, doi = {10.1016/J.DIIN.2019.07.006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SoltaniH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StudiawanSP19, author = {Hudan Studiawan and Ferdous Sohel and Christian Payne}, title = {A survey on forensic investigation of operating system logs}, journal = {Digit. Investig.}, volume = {29}, pages = {1--20}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.02.005}, doi = {10.1016/J.DIIN.2019.02.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/StudiawanSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SundeD19, author = {Nina Sunde and Itiel E. Dror}, title = {Cognitive and human factors in digital forensics: Problems, challenges, and the way forward}, journal = {Digit. Investig.}, volume = {29}, pages = {101--108}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.03.011}, doi = {10.1016/J.DIIN.2019.03.011}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SundeD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThreadgallH19, author = {Ruth Threadgall and Graeme Horsman}, title = {An examination of gaming platform policies for law enforcement support}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.fsidi.2019.200887}, doi = {10.1016/J.FSIDI.2019.200887}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThreadgallH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/UrozR19, author = {Daniel Uroz and Ricardo J. Rodr{\'{\i}}guez}, title = {Characteristics and detectability of Windows auto-start extensibility points in memory forensics}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S95--S104}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.026}, doi = {10.1016/J.DIIN.2019.01.026}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/UrozR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VeselyZ19, author = {Vladim{\'{\i}}r Vesel{\'{y}} and Martin Z{\'{a}}dn{\'{\i}}k}, title = {How to detect cryptocurrency miners? By traffic forensics!}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.08.002}, doi = {10.1016/J.DIIN.2019.08.002}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VeselyZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRHJG19, author = {James Wagner and Alexander Rasin and Karen Heart and Rebecca Jacob and Jonathan Grier}, title = {{DB3F} {\&} DF-Toolkit: The Database Forensic File Format and the Database Forensic Toolkit}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S42--S50}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.010}, doi = {10.1016/J.DIIN.2019.04.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRHJG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WuLX19, author = {Yan Wu and Anthony Luo and Dianxiang Xu}, title = {Identifying suspicious addresses in Bitcoin thefts}, journal = {Digit. Investig.}, volume = {31}, year = {2019}, url = {https://doi.org/10.1016/j.fsidi.2019.200895}, doi = {10.1016/J.FSIDI.2019.200895}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WuLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZandwijkB19, author = {Jan Peter van Zandwijk and Abdul Boztas}, title = {The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence?}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S126--S133}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.021}, doi = {10.1016/J.DIIN.2019.01.021}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZandwijkB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhangGBB19, author = {Xiaolu Zhang and Justin Grannis and Ibrahim M. Baggili and Nicole Lang Beebe}, title = {Frameup: An incriminatory attack on Storj: {A} peer to peer blockchain enabled distributed storage system}, journal = {Digit. Investig.}, volume = {29}, pages = {28--42}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.02.003}, doi = {10.1016/J.DIIN.2019.02.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZhangGBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhaoKGLXBZLW19, author = {Lu Zhao and Yanrong Kang and Lili Guo and Yuan Long and Guidong Xing and Menghu Bao and Yaoguo Zhang and Siqi Liu and Chunlu Wang}, title = {The Research of Alcohol Drinking State Analyzing Based on Smart Watch Data}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S143}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.025}, doi = {10.1016/J.DIIN.2019.01.025}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZhaoKGLXBZLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/issaIA19, author = {Hamzeh Abu Issa and Mahmoud Ismail and Omar Aamar}, title = {Unauthorized access crime in Jordanian law (comparative study)}, journal = {Digit. Investig.}, volume = {28}, number = {Supplement}, pages = {104--111}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.006}, doi = {10.1016/J.DIIN.2019.01.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/issaIA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/0002HZXLC18, author = {Na Huang and Jingsha He and Nafei Zhu and Xinggang Xuan and Gongzheng Liu and Chengyue Chang}, title = {Identification of the source camera of images based on convolutional neural network}, journal = {Digit. Investig.}, volume = {26}, pages = {72--80}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.08.001}, doi = {10.1016/J.DIIN.2018.08.001}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/0002HZXLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AbooraigAKHAH18, author = {Raddad Abooraig and Shadi AlZu'bi and Tarek Kanan and Bilal Hawashin and Mahmoud Al{-}Ayyoub and Ismail Hmeidi}, title = {Automatic categorization of Arabic articles based on their political orientation}, journal = {Digit. Investig.}, volume = {25}, pages = {24--41}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.003}, doi = {10.1016/J.DIIN.2018.04.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AbooraigAKHAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AhmedI18, author = {Sajjad Ahmed and Saiful Islam}, title = {Median filter detection through streak area analysis}, journal = {Digit. Investig.}, volume = {26}, pages = {100--106}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.08.002}, doi = {10.1016/J.DIIN.2018.08.002}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AhmedI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-kawazCFL18, author = {Hiba Al{-}Kawaz and Nathan L. Clarke and Steven Furnell and Fudong Li}, title = {Facial-Forensic Analysis Tool}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S136}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.008}, doi = {10.1016/J.DIIN.2018.04.008}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-kawazCFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlendalDA18, author = {Gunnar Alendal and Geir Olav Dyrkolbotn and Stefan Axelsson}, title = {Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S60--S67}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.008}, doi = {10.1016/J.DIIN.2018.01.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AlendalDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AwasthiRXS18, author = {Akshay Awasthi and Huw Read and Konstantinos Xynos and Iain Sutherland}, title = {Welcome pwn: Almond smart home hub forensics}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S38--S46}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.014}, doi = {10.1016/J.DIIN.2018.04.014}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AwasthiRXS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaninD18, author = {Sergii Banin and Geir Olav Dyrkolbotn}, title = {Multinomial malware classification via low-level features}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S107--S117}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.019}, doi = {10.1016/J.DIIN.2018.04.019}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaninD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BayneFS18, author = {Ethan Bayne and R. Ian Ferguson and Adam T. Sampson}, title = {OpenForensics: {A} digital forensics {GPU} pattern matching approach for the 21st century}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S29--S37}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.005}, doi = {10.1016/J.DIIN.2018.01.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BayneFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BharadwajS18, author = {Nitesh K. Bharadwaj and Upasna Singh}, title = {Efficiently searching target data traces in storage devices with region based random sector sampling approach}, journal = {Digit. Investig.}, volume = {24}, pages = {128--141}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.02.004}, doi = {10.1016/J.DIIN.2018.02.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BharadwajS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BhatW18, author = {Wasim Ahmad Bhat and Mohamad Ahtisham Wani}, title = {Forensic analysis of B-tree file system (Btrfs)}, journal = {Digit. Investig.}, volume = {27}, pages = {57--70}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.09.001}, doi = {10.1016/J.DIIN.2018.09.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BhatW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BhattA18, author = {Manish Bhatt and Irfan Ahmed}, title = {Leveraging relocations in ELF-binaries for Linux kernel version identification}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S12--S20}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.022}, doi = {10.1016/J.DIIN.2018.04.022}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BhattA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BolleC18, author = {Timothy Boll{\'{e}} and Eoghan Casey}, title = {Using computed similarity of distinctive digital traces to evaluate non-obvious links and repetitions in cyber-investigations}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S2--S9}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.002}, doi = {10.1016/J.DIIN.2018.01.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BolleC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BordjibaKD18, author = {Houssem Eddine Bordjiba and ElMouatez Billah Karbab and Mourad Debbabi}, title = {Data-driven approach for automatic telephony threat analysis and campaign detection}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S131--S141}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.016}, doi = {10.1016/J.DIIN.2018.01.016}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BordjibaKD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BoucherL18, author = {Jacques Boucher and Nhien{-}An Le{-}Khac}, title = {Forensic framework to identify local vs synced artefacts}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S68--S75}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.009}, doi = {10.1016/J.DIIN.2018.01.009}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BoucherL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey18, author = {Eoghan Casey}, title = {The knowledge management gap in digital investigations}, journal = {Digit. Investig.}, volume = {27}, pages = {1--2}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.11.001}, doi = {10.1016/J.DIIN.2018.11.001}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey18a, author = {Eoghan Casey}, title = {Clearly conveying digital forensic results}, journal = {Digit. Investig.}, volume = {24}, pages = {1--3}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.03.001}, doi = {10.1016/J.DIIN.2018.03.001}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey18b, author = {Eoghan Casey}, title = {The need for translational research in digital investigation}, journal = {Digit. Investig.}, volume = {26}, pages = {1--2}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.09.003}, doi = {10.1016/J.DIIN.2018.09.003}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyGN18, author = {Eoghan Casey and Zeno J. M. H. Geradts and Bruce J. Nikkel}, title = {Transdisciplinary strategies for digital investigation challenges}, journal = {Digit. Investig.}, volume = {25}, pages = {1--4}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.05.002}, doi = {10.1016/J.DIIN.2018.05.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyGN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChauJ18, author = {Ngoc{-}Tu Chau and Souhwan Jung}, title = {Dynamic analysis with Android container: Challenges and opportunities}, journal = {Digit. Investig.}, volume = {27}, pages = {38--46}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.09.007}, doi = {10.1016/J.DIIN.2018.09.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChauJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Chivers18, author = {Howard Chivers}, title = {Navigating the Windows Mail database}, journal = {Digit. Investig.}, volume = {26}, pages = {92--99}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.02.001}, doi = {10.1016/J.DIIN.2018.02.001}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Chivers18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DaiLQL18, author = {Yusheng Dai and Hui Li and Yekui Qian and Xidong Lu}, title = {A malware classification method based on memory dump grayscale image}, journal = {Digit. Investig.}, volume = {27}, pages = {30--37}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.09.006}, doi = {10.1016/J.DIIN.2018.09.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DaiLQL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DalinsTWCB18, author = {Janis Dalins and Yuriy Tyshetskiy and Campbell Wilson and Mark J. Carman and Douglas Boudry}, title = {Laying foundations for effective machine learning in law enforcement. Majura - {A} labelling schema for child exploitation materials}, journal = {Digit. Investig.}, volume = {26}, pages = {40--54}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.05.004}, doi = {10.1016/J.DIIN.2018.05.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DalinsTWCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DalinsWC18, author = {Janis Dalins and Campbell Wilson and Mark J. Carman}, title = {Criminal motivation on the dark web: {A} categorisation model for law enforcement}, journal = {Digit. Investig.}, volume = {24}, pages = {62--71}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2017.12.003}, doi = {10.1016/J.DIIN.2017.12.003}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DalinsWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FengLZC18, author = {Peijun Feng and Qingbao Li and Ping Zhang and Zhifeng Chen}, title = {Logical acquisition method based on data migration for Android mobile devices}, journal = {Digit. Investig.}, volume = {26}, pages = {55--62}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.05.003}, doi = {10.1016/J.DIIN.2018.05.003}, timestamp = {Tue, 27 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FengLZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FranqueiraBMM18, author = {Virginia N. L. Franqueira and Joanne Bryce and Noora Al Mutawa and Andrew Marrington}, title = {Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches}, journal = {Digit. Investig.}, volume = {24}, pages = {95--105}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2017.11.002}, doi = {10.1016/J.DIIN.2017.11.002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FranqueiraBMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FreilingH18, author = {Felix C. Freiling and Leonhard H{\"{o}}sch}, title = {Controlled experiments in digital evidence tampering}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S83--S92}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.011}, doi = {10.1016/J.DIIN.2018.01.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FreilingH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GobelB18, author = {Thomas G{\"{o}}bel and Harald Baier}, title = {Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S111--S120}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.014}, doi = {10.1016/J.DIIN.2018.01.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GobelB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Gokce18, author = {Yasir Gokce}, title = {The Bylock fallacy: An In-depth Analysis of the Bylock Investigations in Turkey}, journal = {Digit. Investig.}, volume = {26}, pages = {81--91}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.06.002}, doi = {10.1016/J.DIIN.2018.06.002}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Gokce18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrajedaSBCB18, author = {Cinthya Grajeda and Laura S{\'{a}}nchez and Ibrahim M. Baggili and Devon Clark and Frank Breitinger}, title = {Experience constructing the Artifact Genome Project {(AGP):} Managing the domain's knowledge one artifact at a time}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S47--S58}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.021}, doi = {10.1016/J.DIIN.2018.04.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrajedaSBCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Gupta018, author = {Bhupendra Gupta and Mayank Tiwari}, title = {Improving source camera identification performance using {DCT} based image frequency components dependent sensor pattern noise extraction method}, journal = {Digit. Investig.}, volume = {24}, pages = {121--127}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.02.003}, doi = {10.1016/J.DIIN.2018.02.003}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Gupta018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannMNS18, author = {Thibaut Heckmann and Konstantinos Markantonakis and David Naccache and Thomas R. Souvignet}, title = {Forensic smartphone analysis using adhesives: Transplantation of Package on Package components}, journal = {Digit. Investig.}, volume = {26}, pages = {29--39}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.05.005}, doi = {10.1016/J.DIIN.2018.05.005}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannMNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HenselerL18, author = {Hans Henseler and Sophie van Loenhout}, title = {Educating judges, prosecutors and lawyers in the use of digital forensic experts}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S76--S82}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.010}, doi = {10.1016/J.DIIN.2018.01.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HenselerL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLY18, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Shujian Yang}, title = {Forensic analysis of multiple device {BTRFS} configurations using The Sleuth Kit}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S21--S29}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.020}, doi = {10.1016/J.DIIN.2018.04.020}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HilgertLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HoKW18, author = {Shuyuan Mary Ho and Da{-}Yu Kao and Wen{-}Ying Wu}, title = {Following the breadcrumbs: Timestamp pattern identification for cloud forensics}, journal = {Digit. Investig.}, volume = {24}, pages = {79--94}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2017.12.001}, doi = {10.1016/J.DIIN.2017.12.001}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HoKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman18, author = {Graeme Horsman}, title = {I didn't see that! An examination of internet browser cache behaviour following website visits}, journal = {Digit. Investig.}, volume = {25}, pages = {105--113}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.02.006}, doi = {10.1016/J.DIIN.2018.02.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman18a, author = {Graeme Horsman}, title = {Reconstructing streamed video content: {A} case study on YouTube and Facebook Live stream content in the Chrome web browser cache}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S30--S37}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.017}, doi = {10.1016/J.DIIN.2018.04.017}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Horsman18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanPB18, author = {Graeme Horsman and Helen Page and Peter Beveridge}, title = {A preliminary assessment of latent fingerprint evidence damage on mobile device screens caused by digital forensic extractions}, journal = {Digit. Investig.}, volume = {27}, pages = {47--56}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.10.002}, doi = {10.1016/J.DIIN.2018.10.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HorsmanPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KabakusD18, author = {Abdullah Talha Kabakus and Ibrahim Alper Dogru}, title = {An in-depth analysis of Android malware using hybrid techniques}, journal = {Digit. Investig.}, volume = {24}, pages = {25--33}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.001}, doi = {10.1016/J.DIIN.2018.01.001}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KabakusD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KaoCS18, author = {Da{-}Yu Kao and Yuanpei Chen and Neng{-}Hsin Shih}, title = {Reconstructing {ADS} data hiding in windows {NTFS:} {A} temporal analysis}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S137}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.009}, doi = {10.1016/J.DIIN.2018.04.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KaoCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarbabDDM18, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {MalDozer: Automatic framework for android malware detection using deep learning}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S48--S59}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.007}, doi = {10.1016/J.DIIN.2018.01.007}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarbabDDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhaderHA18, author = {Mariam Khader and Ali Hadi and Ghazi Al{-}Naymat}, title = {{HDFS} file operation fingerprints for forensic investigations}, journal = {Digit. Investig.}, volume = {24}, pages = {50--61}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2017.11.004}, doi = {10.1016/J.DIIN.2017.11.004}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KhaderHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KouwenSCL18, author = {Arie Kouwen and Mark Scanlon and Kim{-}Kwang Raymond Choo and Nhien{-}An Le{-}Khac}, title = {Digital forensic investigation of two-way radio communication equipment and services}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S77--S86}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.007}, doi = {10.1016/J.DIIN.2018.04.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KouwenSCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LambertzHS18, author = {Martin Lambertz and Jan{-}Niclas Hilgert and Roman Schell}, title = {Resurrecting Portable Network Graphics using block generators}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S138}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.010}, doi = {10.1016/J.DIIN.2018.04.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LambertzHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeBNS18, author = {Quan Le and Ois{\'{\i}}n Boydell and Brian Mac Namee and Mark Scanlon}, title = {Deep learning at the shallow end: Malware classification for non-domain experts}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S118--S126}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.024}, doi = {10.1016/J.DIIN.2018.04.024}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeBNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LewisCAR18, author = {Nathan Lewis and Andrew Case and Aisha I. Ali{-}Gombe and Golden G. Richard III}, title = {Memory forensics and the Windows Subsystem for Linux}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S3--S11}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.018}, doi = {10.1016/J.DIIN.2018.04.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LewisCAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LinCZYW18, author = {Xiaodong Lin and Ting Chen and Tong Zhu and Kun Yang and Fengguo Wei}, title = {Automated forensic analysis of mobile applications on Android devices}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S59--S66}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.012}, doi = {10.1016/J.DIIN.2018.04.012}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LinCZYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MarshallP18, author = {Angus M. Marshall and Richard F. Paige}, title = {Requirements in digital forensics method definition: Observations from a {UK} study}, journal = {Digit. Investig.}, volume = {27}, pages = {23--29}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.09.004}, doi = {10.1016/J.DIIN.2018.09.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MarshallP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MeijG18, author = {Christiaan Meij and Zeno J. M. H. Geradts}, title = {Source camera identification using Photo Response Non-Uniformity on WhatsApp}, journal = {Digit. Investig.}, volume = {24}, pages = {142--154}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.02.005}, doi = {10.1016/J.DIIN.2018.02.005}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MeijG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MosliYP18, author = {Rayan Mosli and Bo Yuan and Yin Pan}, title = {On the viability of data collection using Google Rapid Response for enterprise-level malware research}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S139}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.011}, doi = {10.1016/J.DIIN.2018.04.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MosliYP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NemetzSF18, author = {Sebastian Nemetz and Sven Schmitt and Felix C. Freiling}, title = {A standardized corpus for SQLite database forensics}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S121--S130}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.015}, doi = {10.1016/J.DIIN.2018.01.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NemetzSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NikasAP18, author = {Alexios Nikas and Efthimios Alepis and Constantinos Patsakis}, title = {I know what you streamed last night: On the security and privacy of streaming}, journal = {Digit. Investig.}, volume = {25}, pages = {78--89}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.03.004}, doi = {10.1016/J.DIIN.2018.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NikasAP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OrrS18, author = {Douglas A. Orr and Laura S{\'{a}}nchez}, title = {\emph{Alexa, did you get that?} Determining the evidentiary value of data stored by the Amazon{\textregistered} Echo}, journal = {Digit. Investig.}, volume = {24}, pages = {72--78}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2017.12.002}, doi = {10.1016/J.DIIN.2017.12.002}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OrrS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OtsukiKIMO18, author = {Yuto Otsuki and Yuhei Kawakoya and Makoto Iwamura and Jun Miyoshi and Kazuhiko Ohkubo}, title = {Building stack traces from memory dump of Windows x64}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S101--S110}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.013}, doi = {10.1016/J.DIIN.2018.01.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OtsukiKIMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OwensonCL18, author = {Gareth Owenson and Sarah Cortes and Andrew Lewman}, title = {The darknet's smaller than we thought: The life cycle of Tor Hidden Services}, journal = {Digit. Investig.}, volume = {27}, pages = {17--22}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.09.005}, doi = {10.1016/J.DIIN.2018.09.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OwensonCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OzelBYB18, author = {Mesut Ozel and H. Ibrahim Bulbul and H. Guclu Yavuzcan and {\"{O}}mer Faruk Bay}, title = {An analytical analysis of Turkish digital forensics}, journal = {Digit. Investig.}, volume = {25}, pages = {55--69}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.001}, doi = {10.1016/J.DIIN.2018.04.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OzelBYB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PalutkeF18, author = {Ralph Palutke and Felix C. Freiling}, title = {Styx: Countering robust memory acquisition}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S18--S28}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.004}, doi = {10.1016/J.DIIN.2018.01.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PalutkeF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Park18, author = {Jungheum Park}, title = {{TREDE} and {VMPOP:} Cultivating multi-purpose datasets for digital forensics - {A} Windows registry corpus as an example}, journal = {Digit. Investig.}, volume = {26}, pages = {3--18}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.025}, doi = {10.1016/J.DIIN.2018.04.025}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Park18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkAJHKYSHK18, author = {Sungmi Park and Nikolay Akatyev and Yunsik Jang and Jisoo Hwang and Donghyun Kim and Woonseon Yu and Hyunwoo Shin and Changhee Han and Jonghyun Kim}, title = {A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S93--S100}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.012}, doi = {10.1016/J.DIIN.2018.01.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkAJHKYSHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkJP18, author = {Juhyun Park and Yun{-}Hwan Jang and Yongsu Park}, title = {New flash memory acquisition methods based on firmware update protocols for {LG} Android smartphones}, journal = {Digit. Investig.}, volume = {25}, pages = {42--54}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.002}, doi = {10.1016/J.DIIN.2018.04.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkKK18, author = {Myungseo Park and Hangi Kim and Jongsung Kim}, title = {How to decrypt PIN-Based encrypted backup data of Samsung smartphones}, journal = {Digit. Investig.}, volume = {26}, pages = {63--71}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.05.006}, doi = {10.1016/J.DIIN.2018.05.006}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ParkKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Pieterse0H18, author = {Heloise Pieterse and Martin Olivier and Renier van Heerden}, title = {Smartphone data evaluation model: Identifying authentic smartphone data}, journal = {Digit. Investig.}, volume = {24}, pages = {11--24}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.017}, doi = {10.1016/J.DIIN.2018.01.017}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Pieterse0H18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Porter18, author = {Kyle Porter}, title = {Analyzing the DarkNetMarkets subreddit for evolutions of tools and trends using {LDA} topic modeling}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S87--S97}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.023}, doi = {10.1016/J.DIIN.2018.04.023}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Porter18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RaffN18, author = {Edward Raff and Charles Nicholas}, title = {Lempel-Ziv Jaccard Distance, an effective alternative to ssdeep and sdhash}, journal = {Digit. Investig.}, volume = {24}, pages = {34--49}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2017.12.004}, doi = {10.1016/J.DIIN.2017.12.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RaffN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SS18, author = {Athulya M. S. and Sathidevi Puthumangalathu Savithri}, title = {Speaker verification from codec distorted speech for forensic investigation through serial combination of classifiers}, journal = {Digit. Investig.}, volume = {25}, pages = {70--77}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.03.005}, doi = {10.1016/J.DIIN.2018.03.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandvikA18, author = {Jens{-}Petter Sandvik and Andr{\'{e}} {\AA}rnes}, title = {The reliability of clocks as digital evidence under low voltage conditions}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S10--S17}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.003}, doi = {10.1016/J.DIIN.2018.01.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandvikA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SinhaGM18, author = {Vijay Kumar Sinha and Anuj Kumar Gupta and Manish Mahajan}, title = {Detecting fake iris in iris bio-metric system}, journal = {Digit. Investig.}, volume = {25}, pages = {97--104}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.03.002}, doi = {10.1016/J.DIIN.2018.03.002}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SinhaGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SloanH18, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Dismantling OpenPuff {PDF} steganography}, journal = {Digit. Investig.}, volume = {25}, pages = {90--96}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.03.003}, doi = {10.1016/J.DIIN.2018.03.003}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SloanH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sommer18, author = {Peter Sommer}, title = {Accrediting digital forensics: What are the choices?}, journal = {Digit. Investig.}, volume = {25}, pages = {116--120}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.004}, doi = {10.1016/J.DIIN.2018.04.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sommer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StellyR18, author = {Christopher Stelly and Vassil Roussev}, title = {Nugget: {A} digital forensics language}, journal = {Digit. Investig.}, volume = {24 Supplement}, pages = {S38--S47}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.006}, doi = {10.1016/J.DIIN.2018.01.006}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StellyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SudozaiSBHZ18, author = {M. A. K. Sudozai and Shahzad Saleem and William J. Buchanan and Nisar Habib and Haleemah Zia}, title = {Forensics study of {IMO} call and chat app}, journal = {Digit. Investig.}, volume = {25}, pages = {5--23}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.006}, doi = {10.1016/J.DIIN.2018.04.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SudozaiSBHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TaubmannAR18, author = {Benjamin Taubmann and Omar Alabduljaleel and Hans P. Reiser}, title = {DroidKex: Fast extraction of ephemeral {TLS} keys from the memory of Android apps}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S67--S76}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.013}, doi = {10.1016/J.DIIN.2018.04.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TaubmannAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThompsonV18, author = {Michael F. Thompson and Timothy Vidas}, title = {Cyber Grand Challenge {(CGC)} monitor: {A} vetting system for the {DARPA} cyber grand challenge}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S127--S135}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.016}, doi = {10.1016/J.DIIN.2018.04.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ThompsonV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TsimperidisAK18, author = {Ioannis Tsimperidis and Avi Arampatzis and Alexandros Karakos}, title = {Keystroke dynamics features for gender recognition}, journal = {Digit. Investig.}, volume = {24}, pages = {4--10}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.01.018}, doi = {10.1016/J.DIIN.2018.01.018}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TsimperidisAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TuzelBZLT18, author = {Tomasz Tuzel and Mark P. Bridgman and Joshua Zepf and Tamas K. Lengyel and Kyle J. Temkin}, title = {Who watches the watcher? Detecting hypervisor introspection from unprivileged guests}, journal = {Digit. Investig.}, volume = {26 Supplement}, pages = {S98--S106}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.04.015}, doi = {10.1016/J.DIIN.2018.04.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TuzelBZLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WerkhovenHJMGB18, author = {Ben van Werkhoven and Pieter Hijma and Ceriel J. H. Jacobs and Jason Maassen and Zeno J. M. H. Geradts and Henri E. Bal}, title = {A Jungle Computing approach to common image source identification in large collections of images}, journal = {Digit. Investig.}, volume = {27}, pages = {3--16}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.09.002}, doi = {10.1016/J.DIIN.2018.09.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WerkhovenHJMGB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Xie0LQ18, author = {Yulai Xie and Dan Feng and Xuelong Liao and Leihua Qin}, title = {Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead}, journal = {Digit. Investig.}, volume = {26}, pages = {19--28}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.05.001}, doi = {10.1016/J.DIIN.2018.05.001}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Xie0LQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YoonL18, author = {Jongseong Yoon and Sangjin Lee}, title = {A method and tool to recover data deleted from a MongoDB}, journal = {Digit. Investig.}, volume = {24}, pages = {106--120}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2017.11.001}, doi = {10.1016/J.DIIN.2017.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/YoonL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AD17, author = {Ajay Kumara M. A. and Jaidhar C. D.}, title = {Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor}, journal = {Digit. Investig.}, volume = {23}, pages = {99--123}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.10.004}, doi = {10.1016/J.DIIN.2017.10.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSPWD17, author = {Saed Alrabaee and Noman Saleem and Stere Preda and Lingyu Wang and Mourad Debbabi}, title = {Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 {(2014)} {S94-S103]}}, journal = {Digit. Investig.}, volume = {21}, pages = {89}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.004}, doi = {10.1016/J.DIIN.2017.02.004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSPWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AnglanoCG17, author = {Cosimo Anglano and Massimo Canonico and Marco Guazzone}, title = {Forensic analysis of Telegram Messenger on Android smartphones}, journal = {Digit. Investig.}, volume = {23}, pages = {31--49}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.09.002}, doi = {10.1016/J.DIIN.2017.09.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AnglanoCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaigSVRHCJKISFP17, author = {Zubair A. Baig and Patryk Szewczyk and Craig Valli and Priya Rabadia and Peter Hannay and Maxim Chernyshev and Mike Johnstone and Paresh Kerai and Ahmed Ibrahim and Krishnun Sansurooah and Syed Naeem Firdous and Matthew Peacock}, title = {Future challenges for smart cities: Cyber-security and digital forensics}, journal = {Digit. Investig.}, volume = {22}, pages = {3--13}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.015}, doi = {10.1016/J.DIIN.2017.06.015}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaigSVRHCJKISFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BlockD17, author = {Frank Block and Andreas Dewald}, title = {Linux memory forensics: Dissecting the user space process heap}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S66--S75}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.002}, doi = {10.1016/J.DIIN.2017.06.002}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BlockD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bou-HarbS17, author = {Elias Bou{-}Harb and Mark Scanlon}, title = {Behavioral Service Graphs: {A} formal data-driven approach for prompt investigation of enterprise and internet-wide infections}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S47--S55}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.002}, doi = {10.1016/J.DIIN.2017.02.002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Bou-HarbS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bridge17, author = {Adam Bridge}, title = {Obtaining forensic value from the cbWndExtra structures as used by Windows Common Controls, specifically for the Editbox control}, journal = {Digit. Investig.}, volume = {20}, pages = {54--60}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.007}, doi = {10.1016/J.DIIN.2017.02.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Bridge17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BuchananCM17, author = {William J. Buchanan and Simone Chiale and Richard Macfarlane}, title = {A methodology for the security evaluation within third-party Android Marketplaces}, journal = {Digit. Investig.}, volume = {23}, pages = {88--98}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.10.002}, doi = {10.1016/J.DIIN.2017.10.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BuchananCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseDPRR17, author = {Andrew Case and Arghya Kusum Das and Seung{-}Jong Park and J. Ramanujam and Golden G. Richard III}, title = {Gaslight: {A} comprehensive fuzzing architecture for memory forensics frameworks}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S86--S93}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.011}, doi = {10.1016/J.DIIN.2017.06.011}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CaseDPRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseR17, author = {Andrew Case and Golden G. Richard III}, title = {Memory forensics: The path forward}, journal = {Digit. Investig.}, volume = {20}, pages = {23--33}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2016.12.004}, doi = {10.1016/J.DIIN.2016.12.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey17, author = {Eoghan Casey}, title = {The broadening horizons of digital investigation}, journal = {Digit. Investig.}, volume = {21}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.05.002}, doi = {10.1016/J.DIIN.2017.05.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey17a, author = {Eoghan Casey}, title = {The value of forensic preparedness and digital-identification expertise in smart society}, journal = {Digit. Investig.}, volume = {22}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.09.001}, doi = {10.1016/J.DIIN.2017.09.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey17b, author = {Eoghan Casey}, title = {Editorial - {A} sm{\"{o}}rg{\aa}sbord of digital evidence}, journal = {Digit. Investig.}, volume = {23}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.11.003}, doi = {10.1016/J.DIIN.2017.11.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyBGSBN17, author = {Eoghan Casey and Sean Barnum and Ryan Griffith and Jonathan Snyder and Harm M. A. van Beek and Alex J. Nelson}, title = {Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language}, journal = {Digit. Investig.}, volume = {22}, pages = {14--45}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.08.002}, doi = {10.1016/J.DIIN.2017.08.002}, timestamp = {Sun, 22 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyBGSBN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChungPL17, author = {Hyunji Chung and Jungheum Park and Sangjin Lee}, title = {Digital forensic approaches for Amazon Alexa ecosystem}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S15--S25}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.010}, doi = {10.1016/J.DIIN.2017.06.010}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChungPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ClarkMBB17, author = {Devon Clark and Christopher Meffert and Ibrahim M. Baggili and Frank Breitinger}, title = {{DROP} (DRone Open source Parser) your drone: Forensic analysis of the {DJI} Phantom {III}}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S3--S14}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.013}, doi = {10.1016/J.DIIN.2017.06.013}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ClarkMBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Cohen17, author = {Michael Cohen}, title = {Scanning memory with Yara}, journal = {Digit. Investig.}, volume = {20}, pages = {34--43}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.005}, doi = {10.1016/J.DIIN.2017.02.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Cohen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DentonKBB17, author = {George Denton and Filip Karp{\'{\i}}sek and Frank Breitinger and Ibrahim M. Baggili}, title = {Leveraging the {SRTP} protocol for over-the-network memory acquisition of a {GE} Fanuc Series 90-30}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S26--S38}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.005}, doi = {10.1016/J.DIIN.2017.06.005}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DentonKBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DewaldS17, author = {Andreas Dewald and Sabine Seufert}, title = {{AFEIC:} Advanced forensic Ext4 inode carving}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S83--S91}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.003}, doi = {10.1016/J.DIIN.2017.01.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DewaldS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DivakaranWNT17, author = {Dinil Mon Divakaran and Fok Kar Wai and Ido Nevat and Vrizlynn L. L. Thing}, title = {Evidence gathering for network security and forensics}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S56--S65}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.001}, doi = {10.1016/J.DIIN.2017.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DivakaranWNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DolliverCS17, author = {Diana S. Dolliver and Carson Collins and Beau Sams}, title = {Hybrid approaches to digital forensic investigations: {A} comparative analysis in an institutional context}, journal = {Digit. Investig.}, volume = {23}, pages = {124--137}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.10.005}, doi = {10.1016/J.DIIN.2017.10.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DolliverCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EllouzeRBA17, author = {Nourhene Ellouze and Slim Rekhis and Noureddine Boudriga and Mohamed Allouche}, title = {Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios}, journal = {Digit. Investig.}, volume = {21}, pages = {11--30}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2016.12.001}, doi = {10.1016/J.DIIN.2016.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EllouzeRBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FreilingGR17, author = {Felix C. Freiling and Thomas Glanzmann and Hans P. Reiser}, title = {Characterizing loss of digital evidence due to abstraction layers}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S107--S115}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.012}, doi = {10.1016/J.DIIN.2017.01.012}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FreilingGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FreilingZ17, author = {Felix C. Freiling and Christian Zoubek}, title = {Do digital investigators have to program? {A} controlled experiment in digital investigation}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S37--S46}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.004}, doi = {10.1016/J.DIIN.2017.01.004}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FreilingZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FukamiGLCM17, author = {Aya Fukami and Saugata Ghose and Yixin Luo and Yu Cai and Onur Mutlu}, title = {Improving the reliability of chip-off forensic analysis of {NAND} flash memory devices}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S1--S11}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.011}, doi = {10.1016/J.DIIN.2017.01.011}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FukamiGLCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GalbraithS17, author = {Christopher Galbraith and Padhraic Smyth}, title = {Analyzing user-event data using score-based likelihood ratios with marked point processes}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S106--S114}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.009}, doi = {10.1016/J.DIIN.2017.06.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GalbraithS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GeorgievskaBGSW17, author = {Sonja Georgievska and Rena Bakhshi and Anand K. Gavai and Alessio Sclocco and Ben van Werkhoven}, title = {Clustering image noise patterns by embedding and visualization for common source camera detection}, journal = {Digit. Investig.}, volume = {23}, pages = {22--30}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.08.005}, doi = {10.1016/J.DIIN.2017.08.005}, timestamp = {Mon, 23 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GeorgievskaBGSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GladyshevJ17, author = {Pavel Gladyshev and Joshua I. James}, title = {Decision-theoretic file carving}, journal = {Digit. Investig.}, volume = {22}, pages = {46--61}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.08.001}, doi = {10.1016/J.DIIN.2017.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GladyshevJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrajedaBB17, author = {Cinthya Grajeda and Frank Breitinger and Ibrahim M. Baggili}, title = {Availability of datasets for digital forensics - And what is missing}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S94--S105}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.004}, doi = {10.1016/J.DIIN.2017.06.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrajedaBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GregorioVA17, author = {Jes{\'{u}}s Gregorio and Alfredo Gardel Vicente and Bernardo Alarcos}, title = {Forensic analysis of Telegram Messenger for Windows Phone}, journal = {Digit. Investig.}, volume = {22}, pages = {88--106}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.07.004}, doi = {10.1016/J.DIIN.2017.07.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GregorioVA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrisposGS17, author = {George Grispos and William Bradley Glisson and Tim Storer}, title = {Enhancing security incident response follow-up efforts with lightweight agile retrospectives}, journal = {Digit. Investig.}, volume = {22}, pages = {62--73}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.07.006}, doi = {10.1016/J.DIIN.2017.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrisposGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Gruhn17, author = {Michael Gruhn}, title = {Forensic limbo: Towards subverting hard disk firmware bootkits}, journal = {Digit. Investig.}, volume = {23}, pages = {138--150}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.10.003}, doi = {10.1016/J.DIIN.2017.10.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Gruhn17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HansenT17, author = {Kurt H. Hansen and Fergus Toolan}, title = {Decoding the {APFS} file system}, journal = {Digit. Investig.}, volume = {22}, pages = {107--132}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.07.003}, doi = {10.1016/J.DIIN.2017.07.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HansenT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSN17, author = {Thibaut Heckmann and Thomas R. Souvignet and David Naccache}, title = {Electrically conductive adhesives, thermally conductive adhesives and {UV} adhesives in data extraction forensics}, journal = {Digit. Investig.}, volume = {21}, pages = {53--64}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.009}, doi = {10.1016/J.DIIN.2017.02.009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLP17, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Daniel Plohmann}, title = {Extending The Sleuth Kit and its underlying model for pooled storage file system forensic analysis}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S76--S85}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.003}, doi = {10.1016/J.DIIN.2017.06.003}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HilgertLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman17, author = {Graeme Horsman}, title = {A survey of current social network and online communication provision policies to support law enforcement identify offenders}, journal = {Digit. Investig.}, volume = {21}, pages = {65--75}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.03.001}, doi = {10.1016/J.DIIN.2017.03.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanGC17, author = {Graeme Horsman and Kevin Ginty and Paul Cranner}, title = {Identifying offenders on Twitter: {A} law enforcement practitioner guide}, journal = {Digit. Investig.}, volume = {23}, pages = {63--74}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.09.004}, doi = {10.1016/J.DIIN.2017.09.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HorsmanGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JeongL17, author = {Doowon Jeong and Sangjin Lee}, title = {Study on the tracking revision history of {MS} Word files for forensic investigation}, journal = {Digit. Investig.}, volume = {23}, pages = {3--10}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.08.003}, doi = {10.1016/J.DIIN.2017.08.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JeongL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LanternaB17, author = {Dario Lanterna and Antonio Barili}, title = {Forensic analysis of deduplicated file systems}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S99--S106}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.008}, doi = {10.1016/J.DIIN.2017.01.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LanternaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LapsoPO17, author = {Joshua A. Lapso and Gilbert L. Peterson and James S. Okolica}, title = {Whitelisting system state in windows forensic memory visualizations}, journal = {Digit. Investig.}, volume = {20}, pages = {2--15}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2016.12.002}, doi = {10.1016/J.DIIN.2016.12.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LapsoPO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MillerGCDLP17, author = {Cody Miller and Dae Glendowne and Henry Cook and Thomas DeMarcus and Chris Lanclos and Patrick Pape}, title = {Insights gained from constructing a large scale dynamic analysis platform}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S48--S56}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.007}, doi = {10.1016/J.DIIN.2017.06.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MillerGCDLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nikkel17, author = {Bruce J. Nikkel}, title = {Registration Data Access Protocol {(RDAP)} for digital forensic investigators}, journal = {Digit. Investig.}, volume = {22}, pages = {133--141}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.07.002}, doi = {10.1016/J.DIIN.2017.07.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Nikkel17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PridgenGW17, author = {Adam Pridgen and Simson L. Garfinkel and Dan S. Wallach}, title = {Picking up the trash: Exploiting generational {GC} for memory analysis}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S20--S28}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.002}, doi = {10.1016/J.DIIN.2017.01.002}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PridgenGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SaleemPB17, author = {Shahzad Saleem and Oliver Popov and Ibrahim M. Baggili}, title = {Comments on "A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis" [Digit Investig 16S, {S55-S64]}}, journal = {Digit. Investig.}, volume = {21}, pages = {88}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.003}, doi = {10.1016/J.DIIN.2017.02.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SaleemPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ScanlonDL17, author = {Mark Scanlon and Xiaoyu Du and David Lillis}, title = {EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S29--S36}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.010}, doi = {10.1016/J.DIIN.2017.01.010}, timestamp = {Mon, 09 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ScanlonDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchatzC17, author = {Bradley L. Schatz and Michael Cohen}, title = {Advances in volatile memory forensics}, journal = {Digit. Investig.}, volume = {20}, pages = {1}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.008}, doi = {10.1016/J.DIIN.2017.02.008}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchatzC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schramp17, author = {R. Schramp}, title = {Live transportation and {RAM} acquisition proficiency test}, journal = {Digit. Investig.}, volume = {20}, pages = {44--53}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.006}, doi = {10.1016/J.DIIN.2017.02.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Schramp17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SenthivelAR17, author = {Saranyan Senthivel and Irfan Ahmed and Vassil Roussev}, title = {{SCADA} network forensics of the {PCCC} protocol}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S57--S65}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.012}, doi = {10.1016/J.DIIN.2017.06.012}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SenthivelAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShawPS17, author = {Eric Shaw and Maria Payri and Ilene Shaw}, title = {The use of communicated negative sentiment and victimization for locating authors at-risk for, or having committed, insider actions}, journal = {Digit. Investig.}, volume = {22}, pages = {142--146}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.014}, doi = {10.1016/J.DIIN.2017.06.014}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShawPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShiLLS17, author = {Chao Shi and Ngai{-}Fong Law and Frank Hung{-}Fat Leung and Wan{-}Chi Siu}, title = {A local variance based approach to alleviate the scene content interference for source camera identification}, journal = {Digit. Investig.}, volume = {22}, pages = {74--87}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.07.005}, doi = {10.1016/J.DIIN.2017.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShiLLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShiXJQYZXC17, author = {Kai Shi and Ming Xu and Haoxia Jin and Tong Qiao and Xue Yang and Ning Zheng and Jian Xu and Kim{-}Kwang Raymond Choo}, title = {A novel file carving algorithm for National Marine Electronics Association {(NMEA)} logs in {GPS} forensics}, journal = {Digit. Investig.}, volume = {23}, pages = {11--21}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.08.004}, doi = {10.1016/J.DIIN.2017.08.004}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShiXJQYZXC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SinghA17, author = {Raahat Devender Singh and Naveen Aggarwal}, title = {Detection of upscale-crop and splicing for digital video authentication}, journal = {Digit. Investig.}, volume = {21}, pages = {31--52}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.001}, doi = {10.1016/J.DIIN.2017.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SinghA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Spiekermann0E17, author = {Daniel Spiekermann and J{\"{o}}rg Keller and Tobias Eggendorfer}, title = {Network forensic investigation in OpenFlow networks with ForCon}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S66--S74}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.007}, doi = {10.1016/J.DIIN.2017.01.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Spiekermann0E17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StellyR17, author = {Christopher Stelly and Vassil Roussev}, title = {{SCARF:} {A} container-based approach to cloud-scale digital forensic processing}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S39--S47}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.008}, doi = {10.1016/J.DIIN.2017.06.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StellyR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StudiawanPS17, author = {Hudan Studiawan and Christian Payne and Ferdous Sohel}, title = {Graph clustering and anomaly detection of access control log for forensic purposes}, journal = {Digit. Investig.}, volume = {21}, pages = {76--87}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.05.001}, doi = {10.1016/J.DIIN.2017.05.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/StudiawanPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SylveMR17, author = {Joe Sylve and Lodovico Marziale and Golden G. Richard III}, title = {Modern windows hibernation file analysis}, journal = {Digit. Investig.}, volume = {20}, pages = {16--22}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2016.12.003}, doi = {10.1016/J.DIIN.2016.12.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SylveMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRGHFBG17, author = {James Wagner and Alexander Rasin and Boris Glavic and Karen Heart and Jacob D. Furst and Lucas Bressan and Jonathan Grier}, title = {Carving database storage to detect and trace security breaches}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S127--S136}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.006}, doi = {10.1016/J.DIIN.2017.06.006}, timestamp = {Thu, 14 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRGHFBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Wang17, author = {Kai Wang}, title = {A simple and effective image-statistics-based approach to detecting recaptured images from {LCD} screens}, journal = {Digit. Investig.}, volume = {23}, pages = {75--87}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.10.001}, doi = {10.1016/J.DIIN.2017.10.001}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Wang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WuZWXD17, author = {Songyang Wu and Yong Zhang and Xupeng Wang and Xiong Xiong and Lin Du}, title = {Forensic analysis of WeChat on Android smartphones}, journal = {Digit. Investig.}, volume = {21}, pages = {3--10}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2016.11.002}, doi = {10.1016/J.DIIN.2016.11.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WuZWXD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WustTRD17, author = {Karl W{\"{u}}st and Petar Tsankov and Sasa Radomirovic and Mohammad Torabi Dashti}, title = {Force Open: Lightweight black box file repair}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S75--S82}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.009}, doi = {10.1016/J.DIIN.2017.01.009}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WustTRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YangCKBSX17, author = {Seung Jei Yang and Jung Ho Choi and Ki Bom Kim and Rohit Bhatia and Brendan Saltaformaggio and Dongyan Xu}, title = {Live acquisition of main memory data from Android smartphones and smartwatches}, journal = {Digit. Investig.}, volume = {23}, pages = {50--62}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.09.003}, doi = {10.1016/J.DIIN.2017.09.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/YangCKBSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Zandwijk17, author = {Jan Peter van Zandwijk}, title = {Bit-errors as a source of forensic information in NAND-flash memory}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S12--S19}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.005}, doi = {10.1016/J.DIIN.2017.01.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Zandwijk17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Zheng0LT17, author = {Lilei Zheng and Ying Zhang and Chien Eao Lee and Vrizlynn L. L. Thing}, title = {Time-of-recording estimation for audio recordings}, journal = {Digit. Investig.}, volume = {22 Supplement}, pages = {S115--S126}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.06.001}, doi = {10.1016/J.DIIN.2017.06.001}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Zheng0LT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZoubekS17, author = {Christian Zoubek and Konstantin Sack}, title = {Selective deletion of non-relevant data}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S92--S98}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.006}, doi = {10.1016/J.DIIN.2017.01.006}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZoubekS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/0004GF16, author = {Johannes Bauer and Michael Gruhn and Felix C. Freiling}, title = {Lest we forget: Cold-boot attacks on scrambled {DDR3} memory}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S65--S74}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.009}, doi = {10.1016/J.DIIN.2016.01.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/0004GF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AkshathaKARS16, author = {K. R. Akshatha and A. Kotegar Karunakar and H. Anitha and U. Raghavendra and Dinesh Shetty}, title = {Digital camera identification using {PRNU:} {A} feature based approach}, journal = {Digit. Investig.}, volume = {19}, pages = {69--77}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.10.002}, doi = {10.1016/J.DIIN.2016.10.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AkshathaKARS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Alrabaee0D16, author = {Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S11--S22}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.002}, doi = {10.1016/J.DIIN.2016.04.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AnglanoCG16, author = {Cosimo Anglano and Massimo Canonico and Marco Guazzone}, title = {Forensic analysis of the ChatSecure instant messaging application on android smartphones}, journal = {Digit. Investig.}, volume = {19}, pages = {44--59}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.10.001}, doi = {10.1016/J.DIIN.2016.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AnglanoCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BadenhopRMM16, author = {Christopher W. Badenhop and Benjamin W. P. Ramsey and Barry E. Mullins and Logan O. Mailloux}, title = {Extraction and analysis of non-volatile memory of the {ZW0301} module, a Z-Wave transceiver}, journal = {Digit. Investig.}, volume = {17}, pages = {14--27}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.02.002}, doi = {10.1016/J.DIIN.2016.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BadenhopRMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BagiwaWIKC16, author = {Mustapha Aminu Bagiwa and Ainuddin Wahid Abdul Wahab and Mohd Yamani Idna Bin Idris and Suleman Khan and Kim{-}Kwang Raymond Choo}, title = {Chroma key background detection for digital video using statistical correlation of blurring artifact}, journal = {Digit. Investig.}, volume = {19}, pages = {29--43}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.09.001}, doi = {10.1016/J.DIIN.2016.09.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BagiwaWIKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BiedermannV16, author = {Alex Biedermann and Jo{\"{e}}lle Vuille}, title = {Digital evidence, 'absence' of data and ambiguous patterns of reasoning}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S86--S95}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.011}, doi = {10.1016/J.DIIN.2016.01.011}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BiedermannV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseR16, author = {Andrew Case and Golden G. Richard III}, title = {Detecting objective-C malware through memory forensics}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S3--S10}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.017}, doi = {10.1016/J.DIIN.2016.04.017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey16, author = {Eoghan Casey}, title = {Editorial from my iPhone}, journal = {Digit. Investig.}, volume = {16}, pages = {A1--A2}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.03.001}, doi = {10.1016/J.DIIN.2016.03.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey16a, author = {Eoghan Casey}, title = {Editorial - {A} sea change in digital forensics and incident response}, journal = {Digit. Investig.}, volume = {17}, pages = {A1--A2}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.05.002}, doi = {10.1016/J.DIIN.2016.05.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey16b, author = {Eoghan Casey}, title = {Focused digital evidence analysis and forensic distinguishers}, journal = {Digit. Investig.}, volume = {18}, pages = {A1--A3}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.08.004}, doi = {10.1016/J.DIIN.2016.08.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey16c, author = {Eoghan Casey}, title = {Differentiating the phases of digital investigations}, journal = {Digit. Investig.}, volume = {19}, pages = {A1--A3}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.11.001}, doi = {10.1016/J.DIIN.2016.11.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChooHIM16, author = {Kim{-}Kwang Raymond Choo and Martin Herman and Michaela Iorga and Ben Martini}, title = {Cloud forensics: State-of-the-art and future directions}, journal = {Digit. Investig.}, volume = {18}, pages = {77--78}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.08.003}, doi = {10.1016/J.DIIN.2016.08.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChooHIM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ConlanBB16, author = {Kevin J. Conlan and Ibrahim M. Baggili and Frank Breitinger}, title = {Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S66--S75}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.006}, doi = {10.1016/J.DIIN.2016.04.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ConlanBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EbrahimiSO16, author = {Mohammad Reza Ebrahimi and Ching Y. Suen and Olga Ormandjieva}, title = {Detecting predatory conversations in social media by deep Convolutional Neural Networks}, journal = {Digit. Investig.}, volume = {18}, pages = {33--49}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.07.001}, doi = {10.1016/J.DIIN.2016.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EbrahimiSO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ElstnerR16, author = {Jens Elstner and Mark Roeloffs}, title = {Forensic analysis of newer TomTom devices}, journal = {Digit. Investig.}, volume = {16}, pages = {29--37}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.016}, doi = {10.1016/J.DIIN.2016.01.016}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ElstnerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FahdiCLF16, author = {M. Al Fahdi and Nathan L. Clarke and Fudong Li and Steven M. Furnell}, title = {A suspect-oriented intelligent and automated computer forensic analysis}, journal = {Digit. Investig.}, volume = {18}, pages = {65--76}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.08.001}, doi = {10.1016/J.DIIN.2016.08.001}, timestamp = {Fri, 19 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FahdiCLF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrestyGLI16, author = {David W. Gresty and Diane Gan and George Loukas and Constantinos Ierotheou}, title = {Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S124--S133}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.015}, doi = {10.1016/J.DIIN.2016.01.015}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrestyGLI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GruhnF16, author = {Michael Gruhn and Felix C. Freiling}, title = {Evaluating atomicity, and integrity of correct memory acquisition methods}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S1--S10}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.003}, doi = {10.1016/J.DIIN.2016.01.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GruhnF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuidoBG16, author = {Mark D. Guido and Jonathan Buttner and Justin Grover}, title = {Rapid differential forensic imaging of mobile devices}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S46--S54}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.012}, doi = {10.1016/J.DIIN.2016.04.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GuidoBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Halvani0P16, author = {Oren Halvani and Christian Winter and Anika Pflug}, title = {Authorship verification for different languages, genres and topics}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S33--S43}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.006}, doi = {10.1016/J.DIIN.2016.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Halvani0P16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HarichandranWBB16, author = {Vikram S. Harichandran and Daniel Walnycky and Ibrahim M. Baggili and Frank Breitinger}, title = {CuFA: {A} more formal definition for digital forensic artifacts}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S125--S137}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.005}, doi = {10.1016/J.DIIN.2016.04.005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HarichandranWBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannSLN16, author = {Thibaut Heckmann and Thomas R. Souvignet and S. Lepeer and David Naccache}, title = {Low-temperature low-cost 58 Bismuth - 42 Tin alloy forensic chip re-balling and re-soldering}, journal = {Digit. Investig.}, volume = {19}, pages = {60--68}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.10.003}, doi = {10.1016/J.DIIN.2016.10.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannSLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HitchcockLS16, author = {Ben Hitchcock and Nhien{-}An Le{-}Khac and Mark Scanlon}, title = {Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S75--S85}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.010}, doi = {10.1016/J.DIIN.2016.01.010}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HitchcockLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman16, author = {Graeme Horsman}, title = {Unmanned aerial vehicles: {A} preliminary analysis of forensic challenges}, journal = {Digit. Investig.}, volume = {16}, pages = {1--11}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2015.11.002}, doi = {10.1016/J.DIIN.2015.11.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JamesG16, author = {Joshua I. James and Pavel Gladyshev}, title = {A survey of mutual legal assistance involving digital evidence}, journal = {Digit. Investig.}, volume = {18}, pages = {23--32}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.06.004}, doi = {10.1016/J.DIIN.2016.06.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JamesG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarbabDM16, author = {ElMouatez Billah Karbab and Mourad Debbabi and Djedjiga Mouheb}, title = {Fingerprinting Android packaging: Generating DNAs for malware detection}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S33--S45}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.013}, doi = {10.1016/J.DIIN.2016.04.013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarbabDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimPL16, author = {Jeonghyeon Kim and Aran Park and Sangjin Lee}, title = {Recovery method of deleted records and tables from {ESE} database}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S118--S124}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.003}, doi = {10.1016/J.DIIN.2016.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KovenBDM16, author = {Jay Koven and Enrico Bertini and R. Luke DuBois and Nasir D. Memon}, title = {InVEST: Intelligent visual email search and triage}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S138--S148}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.008}, doi = {10.1016/J.DIIN.2016.04.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KovenBDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeHKN16, author = {Kyoungho Lee and Hyunuk Hwang and Kibom Kim and BongNam Noh}, title = {Robust bootstrapping memory analysis against anti-forensics}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S23--S32}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.009}, doi = {10.1016/J.DIIN.2016.04.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LeeHKN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lees16, author = {Christopher Lees}, title = {{GVFS} metadata: Shellbags for Linux}, journal = {Digit. Investig.}, volume = {16}, pages = {12--18}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2015.11.001}, doi = {10.1016/J.DIIN.2015.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Lees16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeimichHB16, author = {Petra Leimich and Josh Harrison and William J. Buchanan}, title = {A {RAM} triage methodology for Hadoop {HDFS} forensics}, journal = {Digit. Investig.}, volume = {18}, pages = {96--109}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.07.003}, doi = {10.1016/J.DIIN.2016.07.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LeimichHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MabeyD0A16, author = {Mike Mabey and Adam Doup{\'{e}} and Ziming Zhao and Gail{-}Joon Ahn}, title = {dbling: Identifying extensions installed on encrypted web thin clients}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S55--S65}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.007}, doi = {10.1016/J.DIIN.2016.04.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MabeyD0A16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McGrath16, author = {Niall McGrath}, title = {Forensically extracting file encrypted contents on {OS} {X} using {HFS+} journal file}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S157}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.014}, doi = {10.1016/J.DIIN.2016.04.014}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McGrath16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MeffertBB16, author = {Christopher Meffert and Ibrahim M. Baggili and Frank Breitinger}, title = {Deleting collected digital evidence by exploiting a widely adopted hardware write blocker}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S87--S96}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.004}, doi = {10.1016/J.DIIN.2016.04.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MeffertBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MutawaBFM16, author = {Noora Al Mutawa and Joanne Bryce and Virginia N. L. Franqueira and Andrew Marrington}, title = {Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S96--S103}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.012}, doi = {10.1016/J.DIIN.2016.01.012}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MutawaBFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NeunerSW16, author = {Sebastian Neuner and Martin Schmiedecker and Edgar R. Weippl}, title = {\emph{PeekaTorrent}: Leveraging {P2P} hash values for digital forensics}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S149--S156}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.011}, doi = {10.1016/J.DIIN.2016.04.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NeunerSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NeunerVSB0W16, author = {Sebastian Neuner and Artemios G. Voyiatzis and Martin Schmiedecker and Stefan Brunthaler and Stefan Katzenbeisser and Edgar R. Weippl}, title = {Time is on my side: Steganography in filesystem metadata}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S76--S86}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.010}, doi = {10.1016/J.DIIN.2016.04.010}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NeunerVSB0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nikkel16, author = {Bruce J. Nikkel}, title = {{NVM} express drives and digital forensics}, journal = {Digit. Investig.}, volume = {16}, pages = {38--45}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.001}, doi = {10.1016/J.DIIN.2016.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Nikkel16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OvensM16, author = {Kenneth M. Ovens and Gordon Morison}, title = {Forensic analysis of Kik messenger on iOS devices}, journal = {Digit. Investig.}, volume = {17}, pages = {40--52}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.001}, doi = {10.1016/J.DIIN.2016.04.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OvensM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PandeySS16, author = {Ramesh Chand Pandey and Sanjay Kumar Singh and Kaushal K. Shukla}, title = {Passive forensics in image and video using noise features: {A} review}, journal = {Digit. Investig.}, volume = {19}, pages = {1--28}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.08.002}, doi = {10.1016/J.DIIN.2016.08.002}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PandeySS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PeersmanSRBF16, author = {Claudia Peersman and Christian Schulze and Awais Rashid and Margaret Brennan and Carl Fischer}, title = {iCOP: Live forensics to reveal previously unknown criminal media on {P2P} networks}, journal = {Digit. Investig.}, volume = {18}, pages = {50--64}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.07.002}, doi = {10.1016/J.DIIN.2016.07.002}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PeersmanSRBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevABMS16, author = {Vassil Roussev and Irfan Ahmed and Andres Barreto and Shane McCulley and Vivek Shanmughan}, title = {Cloud forensics-Tool development studies {\&} future outlook}, journal = {Digit. Investig.}, volume = {18}, pages = {79--95}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.05.001}, doi = {10.1016/J.DIIN.2016.05.001}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevABMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevM16, author = {Vassil Roussev and Shane McCulley}, title = {Forensic analysis of cloud-native artifacts}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S104--S113}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.013}, doi = {10.1016/J.DIIN.2016.01.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SaleemPB16, author = {Shahzad Saleem and Oliver Popov and Ibrahim M. Baggili}, title = {A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S55--S64}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.008}, doi = {10.1016/J.DIIN.2016.01.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SaleemPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SinghS16, author = {Bhupendra Singh and Upasna Singh}, title = {A forensic insight into Windows 10 Jump Lists}, journal = {Digit. Investig.}, volume = {17}, pages = {1--13}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.02.001}, doi = {10.1016/J.DIIN.2016.02.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SinghS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SitaraM16, author = {K. Sitara and Babu M. Mehtre}, title = {Digital video tampering detection: An overview of passive techniques}, journal = {Digit. Investig.}, volume = {18}, pages = {8--22}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.06.003}, doi = {10.1016/J.DIIN.2016.06.003}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SitaraM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SocalaC16, author = {Arkadiusz Socala and Michael Cohen}, title = {Automatic profile generation for live Linux Memory analysis}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S11--S24}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.004}, doi = {10.1016/J.DIIN.2016.01.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SocalaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SongLLL16, author = {Ji Eun Song and Kiryong Lee and Wan Yeon Lee and Heejo Lee}, title = {Integrity verification of the ordered data structures in manipulated video content}, journal = {Digit. Investig.}, volume = {18}, pages = {1--7}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.06.001}, doi = {10.1016/J.DIIN.2016.06.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SongLLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SylveMR16, author = {Joe Sylve and Lodovico Marziale and Golden G. Richard III}, title = {Pool tag quick scanning for windows memory analysis}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S25--S32}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.005}, doi = {10.1016/J.DIIN.2016.01.005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SylveMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TangFCYXFL016, author = {Yanbin Tang and Junbin Fang and Kam{-}Pui Chow and Siu{-}Ming Yiu and Jun Xu and Bo Feng and Qiong Li and Qi Han}, title = {Recovery of heavily fragmented {JPEG} files}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S108--S117}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.016}, doi = {10.1016/J.DIIN.2016.04.016}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TangFCYXFL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TaubmannFDR16, author = {Benjamin Taubmann and Christoph Fr{\"{a}}drich and Dominik Dusold and Hans P. Reiser}, title = {TLSkex: Harnessing virtual machine introspection for decrypting {TLS} communication}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S114--S123}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.014}, doi = {10.1016/J.DIIN.2016.01.014}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TaubmannFDR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRG16, author = {James Wagner and Alexander Rasin and Jonathan Grier}, title = {Database image content explorer: Carving data that does not officially exist}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S97--S107}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.015}, doi = {10.1016/J.DIIN.2016.04.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YoonJKL16, author = {Jongseong Yoon and Doowon Jeong and Chulhoon Kang and Sangjin Lee}, title = {Forensic investigation framework for the document store NoSQL {DBMS:} MongoDB as a case study}, journal = {Digit. Investig.}, volume = {17}, pages = {53--65}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.03.003}, doi = {10.1016/J.DIIN.2016.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/YoonJKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhangBB16, author = {Xiaolu Zhang and Frank Breitinger and Ibrahim M. Baggili}, title = {Rapid Android Parser for Investigating {DEX} files {(RAPID)}}, journal = {Digit. Investig.}, volume = {17}, pages = {28--39}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.03.002}, doi = {10.1016/J.DIIN.2016.03.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZhangBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhuTZLZ16, author = {Ruijin Zhu and Yu{-}an Tan and Quan{-}Xin Zhang and Yuanzhang Li and Jun Zheng}, title = {Determining image base of firmware for {ARM} devices by matching literal pools}, journal = {Digit. Investig.}, volume = {16}, pages = {19--28}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.002}, doi = {10.1016/J.DIIN.2016.01.002}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZhuTZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZoubekSD16, author = {Christian Zoubek and Sabine Seufert and Andreas Dewald}, title = {Generic {RAID} reassembly using block-level entropy}, journal = {Digit. Investig.}, volume = {16 Supplement}, pages = {S44--S54}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.01.007}, doi = {10.1016/J.DIIN.2016.01.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZoubekSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AdedayoO15, author = {Oluwasola Mary Adedayo and Martin S. Olivier}, title = {Ideal log setting for database forensics reconstruction}, journal = {Digit. Investig.}, volume = {12}, pages = {27--40}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2014.12.002}, doi = {10.1016/J.DIIN.2014.12.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AdedayoO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-RowailyAHA15, author = {Khalid Al{-}Rowaily and Muhammad Abulaish and Nur Al Hasan Haldar and Majed A. AlRubaian}, title = {BiSAL - {A} bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security}, journal = {Digit. Investig.}, volume = {14}, pages = {53--62}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.006}, doi = {10.1016/J.DIIN.2015.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-RowailyAHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSWD15, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi}, title = {{SIGMA:} {A} Semantic Integrated Graph Matching Approach for identifying reused functions in binary code}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S61--S71}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.011}, doi = {10.1016/J.DIIN.2015.01.011}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AmannJ15, author = {Philipp Amann and Joshua I. James}, title = {Designing robustness and resilience in digital investigation laboratories}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S111--S120}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.015}, doi = {10.1016/J.DIIN.2015.01.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AmannJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArmknechtD15, author = {Frederik Armknecht and Andreas Dewald}, title = {Privacy-preserving email forensics}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S127--S136}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.003}, doi = {10.1016/J.DIIN.2015.05.003}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ArmknechtD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BalzarottiPV15, author = {Davide Balzarotti and Roberto Di Pietro and Antonio Villani}, title = {The impact of GPU-assisted malware on memory forensics: {A} case study}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S16--S24}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.010}, doi = {10.1016/J.DIIN.2015.05.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BalzarottiPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeekEBUBS15, author = {Harm M. A. van Beek and E. J. van Eijk and Ruud B. van Baar and M. Ugen and J. N. C. Bodde and A. J. Siemelink}, title = {Digital forensics as a service: Game on}, journal = {Digit. Investig.}, volume = {15}, pages = {20--38}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.004}, doi = {10.1016/J.DIIN.2015.07.004}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BeekEBUBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BoukhtoutaMDAIB15, author = {Amine Boukhtouta and Djedjiga Mouheb and Mourad Debbabi and Omar Alfandi and Farkhund Iqbal and May El Barachi}, title = {Graph-theoretic characterization of cyber-threat infrastructures}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S3--S15}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.002}, doi = {10.1016/J.DIIN.2015.05.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BoukhtoutaMDAIB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BoztasRR15, author = {Abdul Boztas and A. R. J. Riethoven and Mark Roeloffs}, title = {Smart {TV} forensics: Digital traces on televisions}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S72--S80}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.012}, doi = {10.1016/J.DIIN.2015.01.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BoztasRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BradyOK15, author = {Owen Brady and Richard E. Overill and Jeroen Keppens}, title = {{DESO:} Addressing volume and variety in large-scale criminal cases}, journal = {Digit. Investig.}, volume = {15}, pages = {72--82}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.10.002}, doi = {10.1016/J.DIIN.2015.10.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BradyOK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseR15, author = {Andrew Case and Golden G. Richard III}, title = {Advancing Mac {OS} {X} rootkit detection}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S25--S33}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.005}, doi = {10.1016/J.DIIN.2015.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey15, author = {Eoghan Casey}, title = {Smart home forensics}, journal = {Digit. Investig.}, volume = {13}, pages = {A1--A2}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.017}, doi = {10.1016/J.DIIN.2015.05.017}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey15a, author = {Eoghan Casey}, title = {Strengthening forensic science}, journal = {Digit. Investig.}, volume = {12}, pages = {A1--A2}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.03.001}, doi = {10.1016/J.DIIN.2015.03.001}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey15b, author = {Eoghan Casey}, title = {The growing importance of data science in digital investigations}, journal = {Digit. Investig.}, volume = {14}, pages = {1}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.09.004}, doi = {10.1016/J.DIIN.2015.09.004}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Casey15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyBB15, author = {Eoghan Casey and Greg Back and Sean Barnum}, title = {Leveraging CybOX{\texttrademark} to standardize representation and exchange of digital forensic information}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S102--S110}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.014}, doi = {10.1016/J.DIIN.2015.01.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CaseyBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChabotBNK15, author = {Yoan Chabot and Aur{\'{e}}lie Bertaux and Christophe Nicolle and M. Tahar Kechadi}, title = {An ontology-based approach for the reconstruction and analysis of digital incidents timelines}, journal = {Digit. Investig.}, volume = {15}, pages = {83--100}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.005}, doi = {10.1016/J.DIIN.2015.07.005}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChabotBNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Clemens15, author = {John Clemens}, title = {Automatic classification of object code using machine learning}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S156--S162}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.007}, doi = {10.1016/J.DIIN.2015.05.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Clemens15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Cohen15, author = {Michael I. Cohen}, title = {Characterization of the windows kernel version variability for accurate memory analysis}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S38--S49}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.009}, doi = {10.1016/J.DIIN.2015.01.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Cohen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CruzMC15, author = {Fl{\'{a}}vio Cruz and Andreas Moser and Michael I. Cohen}, title = {A scalable file based data store for forensic analysis}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S90--S101}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.016}, doi = {10.1016/J.DIIN.2015.01.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CruzMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DalinsWC15, author = {Janis Dalins and Campbell Wilson and Mark James Carman}, title = {Monte-Carlo Filesystem Search - {A} crawl strategy for digital forensics}, journal = {Digit. Investig.}, volume = {13}, pages = {58--71}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.04.002}, doi = {10.1016/J.DIIN.2015.04.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DalinsWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DaviesRXS15, author = {Matthew Davies and Huw Read and Konstantinos Xynos and Iain Sutherland}, title = {Forensic analysis of a Sony PlayStation 4: {A} first look}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S81--S89}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.013}, doi = {10.1016/J.DIIN.2015.01.013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DaviesRXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DietrichA15, author = {Dianne Dietrich and Frank Adelstein}, title = {Archival science, digital forensics, and new media art}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S137--S145}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.004}, doi = {10.1016/J.DIIN.2015.05.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DietrichA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DinhAFMD15, author = {Son Dinh and Taher Azeb and Francis Fortin and Djedjiga Mouheb and Mourad Debbabi}, title = {Spam campaign detection, analysis, and investigation}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S12--S21}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.006}, doi = {10.1016/J.DIIN.2015.01.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DinhAFMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DuijnS15, author = {P. A. C. Duijn and Peter M. A. Sloot}, title = {From data to disruption}, journal = {Digit. Investig.}, volume = {15}, pages = {39--45}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.09.005}, doi = {10.1016/J.DIIN.2015.09.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DuijnS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FarhadiFFCPD15, author = {Mohammad Reza Farhadi and Benjamin C. M. Fung and Yin Bun Fung and Philippe Charland and Stere Preda and Mourad Debbabi}, title = {Scalable code clone search for malware analysis}, journal = {Digit. Investig.}, volume = {15}, pages = {46--60}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.06.001}, doi = {10.1016/J.DIIN.2015.06.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FarhadiFFCPD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FeizollahASW15, author = {Ali Feizollah and Nor Badrul Anuar and Rosli Salleh and Ainuddin Wahid Abdul Wahab}, title = {A review on feature selection in mobile malware detection}, journal = {Digit. Investig.}, volume = {13}, pages = {22--37}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.02.001}, doi = {10.1016/J.DIIN.2015.02.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FeizollahASW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelM15, author = {Simson L. Garfinkel and Michael McCarrin}, title = {Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S95--S105}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.001}, doi = {10.1016/J.DIIN.2015.05.001}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GarfinkelM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GeradtsF15, author = {Zeno J. M. H. Geradts and Katrin Franke}, title = {Editorial for big data issue}, journal = {Digit. Investig.}, volume = {15}, pages = {18--19}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.10.003}, doi = {10.1016/J.DIIN.2015.10.003}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GeradtsF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrierR15, author = {Jonathan Grier and Golden G. Richard III}, title = {Rapid forensic imaging of large disks with sifting collectors}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S34--S44}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.006}, doi = {10.1016/J.DIIN.2015.05.006}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrierR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GugelmannGAL15, author = {David Gugelmann and Fabian Gasser and Bernhard Ager and Vincent Lenders}, title = {Hviz: {HTTP(S)} traffic aggregation and visualization for network forensics}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S1--S11}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.005}, doi = {10.1016/J.DIIN.2015.01.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GugelmannGAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanC15, author = {Graeme Horsman and Lynne R. Conniss}, title = {Investigating evidence of mobile phone usage by drivers in road traffic accidents}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S30--S37}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.008}, doi = {10.1016/J.DIIN.2015.01.008}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HorsmanC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HorsmanC15a, author = {Graeme Horsman and Lynne R. Conniss}, title = {An investigation of anonymous and spoof {SMS} resources used for the purposes of cyberstalking}, journal = {Digit. Investig.}, volume = {13}, pages = {80--93}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.04.001}, doi = {10.1016/J.DIIN.2015.04.001}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HorsmanC15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JangKWMK15, author = {Jae{-}wook Jang and Hyunjae Kang and Jiyoung Woo and Aziz Mohaisen and Huy Kang Kim}, title = {Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information}, journal = {Digit. Investig.}, volume = {14}, pages = {17--35}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.06.002}, doi = {10.1016/J.DIIN.2015.06.002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/JangKWMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KabakusDC15, author = {Abdullah Talha Kabakus and Ibrahim Alper Dogru and Aydin {\c{C}}etin}, title = {{APK} Auditor: Permission-based Android malware detection system}, journal = {Digit. Investig.}, volume = {13}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.001}, doi = {10.1016/J.DIIN.2015.01.001}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KabakusDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarakucukD15, author = {Ahmet Karak{\"{u}}{\c{c}}{\"{u}}k and Ahmet Emir Dirik}, title = {Adaptive photo-response non-uniformity noise removal against image source attribution}, journal = {Digit. Investig.}, volume = {12}, pages = {66--76}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.017}, doi = {10.1016/J.DIIN.2015.01.017}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KarakucukD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KarpisekBB15, author = {Filip Karp{\'{\i}}sek and Ibrahim M. Baggili and Frank Breitinger}, title = {WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages}, journal = {Digit. Investig.}, volume = {15}, pages = {110--118}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.09.002}, doi = {10.1016/J.DIIN.2015.09.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KarpisekBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Khatri15, author = {Yogesh Khatri}, title = {Forensic implications of System Resource Usage Monitor {(SRUM)} data in Windows 8}, journal = {Digit. Investig.}, volume = {12}, pages = {53--65}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.002}, doi = {10.1016/J.DIIN.2015.01.002}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Khatri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LarbanetLD15, author = {Adrien Larbanet and Jonas Lerebours and J. P. David}, title = {Detecting very large sets of referenced files at 40/100 GbE, especially {MP4} files}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S85--S94}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.011}, doi = {10.1016/J.DIIN.2015.05.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LarbanetLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeKL15, author = {Wan Yeon Lee and Hyuckmin Kwon and Heejo Lee}, title = {Comments on the Linux {FAT32} allocator and file creation order reconstruction [Digit Investig 11(4), 224-233]}, journal = {Digit. Investig.}, volume = {15}, pages = {119--123}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.09.003}, doi = {10.1016/J.DIIN.2015.09.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LeeKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lim15, author = {Sung Ryel Lim}, title = {Identifying management factors for digital incident responses on Machine-to-Machine services}, journal = {Digit. Investig.}, volume = {14}, pages = {46--52}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.003}, doi = {10.1016/J.DIIN.2015.07.003}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Lim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LuLL15, author = {Jicang Lu and Fenlin Liu and Xiangyang Luo}, title = {A study on {JPEG} steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix}, journal = {Digit. Investig.}, volume = {12}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2014.12.001}, doi = {10.1016/J.DIIN.2014.12.001}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LuLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MagalingamDR15, author = {Pritheega Magalingam and Stephen Davis and Asha Rao}, title = {Using shortest path to discover criminal community}, journal = {Digit. Investig.}, volume = {15}, pages = {1--17}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.08.002}, doi = {10.1016/J.DIIN.2015.08.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MagalingamDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ManteleroV15, author = {Alessandro Mantelero and Giuseppe Vaciago}, title = {Data protection in a big data society. Ideas for a future regulation}, journal = {Digit. Investig.}, volume = {15}, pages = {104--109}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.09.006}, doi = {10.1016/J.DIIN.2015.09.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ManteleroV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MendozaKMCV15, author = {Abner Mendoza and Avinash Kumar and David Midcap and Hyuk Cho and Cihan Varol}, title = {BrowStEx: {A} tool to aggregate browser storage artifacts for forensic analysis}, journal = {Digit. Investig.}, volume = {14}, pages = {63--75}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.08.001}, doi = {10.1016/J.DIIN.2015.08.001}, timestamp = {Fri, 27 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MendozaKMCV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MunozUAS15, author = {Alfonso Mu{\~{n}}oz and Manuel Urue{\~{n}}a and Raquel Aparicio and Gerson Rodr{\'{\i}}guez de los Santos}, title = {Digital Wiretap Warrant: Improving the security of {ETSI} Lawful Interception}, journal = {Digit. Investig.}, volume = {14}, pages = {1--16}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.04.005}, doi = {10.1016/J.DIIN.2015.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MunozUAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PenroseBM15, author = {Philip Penrose and William J. Buchanan and Richard Macfarlane}, title = {Fast contraband detection in large capacity disk drives}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S22--S29}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.007}, doi = {10.1016/J.DIIN.2015.01.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PenroseBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PichanLS15, author = {Ameer Pichan and Mihai M. Lazarescu and Sieteng Soh}, title = {Cloud forensics: Technical challenges, solutions and comparative analysis}, journal = {Digit. Investig.}, volume = {13}, pages = {38--57}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.03.002}, doi = {10.1016/J.DIIN.2015.03.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PichanLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RahimianSAWD15, author = {Ashkan Rahimian and Paria Shirani and Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {BinComp: {A} stratified approach to compiler provenance Attribution}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S146--S155}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.015}, doi = {10.1016/J.DIIN.2015.05.015}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schatz15, author = {Bradley L. Schatz}, title = {Wirespeed: Extending the {AFF4} forensic container format for scalable acquisition and live analysis}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S45--S54}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.016}, doi = {10.1016/J.DIIN.2015.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schatz15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchmidIF15, author = {Michael R. Schmid and Farkhund Iqbal and Benjamin C. M. Fung}, title = {E-mail authorship attribution using customized associative classification}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S116--S126}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.012}, doi = {10.1016/J.DIIN.2015.05.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SchmidIF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schweinsberg15, author = {Elizabeth Schweinsberg}, title = {Fifteenth Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S1--S2}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.001}, doi = {10.1016/J.DIIN.2015.07.001}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Schweinsberg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Seebruck15, author = {Ryan Seebruck}, title = {A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model}, journal = {Digit. Investig.}, volume = {14}, pages = {36--45}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.07.002}, doi = {10.1016/J.DIIN.2015.07.002}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Seebruck15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Seigfried-Spellar15, author = {Kathryn C. Seigfried{-}Spellar}, title = {Erratum to "Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary findings" [Digit. Invest 11 (4), 252-260]}, journal = {Digit. Investig.}, volume = {12}, pages = {88}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.004}, doi = {10.1016/J.DIIN.2015.01.004}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Seigfried-Spellar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SharifnyaA15, author = {Reza Sharifnya and Mahdi Abadi}, title = {DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in {DNS} traffic}, journal = {Digit. Investig.}, volume = {12}, pages = {15--26}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2014.11.001}, doi = {10.1016/J.DIIN.2014.11.001}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/SharifnyaA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SloanH15, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Steganalysis of OpenPuff through atomic concatenation of {MP4} flags}, journal = {Digit. Investig.}, volume = {13}, pages = {15--21}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.02.002}, doi = {10.1016/J.DIIN.2015.02.002}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SloanH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sommer15, author = {Peter Sommer}, title = {{DI} commentary: Big Data and privacy}, journal = {Digit. Investig.}, volume = {15}, pages = {101--103}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.10.001}, doi = {10.1016/J.DIIN.2015.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sommer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StuttgenVD15, author = {Johannes St{\"{u}}ttgen and Stefan V{\"{o}}mel and Michael Denzel}, title = {Acquisition and analysis of compromised firmware using memory forensics}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S50--S60}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.010}, doi = {10.1016/J.DIIN.2015.01.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StuttgenVD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TurnbullR15, author = {Benjamin P. Turnbull and Suneel Randhawa}, title = {Automated event and social network extraction from digital evidence sources with ontological mapping}, journal = {Digit. Investig.}, volume = {13}, pages = {94--106}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.04.004}, doi = {10.1016/J.DIIN.2015.04.004}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TurnbullR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WagnerRG15, author = {James Wagner and Alexander Rasin and Jonathan Grier}, title = {Database forensic analysis through internal structure carving}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S106--S115}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.013}, doi = {10.1016/J.DIIN.2015.05.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WagnerRG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WalnyckyBMMB15, author = {Daniel Walnycky and Ibrahim M. Baggili and Andrew Marrington and Jason Moore and Frank Breitinger}, title = {Network and device forensic analysis of Android social-messaging applications}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S77--S84}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.009}, doi = {10.1016/J.DIIN.2015.05.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WalnyckyBMMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WisseV15, author = {Wilco Wisse and Cor J. Veenman}, title = {Scripting {DNA:} Identifying the JavaScript programmer}, journal = {Digit. Investig.}, volume = {15}, pages = {61--71}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.09.001}, doi = {10.1016/J.DIIN.2015.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WisseV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YangCKC15, author = {Seung Jei Yang and Jung Ho Choi and Ki Bom Kim and Taejoo Chang}, title = {New acquisition method based on firmware update protocols for Android smartphones}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S68--S76}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.008}, doi = {10.1016/J.DIIN.2015.05.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/YangCKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Yu15, author = {Szde Yu}, title = {Covert communication by means of email spam: {A} challenge for digital investigation}, journal = {Digit. Investig.}, volume = {13}, pages = {72--79}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.04.003}, doi = {10.1016/J.DIIN.2015.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Yu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Zandwijk15, author = {Jan Peter van Zandwijk}, title = {A mathematical approach to {NAND} flash-memory descrambling and decoding}, journal = {Digit. Investig.}, volume = {12}, pages = {41--52}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.003}, doi = {10.1016/J.DIIN.2015.01.003}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Zandwijk15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZawoadHG15, author = {Shams Zawoad and Ragib Hasan and John Grimes}, title = {{LINCS:} Towards building a trustworthy litigation hold enabled cloud storage system}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S55--S67}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.014}, doi = {10.1016/J.DIIN.2015.05.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZawoadHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhangHZTZL15, author = {Li Zhang and Shen{-}Gang Hao and Jun Zheng and Yu{-}an Tan and Quan{-}xin Zhang and Yuan{-}zhang Li}, title = {Descrambling data on solid-state disks by reverse-engineering the firmware}, journal = {Digit. Investig.}, volume = {12}, pages = {77--87}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2014.12.003}, doi = {10.1016/J.DIIN.2014.12.003}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZhangHZTZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSPWD14, author = {Saed Alrabaee and Noman Saleem and Stere Preda and Lingyu Wang and Mourad Debbabi}, title = {{OBA2:} An Onion approach to Binary code Authorship Attribution}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S94--S103}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.012}, doi = {10.1016/J.DIIN.2014.03.012}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSPWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Anglano14, author = {Cosimo Anglano}, title = {Forensic analysis of WhatsApp Messenger on Android smartphones}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {201--213}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.04.003}, doi = {10.1016/J.DIIN.2014.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Anglano14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AnwarA14, author = {Tarique Anwar and Muhammad Abulaish}, title = {A social graph based text mining framework for chat log investigation}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {349--362}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.10.001}, doi = {10.1016/J.DIIN.2014.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AnwarA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Aziz14, author = {Benjamin Aziz}, title = {Modelling and refinement of forensic data acquisition specifications}, journal = {Digit. Investig.}, volume = {11}, number = {2}, pages = {90--101}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.04.001}, doi = {10.1016/J.DIIN.2014.04.001}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Aziz14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BaarBE14, author = {Ruud B. van Baar and Harm M. A. van Beek and E. J. van Eijk}, title = {Digital Forensics as a Service: {A} game changer}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S54--S62}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.007}, doi = {10.1016/J.DIIN.2014.03.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BaarBE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeebeL14, author = {Nicole Lang Beebe and Lishu Liu}, title = {Clustering digital forensic string search output}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {314--322}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.10.002}, doi = {10.1016/J.DIIN.2014.10.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BeebeL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeebeL14a, author = {Nicole Lang Beebe and Lishu Liu}, title = {Ranking algorithms for digital forensic string search hits}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S124--S132}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.007}, doi = {10.1016/J.DIIN.2014.05.007}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BeebeL14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BjellandFA14, author = {Petter Christian Bjelland and Katrin Franke and Andr{\'{e}} {\AA}rnes}, title = {Practical use of Approximate Hash Based Matching in digital investigations}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S18--S26}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.003}, doi = {10.1016/J.DIIN.2014.03.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BjellandFA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Bou-HarbLBD14, author = {Elias Bou{-}Harb and Nour{-}Eddine Lakhdari and Hamad Binsalleeh and Mourad Debbabi}, title = {Multidimensional investigation of source port 0 probing}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S114--S123}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.012}, doi = {10.1016/J.DIIN.2014.05.012}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Bou-HarbLBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerBW14, author = {Frank Breitinger and Harald Baier and Douglas White}, title = {On the database lookup problem of approximate matching}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S1--S9}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.001}, doi = {10.1016/J.DIIN.2014.03.001}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BreitingerBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerR14, author = {Frank Breitinger and Vassil Roussev}, title = {Automated evaluation of approximate matching algorithms on real data}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S10--S17}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.002}, doi = {10.1016/J.DIIN.2014.03.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BreitingerR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerSR14, author = {Frank Breitinger and Georgios Stivaktakis and Vassil Roussev}, title = {Evaluating detection error trade-offs for bytewise approximate matching algorithms}, journal = {Digit. Investig.}, volume = {11}, number = {2}, pages = {81--89}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.002}, doi = {10.1016/J.DIIN.2014.05.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BreitingerSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerSR14a, author = {Frank Breitinger and Georgios Stivaktakis and Vassil Roussev}, title = {Erratum to "Evaluating detection error trade-offs for bytewise approximate matching algorithms" [Digit Invest 11 {(2)} 81-89]}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {363}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.07.001}, doi = {10.1016/J.DIIN.2014.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BreitingerSR14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey14, author = {Eoghan Casey}, title = {Growing societal impact of digital forensics and incident response}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.015}, doi = {10.1016/J.DIIN.2014.03.015}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey14a, author = {Eoghan Casey}, title = {What constitutes a proper education?}, journal = {Digit. Investig.}, volume = {11}, number = {2}, pages = {79--80}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.002}, doi = {10.1016/J.DIIN.2014.06.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyZ14, author = {Eoghan Casey and Rikkert Zoun}, title = {Design tradeoffs for developing fragmented video carving tools}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S30--S39}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.010}, doi = {10.1016/J.DIIN.2014.05.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CaseyZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChabotBNK14, author = {Yoan Chabot and Aur{\'{e}}lie Bertaux and Christophe Nicolle and M. Tahar Kechadi}, title = {A complete formalized knowledge representation model for advanced digital forensics timeline analysis}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S95--S105}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.009}, doi = {10.1016/J.DIIN.2014.05.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChabotBNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Chivers14, author = {Howard Chivers}, title = {Private browsing: {A} window of forensic opportunity}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {20--29}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2013.11.002}, doi = {10.1016/J.DIIN.2013.11.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Chivers14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FarinaSK14, author = {Jason Farina and Mark Scanlon and M. Tahar Kechadi}, title = {BitTorrent Sync: First Impressions and Digital Forensic Implications}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S77--S86}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.010}, doi = {10.1016/J.DIIN.2014.03.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/FarinaSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Federici14, author = {Corrado Federici}, title = {Cloud Data Imager: {A} unified answer to remote acquisition of cloud storage areas}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {30--42}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.02.002}, doi = {10.1016/J.DIIN.2014.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Federici14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FruhwirtKKW14, author = {Peter Fr{\"{u}}hwirt and Peter Kieseberg and Katharina Krombholz and Edgar R. Weippl}, title = {Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {336--348}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.09.003}, doi = {10.1016/J.DIIN.2014.09.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FruhwirtKKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GloeFK14, author = {Thomas Gloe and Andr{\'{e}} Fischer and Matthias Kirchner}, title = {Forensic analysis of video file formats}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S68--S76}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.009}, doi = {10.1016/J.DIIN.2014.03.009}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GloeFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IqbalOMJ14, author = {Asif Iqbal and Hanan Al Obaidli and Andrew Marrington and Andy Jones}, title = {Windows Surface {RT} tablet forensics}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S87--S93}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.011}, doi = {10.1016/J.DIIN.2014.03.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/IqbalOMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KaartL14, author = {Marnix Kaart and Susan Laraghy}, title = {Android forensics: Interpretation of timestamps}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {234--248}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.001}, doi = {10.1016/J.DIIN.2014.05.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KaartL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KangHKI14, author = {Boojoong Kang and Kyoung{-}Soo Han and Byeongho Kang and Eul Gyu Im}, title = {Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {323--335}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.003}, doi = {10.1016/J.DIIN.2014.06.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KangHKI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Knijff14, author = {Ronald M. van der Knijff}, title = {Control systems/SCADA forensics, what's the difference?}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {160--174}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.007}, doi = {10.1016/J.DIIN.2014.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Knijff14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KumarOTPP14, author = {Vijay Kumar and George C. Oikonomou and Theo Tryfonas and Dan Page and Iain W. Phillips}, title = {Digital investigations for IPv6-based Wireless Sensor Networks}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S66--S75}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.005}, doi = {10.1016/J.DIIN.2014.05.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KumarOTPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LangBCD14, author = {Anthony Lang and Masooda N. Bashir and Roy H. Campbell and Lizanne DeStefano}, title = {Developing a new digital forensics curriculum}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S76--S84}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.008}, doi = {10.1016/J.DIIN.2014.05.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LangBCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LeeL14, author = {Chan{-}Youn Lee and Sangjin Lee}, title = {Structure and application of IconCache.db files for digital forensics}, journal = {Digit. Investig.}, volume = {11}, number = {2}, pages = {102--110}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.017}, doi = {10.1016/J.DIIN.2014.05.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LeeL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LinT14, author = {Cheng{-}Shian Lin and Jyh{-}Jong Tsay}, title = {A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis}, journal = {Digit. Investig.}, volume = {11}, number = {2}, pages = {120--140}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.016}, doi = {10.1016/J.DIIN.2014.03.016}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LinT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LuLL14, author = {Jicang Lu and Fenlin Liu and Xiangyang Luo}, title = {Selection of image features for steganalysis based on the Fisher criterion}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {57--66}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2013.12.001}, doi = {10.1016/J.DIIN.2013.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LuLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MartiniC14, author = {Ben Martini and Kim{-}Kwang Raymond Choo}, title = {Distributed filesystem forensics: XtreemFS as a case study}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {295--313}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.08.002}, doi = {10.1016/J.DIIN.2014.08.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MartiniC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Minnaard14, author = {Wicher Minnaard}, title = {Out of sight, but not out of mind: Traces of nearby devices' wireless transmissions in volatile memory}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S104--S111}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.013}, doi = {10.1016/J.DIIN.2014.03.013}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Minnaard14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Minnaard14a, author = {Wicher Minnaard}, title = {The Linux {FAT32} allocator and file creation order reconstruction}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {224--233}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.008}, doi = {10.1016/J.DIIN.2014.06.008}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Minnaard14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MohamedMIB14, author = {Ahmed Fathy Abdul Latif Mohamed and Andrew Marrington and Farkhund Iqbal and Ibrahim M. Baggili}, title = {Testing the forensic soundness of forensic examination environments on bootable media}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S22--S29}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.015}, doi = {10.1016/J.DIIN.2014.05.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MohamedMIB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MooreBMR14, author = {Jason Moore and Ibrahim M. Baggili and Andrew Marrington and Armindo Rodrigues}, title = {Preliminary forensic analysis of the Xbox One}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S57--S65}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.014}, doi = {10.1016/J.DIIN.2014.05.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MooreBMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NelsonSL14, author = {Alex J. Nelson and Erik Q. Steggall and Darrell D. E. Long}, title = {Cooperative mode: Comparative storage metadata verification applied to the Xbox 360}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S46--S56}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.004}, doi = {10.1016/J.DIIN.2014.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NelsonSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nikkel14, author = {Bruce J. Nikkel}, title = {Fostering incident response and digital forensics research}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {249--251}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.09.004}, doi = {10.1016/J.DIIN.2014.09.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Nikkel14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NilssonAA14, author = {Alexander Nilsson and Marcus Andersson and Stefan Axelsson}, title = {Key-hiding on the {ARM} platform}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S63--S67}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.008}, doi = {10.1016/J.DIIN.2014.03.008}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NilssonAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NoelP14, author = {George E. Noel and Gilbert L. Peterson}, title = {Applicability of Latent Dirichlet Allocation to multi-disk search}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {43--56}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.02.001}, doi = {10.1016/J.DIIN.2014.02.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/NoelP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Oestreicher14, author = {Kurt Oestreicher}, title = {A forensically robust method for acquisition of iCloud data}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S106--S113}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.006}, doi = {10.1016/J.DIIN.2014.05.006}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Oestreicher14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkL14, author = {Jungheum Park and Sangjin Lee}, title = {Data fragment forensics for embedded {DVR} systems}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {187--200}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.001}, doi = {10.1016/J.DIIN.2014.06.001}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PathakS14, author = {Pritesh Pathak and S. Selvakumar}, title = {Blind Image Steganalysis of {JPEG} images using feature extraction through the process of dilation}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {67--77}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2013.12.002}, doi = {10.1016/J.DIIN.2013.12.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PathakS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PengZ14, author = {Fei Peng and Die{-}lan Zhou}, title = {Discriminating natural images and computer generated graphics based on the impact of {CFA} interpolation on the correlation of {PRNU}}, journal = {Digit. Investig.}, volume = {11}, number = {2}, pages = {111--119}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.04.002}, doi = {10.1016/J.DIIN.2014.04.002}, timestamp = {Mon, 11 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PengZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PhelpsW14, author = {Amy Phelps and Allan Watt}, title = {I shop online - recreationally! Internet anonymity and Silk Road enabling drug use in Australia}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {261--272}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.08.001}, doi = {10.1016/J.DIIN.2014.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PhelpsW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PringleB14, author = {Nick Pringle and Mikhaila Burgess}, title = {Information assurance in a distributed forensic cluster}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S36--S44}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.005}, doi = {10.1016/J.DIIN.2014.03.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PringleB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Quach14, author = {Tu{-}Thach Quach}, title = {Extracting hidden messages in steganographic images}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S40--S45}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.003}, doi = {10.1016/J.DIIN.2014.05.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Quach14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/QuickC14, author = {Darren Quick and Kim{-}Kwang Raymond Choo}, title = {Impacts of increasing volume of digital forensic data: {A} survey and future research challenges}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {273--294}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.09.002}, doi = {10.1016/J.DIIN.2014.09.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/QuickC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RichardC14, author = {Golden G. Richard III and Andrew Case}, title = {In lieu of swap: Analyzing compressed {RAM} in Mac {OS} {X} and Linux}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S3--S12}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.011}, doi = {10.1016/J.DIIN.2014.05.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RichardC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevAS14, author = {Vassil Roussev and Irfan Ahmed and Thomas Sires}, title = {Image-based kernel fingerprinting}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S13--S21}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.013}, doi = {10.1016/J.DIIN.2014.05.013}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schatz14, author = {Bradley L. Schatz}, title = {A visual approach to interpreting {NAND} flash memory}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {214--223}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.018}, doi = {10.1016/J.DIIN.2014.05.018}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Schatz14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchatzGK14, author = {Bradley L. Schatz and Pavel Gladyshev and Ronald M. van der Knijff}, title = {The internet of things: Interconnected digital dust}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {141--142}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.09.001}, doi = {10.1016/J.DIIN.2014.09.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchatzGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Seigfried-Spellar14, author = {Kathryn C. Seigfried{-}Spellar}, title = {Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings}, journal = {Digit. Investig.}, volume = {11}, number = {4}, pages = {252--260}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.07.003}, doi = {10.1016/J.DIIN.2014.07.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Seigfried-Spellar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SouvignetHMTLH14, author = {Thomas R. Souvignet and Julien Hatin and Fabrice Maqua and D. Tesniere and Pierre L{\'{e}}ger and Romain Hormi{\`{e}}re}, title = {Payment card forensic analysis: From concepts to desktop and mobile analysis tools}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {143--153}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.006}, doi = {10.1016/J.DIIN.2014.06.006}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SouvignetHMTLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SouvignetPFK14, author = {Thomas R. Souvignet and T. Pr{\"{u}}fer and J. Frinken and R. Kricsanowits}, title = {Case study: From embedded system analysis to embedded system based investigator tools}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {154--159}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.06.004}, doi = {10.1016/J.DIIN.2014.06.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SouvignetPFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StuttgenC14, author = {Johannes St{\"{u}}ttgen and Michael Cohen}, title = {Robust Linux memory acquisition with minimal target impact}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S112--S119}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.014}, doi = {10.1016/J.DIIN.2014.03.014}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StuttgenC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SutherlandRX14, author = {Iain Sutherland and Huw Read and Konstantinos Xynos}, title = {Forensic analysis of smart {TV:} {A} current issue and call to arms}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {175--178}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.019}, doi = {10.1016/J.DIIN.2014.05.019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SutherlandRX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TobinSG14, author = {Lee Tobin and Ahmed F. Shosha and Pavel Gladyshev}, title = {Reverse engineering a {CCTV} system, a case study}, journal = {Digit. Investig.}, volume = {11}, number = {3}, pages = {179--186}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.07.002}, doi = {10.1016/J.DIIN.2014.07.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TobinSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VidasKG14, author = {Timothy Vidas and Brian Kaplan and Matthew Geiger}, title = {OpenLV: Empowering investigators and first-responders in the digital forensics process}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S45--S53}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.006}, doi = {10.1016/J.DIIN.2014.03.006}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/VidasKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WestphalANP14, author = {Florian Westphal and Stefan Axelsson and Christian Neuhaus and Andreas Polze}, title = {{VMI-PL:} {A} monitoring language for virtual platforms using virtual machine introspection}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 2}, pages = {S85--S94}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.05.016}, doi = {10.1016/J.DIIN.2014.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WestphalANP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WinterSY14, author = {Christian Winter and Martin Steinebach and York Yannikos}, title = {Fast indexing strategies for robust image hashes}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S27--S35}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.004}, doi = {10.1016/J.DIIN.2014.03.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WinterSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Zdziarski14, author = {Jonathan Zdziarski}, title = {Identifying back doors, attack points, and surveillance mechanisms in iOS devices}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {3--19}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.01.001}, doi = {10.1016/J.DIIN.2014.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Zdziarski14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AndriotisOT13, author = {Panagiotis Andriotis and George C. Oikonomou and Theo Tryfonas}, title = {{JPEG} steganography detection with Benford's Law}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {246--257}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.005}, doi = {10.1016/J.DIIN.2013.01.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AndriotisOT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BarmpatsalouDKK13, author = {Konstantia Barmpatsalou and Dimitrios Damopoulos and Georgios Kambourakis and Vasilios Katos}, title = {A critical review of 7 years of Mobile Device Forensics}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {323--349}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.10.003}, doi = {10.1016/J.DIIN.2013.10.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BarmpatsalouDKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BirajdarM13, author = {Gajanan K. Birajdar and Vijay H. Mankar}, title = {Digital image forgery detection using passive techniques: {A} survey}, journal = {Digit. Investig.}, volume = {10}, number = {3}, pages = {226--245}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.04.007}, doi = {10.1016/J.DIIN.2013.04.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BirajdarM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerSB13, author = {Frank Breitinger and Georgios Stivaktakis and Harald Baier}, title = {{FRASH:} {A} framework to test algorithms of similarity hashing}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S50--S58}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.006}, doi = {10.1016/J.DIIN.2013.06.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BreitingerSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Brown13, author = {Ralf D. Brown}, title = {Improved recovery and reconstruction of DEFLATEd files}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S21--S29}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.003}, doi = {10.1016/J.DIIN.2013.06.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Brown13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey13, author = {Eoghan Casey}, title = {Experimental design challenges in digital forensics}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {167--169}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.002}, doi = {10.1016/J.DIIN.2013.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey13a, author = {Eoghan Casey}, title = {Smartphone incident response}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.04.004}, doi = {10.1016/J.DIIN.2013.04.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey13b, author = {Eoghan Casey}, title = {Triage in digital forensics}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {85--86}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.08.001}, doi = {10.1016/J.DIIN.2013.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey13c, author = {Eoghan Casey}, title = {New developments in digital {\&} multimedia forensics}, journal = {Digit. Investig.}, volume = {10}, number = {3}, pages = {205--206}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.09.001}, doi = {10.1016/J.DIIN.2013.09.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey13d, author = {Eoghan Casey}, title = {Enhancing forensic science through basic and applied research}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {279--280}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.11.001}, doi = {10.1016/J.DIIN.2013.11.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyKL13, author = {Eoghan Casey and Gary Katz and Joe Lewthwaite}, title = {Honing digital forensic processes}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {138--147}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.07.002}, doi = {10.1016/J.DIIN.2013.07.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChanLS13, author = {Lit{-}Hung Chan and Ngai{-}Fong Law and Wan{-}Chi Siu}, title = {A confidence map and pixel-based weighted correlation for PRNU-based camera identification}, journal = {Digit. Investig.}, volume = {10}, number = {3}, pages = {215--225}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.04.001}, doi = {10.1016/J.DIIN.2013.04.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChanLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CiptasariRS13, author = {Rimba Whidiana Ciptasari and Kyung Hyune Rhee and Kouichi Sakurai}, title = {Exploiting reference images for image splicing verification}, journal = {Digit. Investig.}, volume = {10}, number = {3}, pages = {246--258}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.014}, doi = {10.1016/J.DIIN.2013.06.014}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CiptasariRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Collie13, author = {Jan Collie}, title = {The windows IconCache.db: {A} resource for forensic artifacts from {USB} connectable devices}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {200--210}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.006}, doi = {10.1016/J.DIIN.2013.01.006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Collie13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DykstraS13, author = {Josiah Dykstra and Alan T. Sherman}, title = {Design and implementation of {FROST:} Digital forensic tools for the OpenStack cloud computing platform}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S87--S95}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.010}, doi = {10.1016/J.DIIN.2013.06.010}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DykstraS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GisolfGVK13, author = {Floris Gisolf and Zeno J. M. H. Geradts and Dennie Verhoeven and Coert Klaver}, title = {The effects of switching the camera module from BlackBerry Curve 9360 devices}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {56--61}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.007}, doi = {10.1016/J.DIIN.2013.01.007}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GisolfGVK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GisolfMBG13, author = {Floris Gisolf and Anwar Malgoezar and Teun Baar and Zeno J. M. H. Geradts}, title = {Improving source camera identification using a simplified total variation based noise removal algorithm}, journal = {Digit. Investig.}, volume = {10}, number = {3}, pages = {207--214}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.08.002}, doi = {10.1016/J.DIIN.2013.08.002}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GisolfMBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GlissonSB13, author = {William Bradley Glisson and Tim Storer and Joe Buchanan{-}Wollaston}, title = {An empirical comparison of data recovered from mobile forensic toolkits}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {44--55}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.03.004}, doi = {10.1016/J.DIIN.2013.03.004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GlissonSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Grover13, author = {Justin Grover}, title = {Android forensics: Automated data collection and reporting from a mobile device}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S12--S20}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.002}, doi = {10.1016/J.DIIN.2013.06.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Grover13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GuidoOGWNH13, author = {Mark D. Guido and Jared Ondricek and Justin Grover and David Wilburn and Thanh Nguyen and Andrew Hunt}, title = {Automated identification of installed malicious Android applications}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S96--S104}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.011}, doi = {10.1016/J.DIIN.2013.06.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GuidoOGWNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Hale13, author = {Jason S. Hale}, title = {Amazon Cloud Drive forensic analysis}, journal = {Digit. Investig.}, volume = {10}, number = {3}, pages = {259--265}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.04.006}, doi = {10.1016/J.DIIN.2013.04.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Hale13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HongYLL13, author = {Ilyoung Hong and Hyeon Yu and Sangjin Lee and Kyungho Lee}, title = {A new triage model conforming to the needs of selective search and seizure of electronic evidence}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {175--192}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.003}, doi = {10.1016/J.DIIN.2013.01.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HongYLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JamesG13, author = {Joshua I. James and Pavel Gladyshev}, title = {A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {148--157}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.04.005}, doi = {10.1016/J.DIIN.2013.04.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JamesG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KaartKB13, author = {Marnix Kaart and C. Klaver and Ruud B. van Baar}, title = {Forensic access to Windows Mobile pim.vol and other Embedded Database {(EDB)} volumes}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {170--192}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2012.12.002}, doi = {10.1016/J.DIIN.2012.12.002}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KaartKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Kerrigan13, author = {Martin Kerrigan}, title = {A capability maturity model for digital investigations}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {19--33}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.005}, doi = {10.1016/J.DIIN.2013.02.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Kerrigan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhalindHA13, author = {Omed S. Khalind and Julio C. Hernandez{-}Castro and Benjamin Aziz}, title = {A study on the false positive rate of Stegdetect}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {235--245}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.004}, doi = {10.1016/J.DIIN.2013.01.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhalindHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KoopmansJ13, author = {Martin B. Koopmans and Joshua I. James}, title = {Automated network triage}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {129--137}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.03.002}, doi = {10.1016/J.DIIN.2013.03.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KoopmansJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lees13, author = {Christopher Lees}, title = {Determining removal of forensic artefacts using the {USN} change journal}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {300--310}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.10.002}, doi = {10.1016/J.DIIN.2013.10.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Lees13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lewthwaite13, author = {Joseph Lewthwaite}, title = {FrostWire {P2P} forensic examinations}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {211--221}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2012.12.001}, doi = {10.1016/J.DIIN.2012.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Lewthwaite13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MartiniC13, author = {Ben Martini and Kim{-}Kwang Raymond Choo}, title = {Cloud storage forensics: ownCloud as a case study}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {287--299}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.08.005}, doi = {10.1016/J.DIIN.2013.08.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MartiniC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MarturanaT13, author = {Fabio Marturana and Simone Tacconi}, title = {A Machine Learning-based Triage methodology for automated categorization of digital media}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {193--204}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.001}, doi = {10.1016/J.DIIN.2013.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MarturanaT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MoserC13, author = {Andreas Moser and Michael I. Cohen}, title = {Hunting in the enterprise: Forensic triage and incident response}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {89--98}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.03.003}, doi = {10.1016/J.DIIN.2013.03.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MoserC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OverillSR13, author = {Richard E. Overill and Jantje A. M. Silomon and Keith A. Roscoe}, title = {Triage template pipelines in digital forensic investigations}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {168--174}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.03.001}, doi = {10.1016/J.DIIN.2013.03.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OverillSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PatelS13, author = {Pratik C. Patel and Upasna Singh}, title = {A novel classification model for data theft detection using advanced pattern mining}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {385--397}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.09.002}, doi = {10.1016/J.DIIN.2013.09.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PatelS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PenroseMB13, author = {Philip Penrose and Richard Macfarlane and William J. Buchanan}, title = {Approaches to the classification of high entropy file fragments}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {372--384}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.08.004}, doi = {10.1016/J.DIIN.2013.08.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PenroseMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PiccinelliG13, author = {Mario Piccinelli and Paolo Gubian}, title = {Modern ships Voyage Data Recorders: {A} forensics perspective on the Costa Concordia shipwreck}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S41--S49}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.005}, doi = {10.1016/J.DIIN.2013.06.005}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/PiccinelliG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Pollitt13, author = {Mark Pollitt}, title = {Triage: {A} practical solution or admission of failure}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {87--88}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.002}, doi = {10.1016/J.DIIN.2013.01.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Pollitt13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ProvatakiK13, author = {Athina Provataki and Vasilios Katos}, title = {Differential malware forensics}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {311--322}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.08.006}, doi = {10.1016/J.DIIN.2013.08.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ProvatakiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/QuickC13, author = {Darren Quick and Kim{-}Kwang Raymond Choo}, title = {Dropbox analysis: Data remnants on user machines}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {3--18}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.003}, doi = {10.1016/J.DIIN.2013.02.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/QuickC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/QuickC13a, author = {Darren Quick and Kim{-}Kwang Raymond Choo}, title = {Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?}, journal = {Digit. Investig.}, volume = {10}, number = {3}, pages = {266--277}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.07.001}, doi = {10.1016/J.DIIN.2013.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/QuickC13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ReadXSDHRB13, author = {Huw Read and Konstantinos Xynos and Iain Sutherland and Gareth Davies and Tom Houiellebecq and Frode Roarson and Andrew Blyth}, title = {Manipulation of hard drive firmware to conceal entire partitions}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {281--286}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.10.001}, doi = {10.1016/J.DIIN.2013.10.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ReadXSDHRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevQ13, author = {Vassil Roussev and Candice Quates}, title = {File fragment encoding classification - An empirical approach}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S69--S77}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.008}, doi = {10.1016/J.DIIN.2013.06.008}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevQM13, author = {Vassil Roussev and Candice Quates and Robert Martell}, title = {Real-time digital forensics and triage}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {158--167}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.001}, doi = {10.1016/J.DIIN.2013.02.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RoussevQM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoweSG13, author = {Neil C. Rowe and Riqui Schwamm and Simson L. Garfinkel}, title = {Language translation for file paths}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S78--S86}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.009}, doi = {10.1016/J.DIIN.2013.06.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoweSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RuanCKB13, author = {Keyun Ruan and Joe Carthy and M. Tahar Kechadi and Ibrahim M. Baggili}, title = {Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {34--43}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.004}, doi = {10.1016/J.DIIN.2013.02.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RuanCKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SekehMRM13, author = {Mohammad Akbarpour Sekeh and Mohd Aizaini Maarof and Mohd. Foad Rohani and Babak Mahdian}, title = {Efficient image duplicated region detection model using sequential block clustering}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {73--84}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.007}, doi = {10.1016/J.DIIN.2013.02.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SekehMRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Shanableh13, author = {Tamer Shanableh}, title = {Detection of frame deletion for digital video forensics}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {350--360}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.10.004}, doi = {10.1016/J.DIIN.2013.10.004}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Shanableh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShawB13, author = {Adrian Shaw and Alan Browne}, title = {A practical and robust approach to coping with large volumes of data submitted for digital forensic examination}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {116--128}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.04.003}, doi = {10.1016/J.DIIN.2013.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShawB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShiaelesCK13, author = {Stavros N. Shiaeles and Anargyros Chryssanthou and Vasilios Katos}, title = {On-scene triage open source forensic tool chests: Are they effective?}, journal = {Digit. Investig.}, volume = {10}, number = {2}, pages = {99--115}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.04.002}, doi = {10.1016/J.DIIN.2013.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShiaelesCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Smith13, author = {G. Stevenson Smith}, title = {Using jump lists to identify fraudulent documents}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {193--199}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2012.11.002}, doi = {10.1016/J.DIIN.2012.11.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Smith13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SonLKJLL13, author = {Namheun Son and Yunho Lee and Dohyun Kim and Joshua I. James and Sangjin Lee and Kyungho Lee}, title = {A study of user data integrity during acquisition of Android devices}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S3--S11}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.001}, doi = {10.1016/J.DIIN.2013.06.001}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SonLKJLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StewartU13, author = {Jon Stewart and Joel Uckelman}, title = {Unicode search of dirty data, or: How {I} learned to stop worrying and love Unicode Technical Standard {\#}18}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S116--S125}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.013}, doi = {10.1016/J.DIIN.2013.06.013}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/StewartU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StuttgenC13, author = {Johannes St{\"{u}}ttgen and Michael Cohen}, title = {Anti-forensic resilient memory acquisition}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S105--S115}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.012}, doi = {10.1016/J.DIIN.2013.06.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/StuttgenC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VomelS13, author = {Stefan V{\"{o}}mel and Johannes St{\"{u}}ttgen}, title = {An evaluation platform for forensic memory acquisition software}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S30--S40}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.004}, doi = {10.1016/J.DIIN.2013.06.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/VomelS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WhiteSF13, author = {Andrew White and Bradley L. Schatz and Ernest Foo}, title = {Integrity verification of user space code}, journal = {Digit. Investig.}, volume = {10}, number = {Supplement}, pages = {S59--S68}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.06.007}, doi = {10.1016/J.DIIN.2013.06.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WhiteSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Winter0Y13, author = {Christian Winter and Markus Schneider and York Yannikos}, title = {{F2S2:} Fast forensic similarity search through indexing piecewise hash signatures}, journal = {Digit. Investig.}, volume = {10}, number = {4}, pages = {361--371}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.08.003}, doi = {10.1016/J.DIIN.2013.08.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Winter0Y13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/XuYWYZXZ13, author = {Ming Xu and Xue Yang and Beibei Wu and Jun Yao and Haiping Zhang and Jian Xu and Ning Zheng}, title = {A metadata-based method for recovering files and file traces from {YAFFS2}}, journal = {Digit. Investig.}, volume = {10}, number = {1}, pages = {62--72}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.02.006}, doi = {10.1016/J.DIIN.2013.02.006}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/XuYWYZXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YasinA13, author = {Muhammad Yasin and Muhammad Abulaish}, title = {DigLA - {A} Digsby log analysis tool to identify forensic artifacts}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {222--234}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2012.11.003}, doi = {10.1016/J.DIIN.2012.11.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/YasinA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-SalehA12, author = {Mohammed I. Al{-}Saleh and Ziad A. Al{-}Sharif}, title = {Utilizing data lifetime of {TCP} buffers in digital forensics: Empirical study}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {119--124}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.09.001}, doi = {10.1016/J.DIIN.2012.09.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Al-SalehA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-ZaidyFYF12, author = {Rabeah Al{-}Zaidy and Benjamin C. M. Fung and Amr M. Youssef and Francis Fortin}, title = {Mining criminal networks from unstructured text documents}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {147--160}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.12.001}, doi = {10.1016/J.DIIN.2011.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-ZaidyFYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BhoedjangBBSDBOS12, author = {R. A. F. Bhoedjang and Alex van Ballegooij and Harm M. A. van Beek and J. C. van Schie and F. W. Dillema and Ruud B. van Baar and F. A. Ouwendijk and M. Streppel}, title = {Engineering an online computer forensic service}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {96--108}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.10.001}, doi = {10.1016/J.DIIN.2012.10.001}, timestamp = {Wed, 29 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BhoedjangBBSDBOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Brown12, author = {Ralf D. Brown}, title = {Finding and identifying text in 900+ languages}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S34--S43}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.004}, doi = {10.1016/J.DIIN.2012.05.004}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Brown12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey12, author = {Eoghan Casey}, title = {Editorial - Cutting the Gordian knot: Defining requirements for trustworthy tools}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {145--146}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.02.001}, doi = {10.1016/J.DIIN.2012.02.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey12a, author = {Eoghan Casey}, title = {Editorial: {IT} security is not enough}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {1--2}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.016}, doi = {10.1016/J.DIIN.2012.05.016}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey12b, author = {Eoghan Casey}, title = {Cloud computing and digital forensics}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {69--70}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.11.001}, doi = {10.1016/J.DIIN.2012.11.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChungPLK12, author = {Hyunji Chung and Jungheum Park and Sangjin Lee and Cheulhoon Kang}, title = {Digital forensic investigation of cloud storage services}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {81--95}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.015}, doi = {10.1016/J.DIIN.2012.05.015}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChungPLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DengX0J12, author = {Zhui Deng and Dongyan Xu and Xiangyu Zhang and Xuxian Jiang}, title = {IntroLib: Efficient and transparent library call introspection for malware forensics}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S13--S23}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.013}, doi = {10.1016/J.DIIN.2012.05.013}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DengX0J12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DongYZ12, author = {Qiong Dong and Gaobo Yang and Ningbo Zhu}, title = {A {MCEA} based passive forensics scheme for detecting frame-based video tampering}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {151--159}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.07.002}, doi = {10.1016/J.DIIN.2012.07.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DongYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DrezewskiSF12, author = {Rafal Drezewski and Jan Sepielak and Wojciech Filipkowski}, title = {System supporting money laundering detection}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {8--21}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.04.003}, doi = {10.1016/J.DIIN.2012.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DrezewskiSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DykstraS12, author = {Josiah Dykstra and Alan T. Sherman}, title = {Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S90--S98}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.001}, doi = {10.1016/J.DIIN.2012.05.001}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DykstraS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fairbanks12, author = {Kevin D. Fairbanks}, title = {An analysis of Ext4 for digital forensics}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S118--S130}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.010}, doi = {10.1016/J.DIIN.2012.05.010}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fairbanks12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FaridB12, author = {Hany Farid and Mary J. Bravo}, title = {Perceptual discrimination of computer generated and photographic faces}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {226--235}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.06.003}, doi = {10.1016/J.DIIN.2011.06.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FaridB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FasanO12, author = {Oluwasola Mary Fasan and Martin S. Olivier}, title = {Correctness proof for database reconstruction algorithm}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {138--150}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.09.002}, doi = {10.1016/J.DIIN.2012.09.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FasanO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FitzgeraldMMZ12, author = {Simran Fitzgerald and George Mathews and Colin Morris and Oles Zhulyn}, title = {Using {NLP} techniques for file fragment classification}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S44--S49}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.008}, doi = {10.1016/J.DIIN.2012.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FitzgeraldMMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel12, author = {Simson L. Garfinkel}, title = {Digital forensics {XML} and the {DFXML} toolset}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {161--174}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.11.002}, doi = {10.1016/J.DIIN.2011.11.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Garfinkel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel12a, author = {Simson L. Garfinkel}, title = {Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S80--S89}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.002}, doi = {10.1016/J.DIIN.2012.05.002}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Garfinkel12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelNY12, author = {Simson L. Garfinkel and Alex J. Nelson and Joel Young}, title = {A general strategy for differential forensic analysis}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S50--S59}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.003}, doi = {10.1016/J.DIIN.2012.05.003}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GarfinkelNY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HandLGT12, author = {Scott Hand and Zhiqiang Lin and Guofei Gu and Bhavani Thuraisingham}, title = {Bin-Carver: Automatic recovery of binary executable files}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S108--S117}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.014}, doi = {10.1016/J.DIIN.2012.05.014}, timestamp = {Fri, 13 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HandLGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HargreavesP12, author = {Christopher James Hargreaves and Jonathan Patterson}, title = {An automated timeline reconstruction approach for digital forensic investigations}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S69--S79}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.006}, doi = {10.1016/J.DIIN.2012.05.006}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/HargreavesP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JonesPW12, author = {Brian Jones and Syd Pleno and Michael Wilkinson}, title = {The use of random sampling in investigations involving child abuse material}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S99--S107}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.011}, doi = {10.1016/J.DIIN.2012.05.011}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JonesPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lallie12, author = {Harjinder Singh Lallie}, title = {An overview of the digital forensic investigation infrastructure of India}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {3--7}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.02.002}, doi = {10.1016/J.DIIN.2012.02.002}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Lallie12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MahalakshmiVP12, author = {S. Devi Mahalakshmi and K. Vijayalakshmi and Priyadharsini Selvaraj}, title = {Digital image forgery detection and estimation by exploring basic image manipulations}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {215--225}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.06.004}, doi = {10.1016/J.DIIN.2011.06.004}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MahalakshmiVP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MartiniC12, author = {Ben Martini and Kim{-}Kwang Raymond Choo}, title = {An integrated conceptual digital forensic framework for cloud computing}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {71--80}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.07.001}, doi = {10.1016/J.DIIN.2012.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MartiniC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MuhamadHB12, author = {Ghulam Muhammad and Muhammad Hussain and George Bebis}, title = {Passive copy move image forgery detection using undecimated dyadic wavelet transform}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {49--57}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.04.004}, doi = {10.1016/J.DIIN.2012.04.004}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MuhamadHB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MutawaBM12, author = {Noora Al Mutawa and Ibrahim M. Baggili and Andrew Marrington}, title = {Forensic analysis of social networking applications on mobile devices}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S24--S33}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.007}, doi = {10.1016/J.DIIN.2012.05.007}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MutawaBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkCL12, author = {Jungheum Park and Hyunji Chung and Sangjin Lee}, title = {Forensic analysis techniques for fragmented flash memory pages in smartphones}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {109--118}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.09.003}, doi = {10.1016/J.DIIN.2012.09.003}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Quach12, author = {Tu{-}Thach Quach}, title = {Locating payload embedded by group-parity steganography}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {160--166}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.08.001}, doi = {10.1016/J.DIIN.2012.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Quach12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RoussevQ12, author = {Vassil Roussev and Candice Quates}, title = {Content triage with similarity digests: The {M57} case study}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S60--S68}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.012}, doi = {10.1016/J.DIIN.2012.05.012}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RoussevQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Rowe12, author = {Neil C. Rowe}, title = {Testing the National Software Reference Library}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S131--S138}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.009}, doi = {10.1016/J.DIIN.2012.05.009}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Rowe12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SavoldiPG12, author = {Antonio Savoldi and Mario Piccinelli and Paolo Gubian}, title = {A statistical method for detecting on-disk wiped areas}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {194--214}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.06.005}, doi = {10.1016/J.DIIN.2011.06.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SavoldiPG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SylveCMR12, author = {Joe Sylve and Andrew Case and Lodovico Marziale and Golden G. Richard III}, title = {Acquisition and analysis of volatile memory from android devices}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {175--184}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.10.003}, doi = {10.1016/J.DIIN.2011.10.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SylveCMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TartBGM12, author = {Matthew Tart and Iain Brodie and Nicholas Gleed and James Matthews}, title = {Historic cell site analysis - Overview of principles and survey methodologies}, journal = {Digit. Investig.}, volume = {8}, number = {3-4}, pages = {185--193}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2011.10.002}, doi = {10.1016/J.DIIN.2011.10.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TartBGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VomelF12, author = {Stefan V{\"{o}}mel and Felix C. Freiling}, title = {Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition}, journal = {Digit. Investig.}, volume = {9}, number = {2}, pages = {125--137}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.04.005}, doi = {10.1016/J.DIIN.2012.04.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VomelF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WhiteSF12, author = {Andrew White and Bradley L. Schatz and Ernest Foo}, title = {Surveying the user space through user allocations}, journal = {Digit. Investig.}, volume = {9}, number = {Supplement}, pages = {S3--S12}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.05.005}, doi = {10.1016/J.DIIN.2012.05.005}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WhiteSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YuQLZLG12, author = {Miao Yu and Zhengwei Qi and Qian Lin and Xianming Zhong and Bingyu Li and Haibing Guan}, title = {Vis: Virtualization enhanced live forensics acquisition for native system}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {22--33}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.04.002}, doi = {10.1016/J.DIIN.2012.04.002}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/YuQLZLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZhangTZ12, author = {Li Zhang and Yu{-}an Tan and Qikun Zhang}, title = {Identification of {NAND} flash {ECC} algorithms in mobile devices}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {34--48}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.04.001}, doi = {10.1016/J.DIIN.2012.04.001}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZhangTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZongLL12, author = {Han Zong and Fenlin Liu and Xiangyang Luo}, title = {Blind image steganalysis based on wavelet coefficient correlation}, journal = {Digit. Investig.}, volume = {9}, number = {1}, pages = {58--68}, year = {2012}, url = {https://doi.org/10.1016/j.diin.2012.02.003}, doi = {10.1016/J.DIIN.2012.02.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZongLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Al-WehaibiSG11, author = {Khawla Al{-}Wehaibi and Tim Storer and William Bradley Glisson}, title = {Augmenting password recovery with online profiling}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S25--S33}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.004}, doi = {10.1016/J.DIIN.2011.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Al-WehaibiSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AllegraPNRV11, author = {Elisabetta Allegra and Roberto Di Pietro and Mauro La Noce and Valerio Ruocco and Nino Vincenzo Verde}, title = {Cross-border co-operation and education in digital investigations: {A} European perspective}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {106--113}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.09.001}, doi = {10.1016/J.DIIN.2011.09.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AllegraPNRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BallouG11, author = {Susan Ballou and Rhesa G. Gilliland}, title = {Emerging paper standards in computer forensics}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {96--97}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.017}, doi = {10.1016/J.DIIN.2011.05.017}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BallouG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BandayMQS11, author = {M. Tariq Banday and Farooq A. Mir and Jameel A. Qadri and Nisar Ahmed Shah}, title = {Analyzing Internet e-mail date-spoofing}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {145--153}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.11.001}, doi = {10.1016/J.DIIN.2010.11.001}, timestamp = {Tue, 03 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BandayMQS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BangYL11, author = {Jewan Bang and Byeongyeong Yoo and Sangjin Lee}, title = {Analysis of changes in file time attributes with file manipulation}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {135--144}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.12.001}, doi = {10.1016/J.DIIN.2010.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BangYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeckettS11, author = {Jason Beckett and Jill Slay}, title = {Scientific underpinnings and background to standards and accreditation in digital forensics}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {114--121}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.08.001}, doi = {10.1016/J.DIIN.2011.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BeckettS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BeverlyGC11, author = {Robert Beverly and Simson L. Garfinkel and Greg Cardwell}, title = {Forensic carving of network packets and associated data structures}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S78--S89}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.010}, doi = {10.1016/J.DIIN.2011.05.010}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/BeverlyGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Brown11, author = {Ralf D. Brown}, title = {Reconstructing corrupt DEFLATEd files}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S125--S131}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.015}, doi = {10.1016/J.DIIN.2011.05.015}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Brown11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey11, author = {Eoghan Casey}, title = {The increasing need for automation and validation in digital forensics}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {103--104}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.02.002}, doi = {10.1016/J.DIIN.2011.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey11a, author = {Eoghan Casey}, title = {Responding to a data breach: {A} little knowledge is a dangerous thing}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {1--2}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.07.001}, doi = {10.1016/J.DIIN.2011.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey11b, author = {Eoghan Casey}, title = {A unified voice: The need for an international digital forensic convention}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {89--91}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.09.004}, doi = {10.1016/J.DIIN.2011.09.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyCLOS11, author = {Eoghan Casey and Adrien Cheval and Jong Yeon Lee and David Oxley and Yong Jun Song}, title = {Forensic acquisition and analysis of palm webOS on mobile devices}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {37--47}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.04.003}, doi = {10.1016/J.DIIN.2011.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyCLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyFGS11, author = {Eoghan Casey and Geoff Fellows and Matthew Geiger and Gerasimos Stellatos}, title = {The growing impact of full disk encryption on digital forensics}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {129--134}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.09.005}, doi = {10.1016/J.DIIN.2011.09.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyFGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChenHY11, author = {Zhili Chen and Liusheng Huang and Wei Yang}, title = {Detection of substitution-based linguistic steganography by relative frequency analysis}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {68--77}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.03.001}, doi = {10.1016/J.DIIN.2011.03.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChenHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChengCS11, author = {Na Cheng and Rajarathnam Chandramouli and K. P. Subbalakshmi}, title = {Author gender identification from text}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {78--88}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.04.002}, doi = {10.1016/J.DIIN.2011.04.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChengCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChiversH11, author = {Howard Chivers and Christopher James Hargreaves}, title = {Forensic data recovery from the Windows Search Database}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {114--126}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.01.001}, doi = {10.1016/J.DIIN.2011.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChiversH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CohenBC11, author = {Michael I. Cohen and Darren Bilby and Germano Caronni}, title = {Distributed forensics and incident response in the enterprise}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S101--S110}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.012}, doi = {10.1016/J.DIIN.2011.05.012}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CohenBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FlaglienMMA11, author = {Anders Flaglien and Aleksander Mallasvik and Magnus Mustorp and Andr{\'{e}} {\AA}rnes}, title = {Storage and exchange formats for digital evidence}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {122--128}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.09.002}, doi = {10.1016/J.DIIN.2011.09.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FlaglienMMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FuSLL11, author = {Zhangjie Fu and Xingming Sun and Yuling Liu and Bo Li}, title = {Forensic investigation of {OOXML} format documents}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {48--55}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.04.001}, doi = {10.1016/J.DIIN.2011.04.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FuSLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Geradts11, author = {Zeno J. M. H. Geradts}, title = {{ENFSI} Forensic {IT} Working group}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {94--95}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.09.003}, doi = {10.1016/J.DIIN.2011.09.003}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Geradts11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Grier11, author = {Jonathan Grier}, title = {Detecting data theft using stochastic forensics}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S71--S77}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.009}, doi = {10.1016/J.DIIN.2011.05.009}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Grier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrisposSG11, author = {George Grispos and Tim Storer and William Bradley Glisson}, title = {A comparison of forensic evidence recovery techniques for a windows mobile smart phone}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {23--36}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.016}, doi = {10.1016/J.DIIN.2011.05.016}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/GrisposSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HsuSC11, author = {Hsien{-}Ming Hsu and Yeali S. Sun and Meng Chang Chen}, title = {Collaborative scheme for VoIP traceback}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {185--195}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.10.003}, doi = {10.1016/J.DIIN.2010.10.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HsuSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Hunton11, author = {Paul Hunton}, title = {A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a {UK} law enforcement environment}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {105--113}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.01.002}, doi = {10.1016/J.DIIN.2011.01.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Hunton11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/InoueAJ11, author = {Hajime Inoue and Frank Adelstein and Robert A. Joyce}, title = {Visualization in testing a volatile memory forensic tool}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S42--S51}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.006}, doi = {10.1016/J.DIIN.2011.05.006}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/InoueAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KingV11, author = {Christopher King and Timothy Vidas}, title = {Empirical analysis of solid state disk data retention when used with contemporary operating systems}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S111--S117}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.013}, doi = {10.1016/J.DIIN.2011.05.013}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/KingV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LallieB11, author = {Harjinder Singh Lallie and Philip James Briggs}, title = {Windows 7 registry forensic evidence created by three popular BitTorrent clients}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {127--134}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.10.002}, doi = {10.1016/J.DIIN.2010.10.002}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LallieB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LouisE11, author = {A. L. Louis and Andries P. Engelbrecht}, title = {Unsupervised discovery of relations for analysis of textual data}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {154--171}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2010.08.004}, doi = {10.1016/J.DIIN.2010.08.004}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LouisE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MarringtonBMC11, author = {Andrew Marrington and Ibrahim M. Baggili and George M. Mohay and Andrew J. Clark}, title = {{CAT} Detect (Computer Activity Timeline Detection): {A} tool for detecting inconsistency in computer activity timelines}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S52--S61}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.007}, doi = {10.1016/J.DIIN.2011.05.007}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/MarringtonBMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Marshall11, author = {Angus M. Marshall}, title = {Standards, regulation {\&} quality in digital investigations: The state we are in}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {141--144}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.11.001}, doi = {10.1016/J.DIIN.2011.11.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Marshall11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OhLL11, author = {Junghoon Oh and SeungBong Lee and Sangjin Lee}, title = {Advanced evidence collection and analysis of web browser activity}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S62--S70}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.008}, doi = {10.1016/J.DIIN.2011.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OhLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OkolicaP11, author = {James S. Okolica and Gilbert L. Peterson}, title = {Extracting the windows clipboard from physical memory}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S118--S124}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.014}, doi = {10.1016/J.DIIN.2011.05.014}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OkolicaP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OwenT11, author = {Paul Owen and Paula Thomas}, title = {An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising {ACPO} {\&} {NIST} guidelines}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {135--140}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.03.002}, doi = {10.1016/J.DIIN.2011.03.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OwenT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PhamSH11, author = {Dung Vu Pham and Ali Syed and Malka N. Halgamuge}, title = {Universal serial bus based software attacks and protection solutions}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {172--184}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.02.001}, doi = {10.1016/J.DIIN.2011.02.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PhamSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Roussev11, author = {Vassil Roussev}, title = {An evaluation of forensic similarity hashes}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S34--S41}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.005}, doi = {10.1016/J.DIIN.2011.05.005}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Roussev11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShebaroC11, author = {Bilal Shebaro and Jedidiah R. Crandall}, title = {Privacy-preserving network flow recording}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S90--S100}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.011}, doi = {10.1016/J.DIIN.2011.05.011}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShebaroC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShieldsFM11, author = {Clay Shields and Ophir Frieder and Mark Maloof}, title = {A system for the proactive, continuous, and efficient collection of digital forensic evidence}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S3--S13}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.002}, doi = {10.1016/J.DIIN.2011.05.002}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ShieldsFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sommer11, author = {Peter Sommer}, title = {Certification, registration and assessment of digital forensic experts: The {UK} experience}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {98--105}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.06.001}, doi = {10.1016/J.DIIN.2011.06.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sommer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Venema11, author = {Wietse Z. Venema}, title = {Eleventh Annual {DFRWS} Conference}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S1--S2}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.001}, doi = {10.1016/J.DIIN.2011.05.001}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Venema11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VidasZC11, author = {Timothy Vidas and Chengye Zhang and Nicolas Christin}, title = {Toward a general collection methodology for Android devices}, journal = {Digit. Investig.}, volume = {8}, number = {Supplement}, pages = {S14--S24}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.05.003}, doi = {10.1016/J.DIIN.2011.05.003}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/VidasZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/VomelF11, author = {Stefan V{\"{o}}mel and Felix C. Freiling}, title = {A survey of main memory acquisition and analysis techniques for the windows operating system}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {3--22}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.06.002}, doi = {10.1016/J.DIIN.2011.06.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/VomelF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X11, title = {Consortium of Digital Forensic Specialists: Shape the future of your profession}, journal = {Digit. Investig.}, volume = {8}, number = {2}, pages = {92--93}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.10.001}, doi = {10.1016/J.DIIN.2011.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/YenLW11, author = {Yun{-}Sheng Yen and I{-}Long Lin and Bo{-}Lin Wu}, title = {A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence}, journal = {Digit. Investig.}, volume = {8}, number = {1}, pages = {56--67}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.03.003}, doi = {10.1016/J.DIIN.2011.03.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/YenLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Axelsson10, author = {Stefan Axelsson}, title = {The Normalised Compression Distance as a file fragment classifier}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S24--S31}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.004}, doi = {10.1016/J.DIIN.2010.05.004}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Axelsson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BangYL10, author = {Jewan Bang and Byeongyeong Yoo and Sangjin Lee}, title = {Secure {USB} bypassing tool}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S114--S120}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.014}, doi = {10.1016/J.DIIN.2010.05.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BangYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Carrier10, author = {Brian D. Carrier}, title = {Different interpretations of {ISO9660} file systems}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S129--S134}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.016}, doi = {10.1016/J.DIIN.2010.05.016}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Carrier10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMNR10, author = {Andrew Case and Lodovico Marziale and Cris Neckar and Golden G. Richard III}, title = {Treasure and tragedy in \emph{kmem{\_}cache} mining for live forensics investigation}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S41--S47}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.006}, doi = {10.1016/J.DIIN.2010.05.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseMR10, author = {Andrew Case and Lodovico Marziale and Golden G. Richard III}, title = {Dynamic recreation of kernel data structures for live forensics}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S32--S40}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.005}, doi = {10.1016/J.DIIN.2010.05.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey10, author = {Eoghan Casey}, title = {Digital dust: Evidence in every nook and cranny}, journal = {Digit. Investig.}, volume = {6}, number = {3-4}, pages = {93--94}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.02.002}, doi = {10.1016/J.DIIN.2010.02.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey10a, author = {Eoghan Casey}, title = {Digital investigations, security and privacy}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.10.001}, doi = {10.1016/J.DIIN.2010.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyBD10, author = {Eoghan Casey and Michael Bann and John Doyle}, title = {Introduction to Windows Mobile Forensics}, journal = {Digit. Investig.}, volume = {6}, number = {3-4}, pages = {136--146}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.01.004}, doi = {10.1016/J.DIIN.2010.01.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChengL10, author = {Fa{-}Chang Cheng and Wen{-}Hsing Lai}, title = {An overview of VoIP and {P2P} copyright and lawful-interception issues in the United States and Taiwan}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {81--89}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.08.001}, doi = {10.1016/J.DIIN.2010.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChengL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CohenS10, author = {Michael Cohen and Bradley L. Schatz}, title = {Hash based disk imaging using {AFF4}}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S121--S128}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.015}, doi = {10.1016/J.DIIN.2010.05.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/CohenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ContiBSSRSLP10, author = {Gregory J. Conti and Sergey Bratus and Anna Shubina and Benjamin Sangster and Roy Ragsdale and Matthew Supan and Andrew Lichtenberg and Robert Perez{-}Alemany}, title = {Automated mapping of large binary objects using primitive fragment type classification}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S3--S12}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.002}, doi = {10.1016/J.DIIN.2010.05.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ContiBSSRSLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CroftO10, author = {Neil J. Croft and Martin S. Olivier}, title = {Sequenced release of privacy-accurate information in a forensic investigation}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {95--101}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.01.002}, doi = {10.1016/J.DIIN.2010.01.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CroftO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DistefanoMP10, author = {Alessandro Distefano and Gianluigi Me and Francesco Pace}, title = {Android anti-forensics through a local paradigm}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S83--S94}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.011}, doi = {10.1016/J.DIIN.2010.05.011}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/DistefanoMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EijkR10, author = {Onno van Eijk and Mark Roeloffs}, title = {Forensic acquisition and analysis of the Random Access Memory of TomTom {GPS} navigation systems}, journal = {Digit. Investig.}, volume = {6}, number = {3-4}, pages = {179--188}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.02.005}, doi = {10.1016/J.DIIN.2010.02.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EijkR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fellows10, author = {Geoffrey Fellows}, title = {WinRAR temporary folder artefacts}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {9--13}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2009.12.001}, doi = {10.1016/J.DIIN.2009.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fellows10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Garfinkel10, author = {Simson L. Garfinkel}, title = {Digital forensics research: The next 10 years}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S64--S73}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.009}, doi = {10.1016/J.DIIN.2010.05.009}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Garfinkel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GarfinkelNWR10, author = {Simson L. Garfinkel and Alex J. Nelson and Douglas White and Vassil Roussev}, title = {Using purpose-built functions and block hashes to enable small block and sub-file forensics}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S13--S23}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.003}, doi = {10.1016/J.DIIN.2010.05.003}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GarfinkelNWR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Gogolin10, author = {Greg Gogolin}, title = {The Digital Crime Tsunami}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {3--8}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.07.001}, doi = {10.1016/J.DIIN.2010.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Gogolin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/IqbalBFD10, author = {Farkhund Iqbal and Hamad Binsalleeh and Benjamin C. M. Fung and Mourad Debbabi}, title = {Mining writeprints from anonymous e-mails for forensic investigation}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {56--64}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.03.003}, doi = {10.1016/J.DIIN.2010.03.003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/IqbalBFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Jonkers10, author = {Kevin Jonkers}, title = {The forensic use of mobile phone flasher boxes}, journal = {Digit. Investig.}, volume = {6}, number = {3-4}, pages = {168--178}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.01.006}, doi = {10.1016/J.DIIN.2010.01.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Jonkers10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhanBY10, author = {Liaqat Ali Khan and Muhammad Shamim Baig and Amr M. Youssef}, title = {Speaker recognition from encrypted VoIP communications}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {65--73}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2009.10.001}, doi = {10.1016/J.DIIN.2009.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhanBY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhanIB10, author = {Liaqat Ali Khan and Farkhund Iqbal and Muhammad Shamim Baig}, title = {Speaker verification from partially encrypted compressed speech for forensic investigation}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {74--80}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.03.002}, doi = {10.1016/J.DIIN.2010.03.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhanIB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Klaver10, author = {C. Klaver}, title = {Windows Mobile advanced forensics}, journal = {Digit. Investig.}, volume = {6}, number = {3-4}, pages = {147--167}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.02.001}, doi = {10.1016/J.DIIN.2010.02.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Klaver10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LiberatoreEKLS10, author = {Marc Liberatore and Robert Erdely and Thomas Kerle and Brian Neil Levine and Clay Shields}, title = {Forensic investigation of peer-to-peer file sharing networks}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S95--S103}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.012}, doi = {10.1016/J.DIIN.2010.05.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/LiberatoreEKLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Lyle10, author = {James R. Lyle}, title = {If \emph{error rate} is such a simple concept, why don't {I} have one for my forensic tool yet?}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S135--S139}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.017}, doi = {10.1016/J.DIIN.2010.05.017}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Lyle10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MislanCK10, author = {Richard P. Mislan and Eoghan Casey and Gary C. Kessler}, title = {The growing need for on-scene triage of mobile devices}, journal = {Digit. Investig.}, volume = {6}, number = {3-4}, pages = {112--124}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.03.001}, doi = {10.1016/J.DIIN.2010.03.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MislanCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OkolicaP10, author = {James S. Okolica and Gilbert L. Peterson}, title = {Windows operating systems agnostic memory analysis}, journal = {Digit. Investig.}, volume = {7}, number = {Supplement}, pages = {S48--S56}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.05.007}, doi = {10.1016/J.DIIN.2010.05.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/OkolicaP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/PilliJN10, author = {Emmanuel S. Pilli and Ramesh C. Joshi and Rajdeep Niyogi}, title = {Network forensic frameworks: Survey and research challenges}, journal = {Digit. Investig.}, volume = {7}, number = {1-2}, pages = {14--27}, year = {2010}, url = {https://doi.org/10.1016/j.diin.2010.02.003}, doi = {10.1016/J.DIIN.2010.02.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/PilliJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.