default search action
Search dblp for Publications
export results for "toc:db/journals/di/di40.bht:"
@article{DBLP:journals/di/AkilalK22, author = {Abdellah Akilal and M. Tahar Kechadi}, title = {An improved forensic-by-design framework for cloud computing with systems engineering standard compliance}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301315}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301315}, doi = {10.1016/J.FSIDI.2021.301315}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AkilalK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BahamazavaN22, author = {Katsiaryna Bahamazava and Rohan Nanda}, title = {The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301377}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301377}, doi = {10.1016/J.FSIDI.2022.301377}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BahamazavaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BangPL22, author = {Jewan Bang and Jungheum Park and Sangjin Lee}, title = {Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301376}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301376}, doi = {10.1016/J.FSIDI.2022.301376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BangPL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/CalderoniM22, author = {Luca Calderoni and Antonio Magnani}, title = {The impact of face image compression in future generation electronic identity documents}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301345}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301345}, doi = {10.1016/J.FSIDI.2022.301345}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/CalderoniM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChamotGH22, author = {Frederic Chamot and Zeno J. M. H. Geradts and Evert Haasdijk}, title = {Deepfake forensics: Cross-manipulation robustness of feedforward- and recurrent convolutional forgery detection methods}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301374}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301374}, doi = {10.1016/J.FSIDI.2022.301374}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChamotGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ClosserB22, author = {Dayton Closser and Elias Bou{-}Harb}, title = {A live digital forensics approach for quantum mechanical computers}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301341}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301341}, doi = {10.1016/J.FSIDI.2022.301341}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ClosserB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DaviesMB22, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {NapierOne: {A} modern mixed file data set alternative to Govdocs1}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301330}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301330}, doi = {10.1016/J.FSIDI.2021.301330}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DaviesMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Fernandez-Alvarez22, author = {Pedro Fern{\'{a}}ndez{-}{\'{A}}lvarez and Ricardo J. Rodr{\'{\i}}guez}, title = {Extraction and analysis of retrievable memory artifacts from Windows Telegram Desktop application}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301342}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301342}, doi = {10.1016/J.FSIDI.2022.301342}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Fernandez-Alvarez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GobelMTBM22, author = {Thomas G{\"{o}}bel and Stephan Maltan and Jan T{\"{u}}rr and Harald Baier and Florian Mann}, title = {ForTrace - {A} holistic forensic data set synthesis framework}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301344}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301344}, doi = {10.1016/J.FSIDI.2022.301344}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GobelMTBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HiranoHK22, author = {Manabu Hirano and Ryo Hodota and Ryotaro Kobayashi}, title = {RanSAP: An open dataset of ransomware storage access patterns for training machine learning models}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301314}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301314}, doi = {10.1016/J.FSIDI.2021.301314}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HiranoHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman22, author = {Graeme Horsman}, title = {Conducting a 'manual examination' of a device as part of a digital investigation}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301331}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301331}, doi = {10.1016/J.FSIDI.2021.301331}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman22a, author = {Graeme Horsman}, title = {Defining principles for preserving privacy in digital forensic examinations}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301350}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301350}, doi = {10.1016/J.FSIDI.2022.301350}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Jaquet-Chiffelle22, author = {David{-}Olivier Jaquet{-}Chiffelle and Eoghan Casey and Jonathan Bourquenoud}, title = {Corrigendum to "Tamperproof timestamped provenance ledger using blockchain technology{\({_\ast}\)}" [Forens. Sci. Int.: Digit. Invest. 33 {(2020)} 300977]}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301332}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301332}, doi = {10.1016/J.FSIDI.2022.301332}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Jaquet-Chiffelle22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhaireK22, author = {Pushpajit Khaire and Praveen Kumar}, title = {A semi-supervised deep learning based video anomaly detection framework using {RGB-D} for surveillance of real-world critical environments}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301346}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301346}, doi = {10.1016/J.FSIDI.2022.301346}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhaireK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KimKSYSLK22, author = {Soram Kim and Giyoon Kim and Sumin Shin and Byungchul Youn and Jian Song and Insoo Lee and Jongsung Kim}, title = {Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301353}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301353}, doi = {10.1016/J.FSIDI.2022.301353}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KimKSYSLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/LamshoftNHVD22, author = {Kevin Lamsh{\"{o}}ft and Tom Neubert and Jonas Hielscher and Claus Vielhauer and Jana Dittmann}, title = {Knock, knock, log: Threat analysis, detection {\&} mitigation of covert channels in syslog using port scans as cover}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301335}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301335}, doi = {10.1016/J.FSIDI.2022.301335}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/LamshoftNHVD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Marshall22, author = {Angus M. Marshall}, title = {The unwanted effects of imprecise language in forensic science standards}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301349}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301349}, doi = {10.1016/J.FSIDI.2022.301349}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Marshall22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NealeKPYN22, author = {Christopher Neale and Ian Kennedy and Blaine A. Price and Yijun Yu and Bashar Nuseibeh}, title = {The case for Zero Trust Digital Forensics}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301352}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301352}, doi = {10.1016/J.FSIDI.2022.301352}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NealeKPYN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Nikkel22, author = {Bruce J. Nikkel}, title = {Editorial}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301388}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301388}, doi = {10.1016/J.FSIDI.2022.301388}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Nikkel22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ProfTC22, author = {Felix Olu Bankole and Ayankunle A. Taiwo and Ivan Claims}, title = {An extended digital forensic readiness and maturity model}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301348}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301348}, doi = {10.1016/J.FSIDI.2022.301348}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ProfTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RaisALA22, author = {Muhammad Haris Rais and Rima Asmar Awad and Juan Lopez Jr. and Irfan Ahmed}, title = {Memory forensic analysis of a programmable logic controller in industrial control systems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301339}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301339}, doi = {10.1016/J.FSIDI.2022.301339}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/RaisALA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandvikFAA22, author = {Jens{-}Petter Sandvik and Katrin Franke and Habtamu Abie and Andr{\'{e}} {\AA}rnes}, title = {Quantifying data volatility for IoT forensics with examples from Contiki {OS}}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301343}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301343}, doi = {10.1016/J.FSIDI.2022.301343}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandvikFAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchneiderDLDF22, author = {Janine Schneider and Linus D{\"{u}}sel and Benedikt Lorch and Julia Drafz and Felix C. Freiling}, title = {Prudent design principles for digital tampering experiments}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301334}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301334}, doi = {10.1016/J.FSIDI.2022.301334}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchneiderDLDF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SentanoeR22, author = {Stewart Sentanoe and Hans P. Reiser}, title = {\emph{SSHkex}: Leveraging virtual machine introspection for extracting {SSH} keys and decrypting {SSH} network traffic}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301337}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301337}, doi = {10.1016/J.FSIDI.2022.301337}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SentanoeR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinCS22, author = {Jiho Shin and Hyunpyo Choi and Jung{-}Taek Seo}, title = {A study on command block collection and restoration techniques through detection of project file manipulation on engineering workstation of industrial control system}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301354}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301354}, doi = {10.1016/J.FSIDI.2022.301354}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ShinKKK22, author = {Sumin Shin and Giyoon Kim and Soram Kim and Jongsung Kim}, title = {Forensic analysis of note and journal applications}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301355}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301355}, doi = {10.1016/J.FSIDI.2022.301355}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ShinKKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sommer22, author = {Peter Sommer}, title = {Evidence from hacking: {A} few tiresome problems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301333}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301333}, doi = {10.1016/J.FSIDI.2022.301333}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sommer22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SonKOK22, author = {Jihun Son and Yeong Woong Kim and Dong Bin Oh and Kyounggon Kim}, title = {Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301347}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301347}, doi = {10.1016/J.FSIDI.2022.301347}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SonKOK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/StoykovaAFA22, author = {Radina Stoykova and Stig Andersen and Katrin Franke and Stefan Axelsson}, title = {Reliability assessment of digital forensic investigations in the Norwegian police}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301351}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301351}, doi = {10.1016/J.FSIDI.2022.301351}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/StoykovaAFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Sunde22, author = {Nina Sunde}, title = {Strategies for safeguarding examiner objectivity and evidence reliability during digital forensic investigations}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301317}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2021.301317}, doi = {10.1016/J.FSIDI.2021.301317}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Sunde22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThierryM22, author = {Aur{\'{e}}lien Thierry and Tilo M{\"{u}}ller}, title = {A systematic approach to understanding {MACB} timestamps on Unix-like systems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301338}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301338}, doi = {10.1016/J.FSIDI.2022.301338}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThierryM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasEB22, author = {Tyler Thomas and Tiffanie Edwards and Ibrahim M. Baggili}, title = {BlockQuery: Toward forensically sound cryptocurrency investigation}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301340}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301340}, doi = {10.1016/J.FSIDI.2022.301340}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThomasEB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZubairAYA22, author = {Nauman Zubair and Adeen Ayub and Hyunguk Yoo and Irfan Ahmed}, title = {{PEM:} Remote forensic acquisition of {PLC} memory in industrial control systems}, journal = {Digit. Investig.}, volume = {40}, number = {Supplement}, pages = {301336}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301336}, doi = {10.1016/J.FSIDI.2022.301336}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ZubairAYA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.