default search action
Search dblp for Publications
export results for "toc:db/journals/di/di1.bht:"
@article{DBLP:journals/di/Altheide04, author = {Cory Altheide}, title = {Forensic analysis of Windows hosts using UNIX-based tools}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {197--212}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.004}, doi = {10.1016/J.DIIN.2004.07.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Altheide04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BoydF04, author = {Chris Boyd and Pete Forster}, title = {Time and date issues in forensic computing - a case study}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {18--23}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.002}, doi = {10.1016/J.DIIN.2004.01.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BoydF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BuchholzS04, author = {Florian P. Buchholz and Eugene H. Spafford}, title = {On the role of file system metadata in digital forensics}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {298--309}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.10.002}, doi = {10.1016/J.DIIN.2004.10.002}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BuchholzS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CarrierG04, author = {Brian D. Carrier and Joe Grand}, title = {A hardware-based memory acquisition procedure for digital investigations}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {50--60}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2003.12.001}, doi = {10.1016/J.DIIN.2003.12.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CarrierG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Carvey04, author = {Harlan Carvey}, title = {Instant messaging investigations on a live Windows {XP} system}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {256--260}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.10.003}, doi = {10.1016/J.DIIN.2004.10.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Carvey04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey04, author = {Eoghan Casey}, title = {The need for knowledge sharing and standardization}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {1--2}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.003}, doi = {10.1016/J.DIIN.2004.01.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey04a, author = {Eoghan Casey}, title = {Network traffic as a source of evidence: tool strengths, weaknesses, and future needs}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {28--43}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2003.12.002}, doi = {10.1016/J.DIIN.2003.12.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey04b, author = {Eoghan Casey}, title = {The need for objective case review}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {83--85}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.004}, doi = {10.1016/J.DIIN.2004.04.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey04c, author = {Eoghan Casey}, title = {Tool review - WinHex}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {114--128}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.001}, doi = {10.1016/J.DIIN.2004.04.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey04c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey04d, author = {Eoghan Casey}, title = {Reporting security breaches - a risk to be avoided or responsibility to be embraced?}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {151--161}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.008}, doi = {10.1016/J.DIIN.2004.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey04d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Casey04e, author = {Eoghan Casey}, title = {State of the field: growth, growth, growth}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {241--242}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.11.006}, doi = {10.1016/J.DIIN.2004.11.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Casey04e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CaseyS04, author = {Eoghan Casey and Aaron Stanley}, title = {Tool review - remote forensic preservation and examination tools}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {284--297}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.11.003}, doi = {10.1016/J.DIIN.2004.11.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CaseyS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Daniels04, author = {Thomas E. Daniels}, title = {A functional reference model of passive systems for tracing network traffic}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {69--81}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2003.12.003}, doi = {10.1016/J.DIIN.2003.12.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Daniels04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fellows04, author = {Geoff Fellows}, title = {Peer-to-peer networking issues - an overview}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {3--6}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.001}, doi = {10.1016/J.DIIN.2004.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fellows04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FerraroR04, author = {Monique Mattei Ferraro and Andrew Russell}, title = {Current issues confronting well-established computer-assisted child exploitation and computer crime task forces}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {7--15}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.004}, doi = {10.1016/J.DIIN.2004.01.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FerraroR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FreyssinetG04, author = {{\'{E}}ric Freyssinet and Zeno J. M. H. Geradts}, title = {Future issues in forensic computing and an introduction to {ENSFI}}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {112--113}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.008}, doi = {10.1016/J.DIIN.2004.04.008}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FreyssinetG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/George04, author = {Esther George}, title = {{UK} Computer Misuse Act - the Trojan virus defence: Regina v Aaron Caffrey, Southwark Crown Court, 17 October 2003}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {89}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.005}, doi = {10.1016/J.DIIN.2004.04.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/George04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GerberL04, author = {Matthew B. Gerber and John Leeson}, title = {Formalization of computer input and output: the Hadley model}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {214--224}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.001}, doi = {10.1016/J.DIIN.2004.07.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GerberL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GladyshevP04, author = {Pavel Gladyshev and Ahmed Patel}, title = {Finite state machine approach to digital event reconstruction}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {130--149}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.03.001}, doi = {10.1016/J.DIIN.2004.03.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GladyshevP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Hilley04, author = {Sarah Hilley}, title = {News announcements}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {86--88}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.007}, doi = {10.1016/J.DIIN.2004.04.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Hilley04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Hilley04a, author = {Sarah Hilley}, title = {Events}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {129}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.009}, doi = {10.1016/J.DIIN.2004.04.009}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Hilley04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Hilley04b, author = {Sarah Hilley}, title = {News}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {162--164}, year = {2004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Hilley04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Howell04, author = {Beryl A. Howell}, title = {Ambiguities in {US} law for investigators}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {106--111}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.003}, doi = {10.1016/J.DIIN.2004.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Howell04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Jones04, author = {Nigel Jones}, title = {Training and accreditation - who are the experts?}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {189--194}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.009}, doi = {10.1016/J.DIIN.2004.07.009}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Jones04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Jones04a, author = {Robert Jones}, title = {Your day in court - the r{\^{o}}le of the expert witness}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {273--278}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.11.001}, doi = {10.1016/J.DIIN.2004.11.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Jones04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/JonesM04, author = {Andy Jones and Christopher Meyler}, title = {What evidence is left after disk cleaners?}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {183--188}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.002}, doi = {10.1016/J.DIIN.2004.07.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/JonesM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Kenneally04, author = {Erin Kenneally}, title = {Digital logs - proof matters}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {94--101}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.006}, doi = {10.1016/J.DIIN.2004.01.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Kenneally04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Mellars04, author = {Barrie Mellars}, title = {Forensic examination of mobile phones}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {266--272}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.11.007}, doi = {10.1016/J.DIIN.2004.11.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Mellars04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Mocas04, author = {Sarah Mocas}, title = {Building theoretical underpinnings for digital forensics research}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {61--68}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2003.12.004}, doi = {10.1016/J.DIIN.2003.12.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Mocas04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nikkel04, author = {Bruce J. Nikkel}, title = {Domain name forensics: a systematic approach to investigating an internet presence}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {247--255}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.10.001}, doi = {10.1016/J.DIIN.2004.10.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Nikkel04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OConnor04, author = {Owen O'Connor}, title = {Deploying forensic tools via {PXE}}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {173--176}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.005}, doi = {10.1016/J.DIIN.2004.07.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OConnor04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Pemble04, author = {Matthew Pemble}, title = {Investigating around mainframes and other high-end systems: the revenge of big iron}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {90--93}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.006}, doi = {10.1016/J.DIIN.2004.04.006}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Pemble04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Schmitknecht04, author = {Douglas A. Schmitknecht}, title = {Building {FBI} computer forensics capacity: one lab at a time}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {177--182}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.007}, doi = {10.1016/J.DIIN.2004.07.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Schmitknecht04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sealey04, author = {Philip Sealey}, title = {Remote forensics}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {261--265}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.11.002}, doi = {10.1016/J.DIIN.2004.11.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sealey04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SolonH04, author = {Mark Solon and Penny Harper}, title = {Preparing evidence for court}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {279--283}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.11.005}, doi = {10.1016/J.DIIN.2004.11.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SolonH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sommer04, author = {Peter Sommer}, title = {The challenges of large computer evidence cases}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {16--17}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.005}, doi = {10.1016/J.DIIN.2004.01.005}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sommer04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Stephenson04, author = {Peter Stephenson}, title = {The right tools for the job}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {24--27}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.007}, doi = {10.1016/J.DIIN.2004.01.007}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Stephenson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Stevens04, author = {Malcolm W. Stevens}, title = {Unification of relative time frames for digital forensics}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {225--239}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.003}, doi = {10.1016/J.DIIN.2004.07.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Stevens04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Vaughan04, author = {Chris Vaughan}, title = {Xbox security issues and forensic recovery methodology (utilising Linux)}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {165--172}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.07.006}, doi = {10.1016/J.DIIN.2004.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Vaughan04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Vel04, author = {Olivier Y. de Vel}, title = {File classification using byte sub-stream kernels}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {150--157}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.03.002}, doi = {10.1016/J.DIIN.2004.03.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Vel04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Watson04, author = {D. Watson}, title = {Book Review}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {195--196}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.08.002}, doi = {10.1016/J.DIIN.2004.08.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Watson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Wolfe04, author = {Hank Wolfe}, title = {Penetrating encrypted evidence}, journal = {Digit. Investig.}, volume = {1}, number = {2}, pages = {102--105}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.04.002}, doi = {10.1016/J.DIIN.2004.04.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Wolfe04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X04, title = {Events}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {45}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.008}, doi = {10.1016/J.DIIN.2004.01.008}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X04a, title = {Research summary}, journal = {Digit. Investig.}, volume = {1}, number = {1}, pages = {47--49}, year = {2004}, url = {https://doi.org/10.1016/j.diin.2004.01.009}, doi = {10.1016/J.DIIN.2004.01.009}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X04b, title = {Events}, journal = {Digit. Investig.}, volume = {1}, number = {3}, pages = {213}, year = {2004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X04c, title = {News announcements}, journal = {Digit. Investig.}, volume = {1}, number = {4}, pages = {243--246}, year = {2004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X04c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.