default search action
Search dblp for Publications
export results for "toc:db/journals/jdfp/jdfp3.bht:"
@article{DBLP:journals/jdfp/BogenDVRAC10, author = {Alfred C. Bogen and David A. Dampier and Rayford B. Vaughn and Donna S. Reese and Edward B. Allen and Jeffrey C. Carver}, title = {Structured Forensics Examination Planning with Domain Modeling: {A} Report of Three Experiment Trials}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {23--32}, year = {2010}, url = {https://doi.org/10.1080/15567280903376896}, doi = {10.1080/15567280903376896}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BogenDVRAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BrungsJ10, author = {Angela Brungs and Rodger Jamieson}, title = {Identification of Legal Issues for Computer Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {140--149}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536740}, doi = {10.1080/15567281.2010.536740}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BrungsJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/EtgesS10, author = {Rafael Etges and Emma Sutcliffe}, title = {An Overview of Transnational Organized Cyber Crime}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {106--114}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536731}, doi = {10.1080/15567281.2010.536731}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/EtgesS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Freeman10, author = {Edward H. Freeman}, title = {Computer Printouts as Legal Evidence}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {98--105}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536730}, doi = {10.1080/15567281.2010.536730}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Freeman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Geers10, author = {Kenneth Geers}, title = {The Cyber Threat to National Critical Infrastructures: Beyond Theory}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {124--130}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536735}, doi = {10.1080/15567281.2010.536735}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Geers10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GloeB10, author = {Thomas Gloe and Rainer B{\"{o}}hme}, title = {The Dresden Image Database for Benchmarking Digital Image Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {150--159}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.531500}, doi = {10.1080/15567281.2010.531500}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GloeB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GogolinJ10, author = {Greg Gogolin and James Jones}, title = {Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {131--139}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536737}, doi = {10.1080/15567281.2010.536737}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GogolinJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GuoS10, author = {Yinghua Guo and Jill Slay}, title = {Testing Forensic Copy Function of Computer Forensics Investigation Tools}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {46--61}, year = {2010}, url = {https://doi.org/10.1080/15567280903521392}, doi = {10.1080/15567280903521392}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GuoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kessler10, author = {Gary C. Kessler}, title = {\emph{Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility}. By A. Jones and C. Valli}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {62--63}, year = {2010}, url = {https://doi.org/10.1080/15567280903463801}, doi = {10.1080/15567280903463801}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kessler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kessler10a, author = {Gary C. Kessler}, title = {\emph{Windows Forensic Analysis {DVD} Toolkit}, 2nd edition. By Harlan Carvey}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {64--66}, year = {2010}, url = {https://doi.org/10.1080/15567280903463819}, doi = {10.1080/15567280903463819}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kessler10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/KesslerH10, author = {Gary C. Kessler and Don A. Haggerty}, title = {An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {11--22}, year = {2010}, url = {https://doi.org/10.1080/15567280903357771}, doi = {10.1080/15567280903357771}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/KesslerH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/LiebrockPH10, author = {Lorie M. Liebrock and Brajendra Panda and Robert L. Hutchinson}, title = {Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {4}, year = {2010}, url = {https://doi.org/10.1080/15567280903177856}, doi = {10.1080/15567280903177856}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/LiebrockPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Matusitz10, author = {Jonathan Matusitz}, title = {Cyberterrorism: Postmodern State of Chaos}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {115--123}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536733}, doi = {10.1080/15567281.2010.536733}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Matusitz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/MohamadPHD10, author = {Kamaruddin Malik Mohamad and Ahmed Patel and Tutut Herawan and Mustafa Mat Deris}, title = {myKarve: {JPEG} Image and Thumbnail Carver}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {74--97}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.531607}, doi = {10.1080/15567281.2010.531607}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/MohamadPHD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt10, author = {Mark Pollitt}, title = {Forensic Twitter}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {1--3}, year = {2010}, url = {https://doi.org/10.1080/15567280903171024}, doi = {10.1080/15567280903171024}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Riley10, author = {John H. Riley Jr.}, title = {Recycling in Vista{\textregistered}}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {5--10}, year = {2010}, url = {https://doi.org/10.1080/15567280903357763}, doi = {10.1080/15567280903357763}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Riley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Suffern10, author = {Lawrence Suffern}, title = {A Study of Current Trends in Database Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {67--73}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.500646}, doi = {10.1080/15567281.2010.500646}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Suffern10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/ZwanC10, author = {Pawel Zwan and Andrzej Czyzewski}, title = {Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {33--45}, year = {2010}, url = {https://doi.org/10.1080/15567280903493881}, doi = {10.1080/15567280903493881}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/ZwanC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.