Search dblp for Publications

export results for "toc:db/journals/di/di1.bht:"

 download as .bib file

@article{DBLP:journals/di/Altheide04,
  author       = {Cory Altheide},
  title        = {Forensic analysis of Windows hosts using UNIX-based tools},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {197--212},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.004},
  doi          = {10.1016/J.DIIN.2004.07.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Altheide04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BoydF04,
  author       = {Chris Boyd and
                  Pete Forster},
  title        = {Time and date issues in forensic computing - a case study},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {18--23},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.002},
  doi          = {10.1016/J.DIIN.2004.01.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BoydF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/BuchholzS04,
  author       = {Florian P. Buchholz and
                  Eugene H. Spafford},
  title        = {On the role of file system metadata in digital forensics},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {298--309},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.10.002},
  doi          = {10.1016/J.DIIN.2004.10.002},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/BuchholzS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CarrierG04,
  author       = {Brian D. Carrier and
                  Joe Grand},
  title        = {A hardware-based memory acquisition procedure for digital investigations},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {50--60},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2003.12.001},
  doi          = {10.1016/J.DIIN.2003.12.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CarrierG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Carvey04,
  author       = {Harlan Carvey},
  title        = {Instant messaging investigations on a live Windows {XP} system},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {256--260},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.10.003},
  doi          = {10.1016/J.DIIN.2004.10.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Carvey04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey04,
  author       = {Eoghan Casey},
  title        = {The need for knowledge sharing and standardization},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.003},
  doi          = {10.1016/J.DIIN.2004.01.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey04a,
  author       = {Eoghan Casey},
  title        = {Network traffic as a source of evidence: tool strengths, weaknesses,
                  and future needs},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {28--43},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2003.12.002},
  doi          = {10.1016/J.DIIN.2003.12.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey04b,
  author       = {Eoghan Casey},
  title        = {The need for objective case review},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {83--85},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.004},
  doi          = {10.1016/J.DIIN.2004.04.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey04c,
  author       = {Eoghan Casey},
  title        = {Tool review - WinHex},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {114--128},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.001},
  doi          = {10.1016/J.DIIN.2004.04.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey04d,
  author       = {Eoghan Casey},
  title        = {Reporting security breaches - a risk to be avoided or responsibility
                  to be embraced?},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {151--161},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.008},
  doi          = {10.1016/J.DIIN.2004.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey04d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Casey04e,
  author       = {Eoghan Casey},
  title        = {State of the field: growth, growth, growth},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {241--242},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.11.006},
  doi          = {10.1016/J.DIIN.2004.11.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey04e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyS04,
  author       = {Eoghan Casey and
                  Aaron Stanley},
  title        = {Tool review - remote forensic preservation and examination tools},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {284--297},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.11.003},
  doi          = {10.1016/J.DIIN.2004.11.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Daniels04,
  author       = {Thomas E. Daniels},
  title        = {A functional reference model of passive systems for tracing network
                  traffic},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {69--81},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2003.12.003},
  doi          = {10.1016/J.DIIN.2003.12.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Daniels04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Fellows04,
  author       = {Geoff Fellows},
  title        = {Peer-to-peer networking issues - an overview},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {3--6},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.001},
  doi          = {10.1016/J.DIIN.2004.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Fellows04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FerraroR04,
  author       = {Monique Mattei Ferraro and
                  Andrew Russell},
  title        = {Current issues confronting well-established computer-assisted child
                  exploitation and computer crime task forces},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {7--15},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.004},
  doi          = {10.1016/J.DIIN.2004.01.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FerraroR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/FreyssinetG04,
  author       = {{\'{E}}ric Freyssinet and
                  Zeno J. M. H. Geradts},
  title        = {Future issues in forensic computing and an introduction to {ENSFI}},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {112--113},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.008},
  doi          = {10.1016/J.DIIN.2004.04.008},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/FreyssinetG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/George04,
  author       = {Esther George},
  title        = {{UK} Computer Misuse Act - the Trojan virus defence: Regina v Aaron
                  Caffrey, Southwark Crown Court, 17 October 2003},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {89},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.005},
  doi          = {10.1016/J.DIIN.2004.04.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/George04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GerberL04,
  author       = {Matthew B. Gerber and
                  John Leeson},
  title        = {Formalization of computer input and output: the Hadley model},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {214--224},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.001},
  doi          = {10.1016/J.DIIN.2004.07.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GerberL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GladyshevP04,
  author       = {Pavel Gladyshev and
                  Ahmed Patel},
  title        = {Finite state machine approach to digital event reconstruction},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {130--149},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.03.001},
  doi          = {10.1016/J.DIIN.2004.03.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GladyshevP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hilley04,
  author       = {Sarah Hilley},
  title        = {News announcements},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {86--88},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.007},
  doi          = {10.1016/J.DIIN.2004.04.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hilley04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hilley04a,
  author       = {Sarah Hilley},
  title        = {Events},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {129},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.009},
  doi          = {10.1016/J.DIIN.2004.04.009},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hilley04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Hilley04b,
  author       = {Sarah Hilley},
  title        = {News},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {162--164},
  year         = {2004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Hilley04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Howell04,
  author       = {Beryl A. Howell},
  title        = {Ambiguities in {US} law for investigators},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {106--111},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.003},
  doi          = {10.1016/J.DIIN.2004.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Howell04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Jones04,
  author       = {Nigel Jones},
  title        = {Training and accreditation - who are the experts?},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {189--194},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.009},
  doi          = {10.1016/J.DIIN.2004.07.009},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Jones04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Jones04a,
  author       = {Robert Jones},
  title        = {Your day in court - the r{\^{o}}le of the expert witness},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {273--278},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.11.001},
  doi          = {10.1016/J.DIIN.2004.11.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Jones04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/JonesM04,
  author       = {Andy Jones and
                  Christopher Meyler},
  title        = {What evidence is left after disk cleaners?},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {183--188},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.002},
  doi          = {10.1016/J.DIIN.2004.07.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/JonesM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Kenneally04,
  author       = {Erin Kenneally},
  title        = {Digital logs - proof matters},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {94--101},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.006},
  doi          = {10.1016/J.DIIN.2004.01.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Kenneally04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Mellars04,
  author       = {Barrie Mellars},
  title        = {Forensic examination of mobile phones},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {266--272},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.11.007},
  doi          = {10.1016/J.DIIN.2004.11.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Mellars04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Mocas04,
  author       = {Sarah Mocas},
  title        = {Building theoretical underpinnings for digital forensics research},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {61--68},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2003.12.004},
  doi          = {10.1016/J.DIIN.2003.12.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Mocas04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Nikkel04,
  author       = {Bruce J. Nikkel},
  title        = {Domain name forensics: a systematic approach to investigating an internet
                  presence},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {247--255},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.10.001},
  doi          = {10.1016/J.DIIN.2004.10.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Nikkel04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/OConnor04,
  author       = {Owen O'Connor},
  title        = {Deploying forensic tools via {PXE}},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {173--176},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.005},
  doi          = {10.1016/J.DIIN.2004.07.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/OConnor04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Pemble04,
  author       = {Matthew Pemble},
  title        = {Investigating around mainframes and other high-end systems: the revenge
                  of big iron},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {90--93},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.006},
  doi          = {10.1016/J.DIIN.2004.04.006},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Pemble04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Schmitknecht04,
  author       = {Douglas A. Schmitknecht},
  title        = {Building {FBI} computer forensics capacity: one lab at a time},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {177--182},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.007},
  doi          = {10.1016/J.DIIN.2004.07.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Schmitknecht04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sealey04,
  author       = {Philip Sealey},
  title        = {Remote forensics},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {261--265},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.11.002},
  doi          = {10.1016/J.DIIN.2004.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sealey04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SolonH04,
  author       = {Mark Solon and
                  Penny Harper},
  title        = {Preparing evidence for court},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {279--283},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.11.005},
  doi          = {10.1016/J.DIIN.2004.11.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SolonH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Sommer04,
  author       = {Peter Sommer},
  title        = {The challenges of large computer evidence cases},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {16--17},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.005},
  doi          = {10.1016/J.DIIN.2004.01.005},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Sommer04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Stephenson04,
  author       = {Peter Stephenson},
  title        = {The right tools for the job},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {24--27},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.007},
  doi          = {10.1016/J.DIIN.2004.01.007},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Stephenson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Stevens04,
  author       = {Malcolm W. Stevens},
  title        = {Unification of relative time frames for digital forensics},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {225--239},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.003},
  doi          = {10.1016/J.DIIN.2004.07.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Stevens04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Vaughan04,
  author       = {Chris Vaughan},
  title        = {Xbox security issues and forensic recovery methodology (utilising
                  Linux)},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {165--172},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.07.006},
  doi          = {10.1016/J.DIIN.2004.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Vaughan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Vel04,
  author       = {Olivier Y. de Vel},
  title        = {File classification using byte sub-stream kernels},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {150--157},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.03.002},
  doi          = {10.1016/J.DIIN.2004.03.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Vel04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Watson04,
  author       = {D. Watson},
  title        = {Book Review},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {195--196},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.08.002},
  doi          = {10.1016/J.DIIN.2004.08.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Watson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Wolfe04,
  author       = {Hank Wolfe},
  title        = {Penetrating encrypted evidence},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {2},
  pages        = {102--105},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.04.002},
  doi          = {10.1016/J.DIIN.2004.04.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Wolfe04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/X04,
  title        = {Events},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {45},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.008},
  doi          = {10.1016/J.DIIN.2004.01.008},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/X04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/X04a,
  title        = {Research summary},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {1},
  pages        = {47--49},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.diin.2004.01.009},
  doi          = {10.1016/J.DIIN.2004.01.009},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/X04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/X04b,
  title        = {Events},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {3},
  pages        = {213},
  year         = {2004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/X04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/X04c,
  title        = {News announcements},
  journal      = {Digit. Investig.},
  volume       = {1},
  number       = {4},
  pages        = {243--246},
  year         = {2004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/X04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}