Stop the war!
Остановите войну!
for scientists:
default search action
Digital Investigation, Volume 7
Volume 7, Number Supplement, August 2010
- Gregory J. Conti, Sergey Bratus, Anna Shubina, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, Robert Perez-Alemany:
Automated mapping of large binary objects using primitive fragment type classification. S3-S12 - Simson L. Garfinkel, Alex J. Nelson, Douglas White, Vassil Roussev:
Using purpose-built functions and block hashes to enable small block and sub-file forensics. S13-S23 - Stefan Axelsson:
The Normalised Compression Distance as a file fragment classifier. S24-S31 - Andrew Case, Lodovico Marziale, Golden G. Richard III:
Dynamic recreation of kernel data structures for live forensics. S32-S40 - Andrew Case, Lodovico Marziale, Cris Neckar, Golden G. Richard III:
Treasure and tragedy in kmem_cache mining for live forensics investigation. S41-S47 - James S. Okolica, Gilbert L. Peterson:
Windows operating systems agnostic memory analysis. S48-S56 - Richard M. Stevens, Eoghan Casey:
Extracting Windows command line details from physical memory. S57-S63 - Simson L. Garfinkel:
Digital forensics research: The next 10 years. S64-S73 - Vrizlynn L. L. Thing, Kian-Yong Ng, Ee-Chien Chang:
Live memory forensics of mobile phones. S74-S82 - Alessandro Distefano, Gianluigi Me, Francesco Pace:
Android anti-forensics through a local paradigm. S83-S94 - Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, Clay Shields:
Forensic investigation of peer-to-peer file sharing networks. S95-S103 - Bilal Shebaro, Fernando Pérez-González, Jedidiah R. Crandall:
Leaving timing-channel fingerprints in hidden service log files. S104-S113 - Jewan Bang, Byeongyeong Yoo, Sangjin Lee:
Secure USB bypassing tool. S114-S120 - Michael Cohen, Bradley L. Schatz:
Hash based disk imaging using AFF4. S121-S128 - Brian D. Carrier:
Different interpretations of ISO9660 file systems. S129-S134 - James R. Lyle:
If error rate is such a simple concept, why don't I have one for my forensic tool yet? S135-S139
Volume 7, Numbers 1-2, October 2010
- Eoghan Casey:
Digital investigations, security and privacy. 1-2
- Greg Gogolin:
The Digital Crime Tsunami. 3-8 - Geoffrey Fellows:
WinRAR temporary folder artefacts. 9-13 - Emmanuel S. Pilli, Ramesh C. Joshi, Rajdeep Niyogi:
Network forensic frameworks: Survey and research challenges. 14-27 - Karla Saur, Julian B. Grizzard:
Locating ×86 paging structures in memory images. 28-37 - Frederick Rehault:
Windows mobile advanced forensics: An alternative to existing tools. 38-47 - Ming Xu, Hong-Rong Yang, Jian Xu, Ye Xu, Ning Zheng:
An adaptive method to identify disk cluster size based on block content. 48-55 - Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. Fung, Mourad Debbabi:
Mining writeprints from anonymous e-mails for forensic investigation. 56-64 - Liaqat Ali Khan, Muhammad Shamim Baig, Amr M. Youssef:
Speaker recognition from encrypted VoIP communications. 65-73 - Liaqat Ali Khan, Farkhund Iqbal, Muhammad Shamim Baig:
Speaker verification from partially encrypted compressed speech for forensic investigation. 74-80 - Fa-Chang Cheng, Wen-Hsing Lai:
An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan. 81-89 - Muhammad Yasin, Ahmad R. Cheema, Firdous Kausar:
Analysis of Internet Download Manager for collection of digital forensic artefacts. 90-94 - Neil J. Croft, Martin S. Olivier:
Sequenced release of privacy-accurate information in a forensic investigation. 95-101
Volume 7, Numbers 3-4, April 2011
- Eoghan Casey:
The increasing need for automation and validation in digital forensics. 103-104
- Paul Hunton:
A rigorous approach to formalising the technical investigation stages of cybercrime and criminality within a UK law enforcement environment. 105-113 - Howard Chivers, Christopher James Hargreaves:
Forensic data recovery from the Windows Search Database. 114-126 - Harjinder Singh Lallie, Philip James Briggs:
Windows 7 registry forensic evidence created by three popular BitTorrent clients. 127-134 - Jewan Bang, Byeongyeong Yoo, Sangjin Lee:
Analysis of changes in file time attributes with file manipulation. 135-144 - M. Tariq Banday, Farooq A. Mir, Jameel A. Qadri, Nisar Ahmed Shah:
Analyzing Internet e-mail date-spoofing. 145-153 - A. L. Louis, Andries P. Engelbrecht:
Unsupervised discovery of relations for analysis of textual data. 154-171 - Dung Vu Pham, Ali Syed, Malka N. Halgamuge:
Universal serial bus based software attacks and protection solutions. 172-184 - Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen:
Collaborative scheme for VoIP traceback. 185-195
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.