default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2013
- Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas:
JPEG steganography detection with Benford's Law. Digit. Investig. 9(3-4): 246-257 (2013) - Eoghan Casey:
Experimental design challenges in digital forensics. Digit. Investig. 9(3-4): 167-169 (2013) - Jan Collie:
The windows IconCache.db: A resource for forensic artifacts from USB connectable devices. Digit. Investig. 9(3-4): 200-210 (2013) - Marnix Kaart, C. Klaver, Ruud B. van Baar:
Forensic access to Windows Mobile pim.vol and other Embedded Database (EDB) volumes. Digit. Investig. 9(3-4): 170-192 (2013) - Omed S. Khalind, Julio C. Hernandez-Castro, Benjamin Aziz:
A study on the false positive rate of Stegdetect. Digit. Investig. 9(3-4): 235-245 (2013) - Joseph Lewthwaite:
FrostWire P2P forensic examinations. Digit. Investig. 9(3-4): 211-221 (2013) - G. Stevenson Smith:
Using jump lists to identify fraudulent documents. Digit. Investig. 9(3-4): 193-199 (2013) - Muhammad Yasin, Muhammad Abulaish:
DigLA - A Digsby log analysis tool to identify forensic artifacts. Digit. Investig. 9(3-4): 222-234 (2013) - 2012
- Mohammed I. Al-Saleh, Ziad A. Al-Sharif:
Utilizing data lifetime of TCP buffers in digital forensics: Empirical study. Digit. Investig. 9(2): 119-124 (2012) - R. A. F. Bhoedjang, Alex van Ballegooij, Harm M. A. van Beek, J. C. van Schie, F. W. Dillema, Ruud B. van Baar, F. A. Ouwendijk, M. Streppel:
Engineering an online computer forensic service. Digit. Investig. 9(2): 96-108 (2012) - Ralf D. Brown:
Finding and identifying text in 900+ languages. Digit. Investig. 9(Supplement): S34-S43 (2012) - Eoghan Casey:
Editorial: IT security is not enough. Digit. Investig. 9(1): 1-2 (2012) - Eoghan Casey:
Cloud computing and digital forensics. Digit. Investig. 9(2): 69-70 (2012) - Hyunji Chung, Jungheum Park, Sangjin Lee, Cheulhoon Kang:
Digital forensic investigation of cloud storage services. Digit. Investig. 9(2): 81-95 (2012) - Zhui Deng, Dongyan Xu, Xiangyu Zhang, Xuxian Jiang:
IntroLib: Efficient and transparent library call introspection for malware forensics. Digit. Investig. 9(Supplement): S13-S23 (2012) - Qiong Dong, Gaobo Yang, Ningbo Zhu:
A MCEA based passive forensics scheme for detecting frame-based video tampering. Digit. Investig. 9(2): 151-159 (2012) - Rafal Drezewski, Jan Sepielak, Wojciech Filipkowski:
System supporting money laundering detection. Digit. Investig. 9(1): 8-21 (2012) - Josiah Dykstra, Alan T. Sherman:
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digit. Investig. 9(Supplement): S90-S98 (2012) - Kevin D. Fairbanks:
An analysis of Ext4 for digital forensics. Digit. Investig. 9(Supplement): S118-S130 (2012) - Oluwasola Mary Fasan, Martin S. Olivier:
Correctness proof for database reconstruction algorithm. Digit. Investig. 9(2): 138-150 (2012) - Simran Fitzgerald, George Mathews, Colin Morris, Oles Zhulyn:
Using NLP techniques for file fragment classification. Digit. Investig. 9(Supplement): S44-S49 (2012) - Simson L. Garfinkel:
Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus. Digit. Investig. 9(Supplement): S80-S89 (2012) - Simson L. Garfinkel, Alex J. Nelson, Joel Young:
A general strategy for differential forensic analysis. Digit. Investig. 9(Supplement): S50-S59 (2012) - Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:
Bin-Carver: Automatic recovery of binary executable files. Digit. Investig. 9(Supplement): S108-S117 (2012) - Christopher James Hargreaves, Jonathan Patterson:
An automated timeline reconstruction approach for digital forensic investigations. Digit. Investig. 9(Supplement): S69-S79 (2012) - Brian Jones, Syd Pleno, Michael Wilkinson:
The use of random sampling in investigations involving child abuse material. Digit. Investig. 9(Supplement): S99-S107 (2012) - Harjinder Singh Lallie:
An overview of the digital forensic investigation infrastructure of India. Digit. Investig. 9(1): 3-7 (2012) - Ben Martini, Kim-Kwang Raymond Choo:
An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9(2): 71-80 (2012) - Ghulam Muhammad, Muhammad Hussain, George Bebis:
Passive copy move image forgery detection using undecimated dyadic wavelet transform. Digit. Investig. 9(1): 49-57 (2012) - Noora Al Mutawa, Ibrahim M. Baggili, Andrew Marrington:
Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9(Supplement): S24-S33 (2012)
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-08 23:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint