default search action
Search dblp for Publications
export results for "toc:db/journals/jdfsl/jdfsl8.bht:"
@article{DBLP:journals/jdfsl/AdamsHM13, author = {Richard Brian Adams and Valerie Hobbs and Graham Mann}, title = {The Advanced Data Acquisition Model {(ADAM):} {A} Process Model for Digital Forensic Practice}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {25--48}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1154}, doi = {10.15394/JDFSL.2013.1154}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AdamsHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Bartolomie13, author = {Joshua Bartolomie}, title = {Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {87--90}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1152}, doi = {10.15394/JDFSL.2013.1152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Bartolomie13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Carlton13, author = {Gregory H. Carlton}, title = {A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {17--38}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1139}, doi = {10.15394/JDFSL.2013.1139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Carlton13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen13, author = {Fred Cohen}, title = {Science Column: Measuring Inconsistency Methods for Evidentiary Value}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {7--16}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1138}, doi = {10.15394/JDFSL.2013.1138}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen13a, author = {Fred Cohen}, title = {Science Column: Reconstruction: The Experimental Side of Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {49--56}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1155}, doi = {10.15394/JDFSL.2013.1155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Garfinkel13, author = {Simson L. Garfinkel}, title = {Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {65--68}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1157}, doi = {10.15394/JDFSL.2013.1157}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Garfinkel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler13, author = {Gary C. Kessler}, title = {Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {57--64}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1156}, doi = {10.15394/JDFSL.2013.1156}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Larson13, author = {Stephen Parker Larson}, title = {Analysis of Second Hand Google Mini Search Appliance}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {7--24}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1153}, doi = {10.15394/JDFSL.2013.1153}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Larson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MabutoV13, author = {Enos K. Mabuto and Hein S. Venter}, title = {System-Generated Digital Forensic Evidence in Graphic Design Applications}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {71--86}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1151}, doi = {10.15394/JDFSL.2013.1151}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MabutoV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MehmetB13, author = {Murad Mehmet and Miguel Fuentes Buchholtz}, title = {Money Laundering Detection Framework to Link the Disparate and Evolving Schemes}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {41--70}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1150}, doi = {10.15394/JDFSL.2013.1150}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MehmetB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Nash13, author = {Thomas Nash}, title = {Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {115--118}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1146}, doi = {10.15394/JDFSL.2013.1146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Nash13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RuhnkaL13, author = {John C. Ruhnka and Windham E. Loopesko}, title = {Risk Management Of Email And Internet Use In The Workplace}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {7--20}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1148}, doi = {10.15394/JDFSL.2013.1148}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RuhnkaL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Schofield13, author = {Damian Schofield}, title = {Visualizing Forensic Data: Evidence Guidelines (Part 1)}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {73--90}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1141}, doi = {10.15394/JDFSL.2013.1141}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Schofield13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SchofieldF13, author = {Damian Schofield and Ken Fowle}, title = {Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2)}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {93--114}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1145}, doi = {10.15394/JDFSL.2013.1145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SchofieldF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ShaerpourDM13, author = {Kaveh Shaerpour and Ali Dehghantanha and Ramlan Mahmod}, title = {Trends In Android Malware Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {21--40}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1149}, doi = {10.15394/JDFSL.2013.1149}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ShaerpourDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Shaw13, author = {Eric D. Shaw}, title = {How Often is Employee Anger an Insider Risk I?}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {39--72}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1140}, doi = {10.15394/JDFSL.2013.1140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Shaw13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Shaw13a, author = {Eric D. Shaw}, title = {How Often is Employee Aanger an Insider Risk II?}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {73--92}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1144}, doi = {10.15394/JDFSL.2013.1144}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Shaw13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghBM13, author = {Kishore Singh and Peter J. Best and Joseph M. Mula}, title = {Automating Vendor Fraud Detection in Enterprise Systems}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {7--40}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1142}, doi = {10.15394/JDFSL.2013.1142}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ThompsonL13, author = {Nik Thompson and Kevin Lee}, title = {The Digital Forensics and Security Challenge of {QR} Codes}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {41--72}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1143}, doi = {10.15394/JDFSL.2013.1143}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ThompsonL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.