default search action
Search dblp for Publications
export results for "toc:db/journals/di/di48.bht:"
@article{DBLP:journals/di/AlSharifAA24, author = {Ziad A. Al{-}Sharif and Reema Al{-}Senjalawi and Omar A. Alzoubi}, title = {The effects of document's format, size, and storage media on memory forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301692}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301692}, doi = {10.1016/J.FSIDI.2024.301692}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlSharifAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/BreitingerHHSOS24, author = {Frank Breitinger and Jan{-}Niclas Hilgert and Christopher Hargreaves and John Sheppard and Rebekah Overdorf and Mark Scanlon}, title = {{DFRWS} {EU} 10-year review and future directions in Digital Forensic Research}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301685}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301685}, doi = {10.1016/J.FSIDI.2023.301685}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/BreitingerHHSOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DeutschmannB24, author = {Matthias Deutschmann and Harald Baier}, title = {Ubi est indicium? On forensic analysis of the {UBI} file system}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301689}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301689}, doi = {10.1016/J.FSIDI.2023.301689}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DeutschmannB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/DunsinGOV24, author = {Dipo Dunsin and Mohamed Chahine Ghanem and Karim Ouazzane and Vassil T. Vassilev}, title = {A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301675}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301675}, doi = {10.1016/J.FSIDI.2023.301675}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/DunsinGOV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EbbersGBFS24, author = {Simon Ebbers and Stefan Gense and Mouad Bakkouch and Felix C. Freiling and Sebastian Schinzel}, title = {Grand theft {API:} {A} forensic analysis of vehicle cloud data}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301691}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301691}, doi = {10.1016/J.FSIDI.2023.301691}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EbbersGBFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/EichhornSP24, author = {Maximilian Eichhorn and Janine Schneider and Gaston Pugliese}, title = {Well Played, Suspect! - Forensic examination of the handheld gaming console "Steam Deck"}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301688}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301688}, doi = {10.1016/J.FSIDI.2023.301688}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/EichhornSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Findlay24, author = {Benjamin Findlay}, title = {Techniques and methods for obtaining access to data protected by linux-based encryption - {A} reference guide for practitioners}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301662}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301662}, doi = {10.1016/J.FSIDI.2023.301662}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Findlay24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/FukamiBG24, author = {Aya Fukami and Richard Buurke and Zeno Geradts}, title = {Exploiting {RPMB} authentication in a closed source {TEE} implementation}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301682}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301682}, doi = {10.1016/J.FSIDI.2023.301682}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/FukamiBG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GrisposSA24, author = {George Grispos and Hudan Studiawan and Saed Alrabaee}, title = {Internet of things (IoT) forensics and incident response: The good, the bad, and the unaddressed}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301671}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301671}, doi = {10.1016/J.FSIDI.2023.301671}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GrisposSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HargreavesNC24, author = {Christopher Hargreaves and Alex Nelson and Eoghan Casey}, title = {An abstract model for digital forensic analysis tools - {A} foundation for systematic error mitigation analysis}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301679}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301679}, doi = {10.1016/J.FSIDI.2023.301679}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HargreavesNC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HilgertLB24, author = {Jan{-}Niclas Hilgert and Martin Lambertz and Daniel Baier}, title = {Forensic implications of stacked file systems}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301678}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301678}, doi = {10.1016/J.FSIDI.2023.301678}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HilgertLB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Horsman24, author = {Graeme Horsman}, title = {Sources of error in digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301693}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301693}, doi = {10.1016/J.FSIDI.2024.301693}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Horsman24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MangeardTMY24, author = {Philippe Mangeard and Bhaskar Tejaswi and Mohammad Mannan and Amr M. Youssef}, title = {{WARNE:} {A} stalkerware evidence collection tool}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301677}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301677}, doi = {10.1016/J.FSIDI.2023.301677}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MangeardTMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/McKeownAS24, author = {Sean McKeown and Peter Aaby and Andreas Steyven}, title = {{PHASER:} Perceptual hashing algorithms evaluation and results - An open source forensic framework}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301680}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301680}, doi = {10.1016/J.FSIDI.2023.301680}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/McKeownAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MeerBJD24, author = {Vincent van der Meer and Jeroen van den Bos and Hugo Jonker and Laurent Dassen}, title = {Problem solved: {A} reliable, deterministic method for {JPEG} fragmentation point detection}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301687}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301687}, doi = {10.1016/J.FSIDI.2023.301687}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MeerBJD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MicheletB24, author = {Ga{\"{e}}tan Michelet and Frank Breitinger}, title = {ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301683}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301683}, doi = {10.1016/J.FSIDI.2023.301683}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MicheletB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/MombelliLB24, author = {Samuele Mombelli and James R. Lyle and Frank Breitinger}, title = {FAIRness in digital forensics datasets' metadata - and how to improve it}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301681}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301681}, doi = {10.1016/J.FSIDI.2023.301681}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/MombelliLB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/NavanesanLSZS24, author = {Lojenaa Navanesan and Nhien{-}An Le{-}Khac and Mark Scanlon and Kasun De Zoysa and Asanka P. Sayakkara}, title = {Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301684}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301684}, doi = {10.1016/J.FSIDI.2023.301684}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/NavanesanLSZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/OnikABW24, author = {Abdur Rahman Onik and Ruba Alsmadi and Ibrahim Baggili and Andrew M. Webb}, title = {So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301686}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301686}, doi = {10.1016/J.FSIDI.2023.301686}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/OnikABW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ParkLLJKBCL24, author = {Nam In Park and Ji Woo Lee and Seong Ho Lim and Oc{-}Yeub Jeon and Jin{-}Hwan Kim and Jun Seok Byun and Chanjun Chun and Jung Hwan Lee}, title = {Advanced forensic method to authenticate audio files from Tizen-based Samsung Galaxy Watches}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301697}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301697}, doi = {10.1016/J.FSIDI.2024.301697}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ParkLLJKBCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SandhyaK24, author = {Sandhya and Abhishek Kashyap}, title = {A novel method for real-time object-based copy-move tampering localization in videos using fine-tuned {YOLO} {V8}}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301663}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301663}, doi = {10.1016/J.FSIDI.2023.301663}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SandhyaK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SchmittB24, author = {Veronica Schmitt and Emlyn Butterfield}, title = {Digital forensics in healthcare: An analysis of data associated with a {CPAP} machine}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301661}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301661}, doi = {10.1016/J.FSIDI.2023.301661}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SchmittB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SoniKB24, author = {Nishchal Soni and Manpreet Kaur and Vishwas Bhardwaj}, title = {A forensic analysis of AnyDesk Remote Access application by using various forensic tools and techniques}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301695}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301695}, doi = {10.1016/J.FSIDI.2024.301695}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SoniKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ThomasBransFCHS24, author = {Fabien Thomas{-}Brans and Aya Fukami and Q. Clement and Thibaut Heckmann and Damien Sauveron}, title = {Case of study for in situ memory reading on damaged MultiMedia Card}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301698}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301698}, doi = {10.1016/J.FSIDI.2024.301698}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ThomasBransFCHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WolfGB24, author = {Dennis Wolf and Thomas G{\"{o}}bel and Harald Baier}, title = {Hypervisor-based data synthesis: On its potential to tackle the curse of client-side agent remnants in forensic image generation}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301690}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301690}, doi = {10.1016/J.FSIDI.2023.301690}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/WolfGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24, title = {Welcome to the 11th annual {DFRWS} Europe conference!}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301694}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301694}, doi = {10.1016/J.FSIDI.2024.301694}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24a, title = {{DFRWS} {USA} 2024 Baton Rouge}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301704}, year = {2024}, url = {https://doi.org/10.1016/s2666-2817(24)00016-7}, doi = {10.1016/S2666-2817(24)00016-7}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24b, title = {{DFRWS} {APAC} 2024 Brisbane}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301705}, year = {2024}, url = {https://doi.org/10.1016/s2666-2817(24)00017-9}, doi = {10.1016/S2666-2817(24)00017-9}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/X24c, title = {The role of R{\&}D in combating digital deception}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301732}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2024.301732}, doi = {10.1016/J.FSIDI.2024.301732}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/X24c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ZengFWZLW24, author = {Chunyan Zeng and Shixiong Feng and Zhifeng Wang and Yuhao Zhao and Kun Li and Xiangkui Wan}, title = {Audio source recording device recognition based on representation learning of sequential Gaussian mean matrix}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {48}, pages = {301676}, year = {2024}, url = {https://doi.org/10.1016/j.fsidi.2023.301676}, doi = {10.1016/J.FSIDI.2023.301676}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ZengFWZLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.