default search action
Search dblp for Publications
export results for "toc:db/journals/ijde/ijde2.bht:"
@article{DBLP:journals/ijde/Alvarez04, author = {Paul Alvarez}, title = {Using Extended File Information {(EXIF)} File Headers in Digital Evidence Analysis}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {3}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B1F944-FF4E-4788-E75541A7418DAE24.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Alvarez04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/CarneyR04, author = {Megan Carney and Marc Roger}, title = {The Trojan Made Me Do It: {A} First Step in Statistical Based Computer Forensics Event Reconstruction}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {4}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B2CCCB-E6FC-6840-AF4A01356B9B687A.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/CarneyR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Charles04, author = {Kellep A. Charles}, title = {Decoy Systems: {A} New Player in Network Security and Computer Incident Response}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {3}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B19A3E-0CDE-0D0C-1CFD069F245C3BFF.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Charles04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/GuptaMR04, author = {Gaurav Gupta and Chandan Mazumdar and M. S. Rao}, title = {Digital Forensic Analysis of E-Mails: {A} Trusted E-Mail Protocol}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {4}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B4342D-E76E-F8F2-AC926AB64EC719B8.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/GuptaMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Rowlingson04, author = {Robert Rowlingson}, title = {A Ten Step Process for Forensic Readiness}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {3}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B13342-B4E0-1F6A-156F501C49CF5F51.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Rowlingson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Shannon04, author = {Matthew M. Shannon}, title = {Forensic Relative Strength Scoring: {ASCII} and Entropy Scoring}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {4}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B3DC9E-F145-4A89-36F7462B629759FE.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Shannon04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/SiegfriedSCH04, author = {Jason Siegfried and Christine Siedsma and Bobbie{-}Jo Countryman and Chester D. Hosmer}, title = {Examining the Encryption Threat}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {3}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B0C4A4-9660-B26E-12521C098684EF12.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/SiegfriedSCH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Adelstein03, author = {Frank Adelstein}, title = {{MFP:} The Mobile Forensic Platform}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {1}, year = {2003}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A066554D-DCDD-75EE-BE7275064C961B5D.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Adelstein03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/BaileyC03, author = {Karen Bailey and Kevin Curran}, title = {An Evaluation of Image Based Steganography Methods}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {2}, year = {2003}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AD276C-EACF-6F38-E32EFA1ADF1E36CC.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/BaileyC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/CarrierS03, author = {Brian D. Carrier and Eugene H. Spafford}, title = {Getting Physical with the Digital Investigation Process}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {2}, year = {2003}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AC5A7A-FB6C-325D-BF515A44FDEE7459.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/CarrierS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Patzakis03, author = {John Patzakis}, title = {New Accounting Reform Laws Push for Technology-Based Document Retention Practices}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {1}, year = {2003}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A065F149-C151-FB73-1E0034E98EB1D145.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Patzakis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Seward03, author = {Jack Seward}, title = {The Debtor's Digital Reckonings}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {2}, year = {2003}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AE0A62-D73A-CB30-B0C1363FC9B1E185.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Seward03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Stephenson03, author = {Peter Stephenson}, title = {Modeling of Post-Incident Root Cause Analysis}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {2}, year = {2003}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0AE98D6-E1F6-1C9D-481CEE8C29401BFE.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Stephenson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/Willassen03, author = {Svein Yngvar Willassen}, title = {Forensics and the {GSM} Mobile Telephone System}, journal = {Int. J. Digit. EVid.}, volume = {2}, number = {1}, year = {2003}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0658858-BFF6-C537-7CF86A78D6DE746D.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/Willassen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.