default search action
Digital Investigation, Volume 20 Supplement
Volume 20 Supplement, March 2017
- Aya Fukami, Saugata Ghose, Yixin Luo, Yu Cai, Onur Mutlu:
Improving the reliability of chip-off forensic analysis of NAND flash memory devices. S1-S11 - Jan Peter van Zandwijk:
Bit-errors as a source of forensic information in NAND-flash memory. S12-S19 - Adam Pridgen, Simson L. Garfinkel, Dan S. Wallach:
Picking up the trash: Exploiting generational GC for memory analysis. S20-S28 - Mark Scanlon, Xiaoyu Du, David Lillis:
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution. S29-S36 - Felix C. Freiling, Christian Zoubek:
Do digital investigators have to program? A controlled experiment in digital investigation. S37-S46 - Elias Bou-Harb, Mark Scanlon:
Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections. S47-S55 - Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing:
Evidence gathering for network security and forensics. S56-S65 - Daniel Spiekermann, Jörg Keller, Tobias Eggendorfer:
Network forensic investigation in OpenFlow networks with ForCon. S66-S74 - Karl Wüst, Petar Tsankov, Sasa Radomirovic, Mohammad Torabi Dashti:
Force Open: Lightweight black box file repair. S75-S82 - Andreas Dewald, Sabine Seufert:
AFEIC: Advanced forensic Ext4 inode carving. S83-S91 - Christian Zoubek, Konstantin Sack:
Selective deletion of non-relevant data. S92-S98 - Dario Lanterna, Antonio Barili:
Forensic analysis of deduplicated file systems. S99-S106 - Felix C. Freiling, Thomas Glanzmann, Hans P. Reiser:
Characterizing loss of digital evidence due to abstraction layers. S107-S115
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.