Search dblp for Publications

export results for "toc:db/journals/ijde/ijde2.bht:"

 download as .bib file

@article{DBLP:journals/ijde/Alvarez04,
  author       = {Paul Alvarez},
  title        = {Using Extended File Information {(EXIF)} File Headers in Digital Evidence
                  Analysis},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {3},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B1F944-FF4E-4788-E75541A7418DAE24.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Alvarez04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/CarneyR04,
  author       = {Megan Carney and
                  Marc Roger},
  title        = {The Trojan Made Me Do It: {A} First Step in Statistical Based Computer
                  Forensics Event Reconstruction},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {4},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B2CCCB-E6FC-6840-AF4A01356B9B687A.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/CarneyR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Charles04,
  author       = {Kellep A. Charles},
  title        = {Decoy Systems: {A} New Player in Network Security and Computer Incident
                  Response},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {3},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B19A3E-0CDE-0D0C-1CFD069F245C3BFF.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Charles04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/GuptaMR04,
  author       = {Gaurav Gupta and
                  Chandan Mazumdar and
                  M. S. Rao},
  title        = {Digital Forensic Analysis of E-Mails: {A} Trusted E-Mail Protocol},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {4},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B4342D-E76E-F8F2-AC926AB64EC719B8.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/GuptaMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Rowlingson04,
  author       = {Robert Rowlingson},
  title        = {A Ten Step Process for Forensic Readiness},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {3},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B13342-B4E0-1F6A-156F501C49CF5F51.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Rowlingson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Shannon04,
  author       = {Matthew M. Shannon},
  title        = {Forensic Relative Strength Scoring: {ASCII} and Entropy Scoring},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {4},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B3DC9E-F145-4A89-36F7462B629759FE.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Shannon04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/SiegfriedSCH04,
  author       = {Jason Siegfried and
                  Christine Siedsma and
                  Bobbie{-}Jo Countryman and
                  Chester D. Hosmer},
  title        = {Examining the Encryption Threat},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {3},
  year         = {2004},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B0C4A4-9660-B26E-12521C098684EF12.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/SiegfriedSCH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Adelstein03,
  author       = {Frank Adelstein},
  title        = {{MFP:} The Mobile Forensic Platform},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {1},
  year         = {2003},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A066554D-DCDD-75EE-BE7275064C961B5D.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Adelstein03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/BaileyC03,
  author       = {Karen Bailey and
                  Kevin Curran},
  title        = {An Evaluation of Image Based Steganography Methods},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {2},
  year         = {2003},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AD276C-EACF-6F38-E32EFA1ADF1E36CC.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/BaileyC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/CarrierS03,
  author       = {Brian D. Carrier and
                  Eugene H. Spafford},
  title        = {Getting Physical with the Digital Investigation Process},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {2},
  year         = {2003},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AC5A7A-FB6C-325D-BF515A44FDEE7459.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/CarrierS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Patzakis03,
  author       = {John Patzakis},
  title        = {New Accounting Reform Laws Push for Technology-Based Document Retention
                  Practices},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {1},
  year         = {2003},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A065F149-C151-FB73-1E0034E98EB1D145.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Patzakis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Seward03,
  author       = {Jack Seward},
  title        = {The Debtor's Digital Reckonings},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {2},
  year         = {2003},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AE0A62-D73A-CB30-B0C1363FC9B1E185.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Seward03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Stephenson03,
  author       = {Peter Stephenson},
  title        = {Modeling of Post-Incident Root Cause Analysis},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {2},
  year         = {2003},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AE98D6-E1F6-1C9D-481CEE8C29401BFE.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Stephenson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/Willassen03,
  author       = {Svein Yngvar Willassen},
  title        = {Forensics and the {GSM} Mobile Telephone System},
  journal      = {Int. J. Digit. EVid.},
  volume       = {2},
  number       = {1},
  year         = {2003},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0658858-BFF6-C537-7CF86A78D6DE746D.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/Willassen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}