


default search action
Forensic Science International: Digital Investigation, Volume 32 Supplement
Volume 32 Supplement, April 2020
Extended Abstracts
- Shuyuan Mary Ho, Da-Yu Kao, Ming-Jung Chiu-Huang, Wenyi Li, Chung-Jui Lai:
Detecting Cyberbullying "Hotspots" on Twitter: A Predictive Analytics Approach. 300906 - Asanka P. Sayakkara, Nhien-An Le-Khac
, Mark Scanlon
:
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis. 300907 - Edward Harshany, Ryan Benton, David Bourrie, William Bradley Glisson:
Big Data Forensics: Hadoop 3.2.0 Reconstruction. 300909 - Kingson Chinedu Odogwu, Pavel Gladyshev, Babak Habibnia:
PNG Data Detector for DECA. 300910 - David Billard
:
Tainted Digital Evidence and Privacy Protection in Blockchain-Based Systems. 300911
- Paul Prade, Tobias Groß, Andreas Dewald:
Forensic Analysis of the Resilient File System (ReFS) Version 3.4. 300915 - Patrick Mullan, Christian Riess, Felix C. Freiling:
Towards Open-Set Forensic Source Grouping on JPEG Header Information. 300916 - Daniel Uroz
, Ricardo J. Rodríguez:
On Challenges in Verifying Trusted Executable Files in Memory Forensics. 300917 - Pavol Sokol
, Laura Rózenfeldová
, Katarína Lucivjanská, Jakub Harasta
:
IP Addresses in the Context of Digital Evidence in the Criminal and Civil Case Law of the Slovak Republic. 300918 - Tobias Latzo, Julian Brost, Felix C. Freiling:
BMCLeech: Introducing Stealthy Memory Forensics to BMC. 300919 - David Palmbach, Frank Breitinger
:
Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability. 300920 - Felix Anda, Nhien-An Le-Khac
, Mark Scanlon
:
DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation. 300921 - Sadegh Torabi
, Elias Bou-Harb, Chadi Assi, Mourad Debbabi
:
A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. 300922 - Virginia N. L. Franqueira
, Graeme Horsman:
Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice. 300923 - Janine Schneider
, Julian Wolf
, Felix C. Freiling:
Tampering with Digital Evidence is Hard: The Case of Main Memory Images. 300924 - Erisa Karafili
, Linna Wang, Emil C. Lupu:
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks. 300925 - Xiaolu Zhang, Oren Upton, Nicole Lang Beebe, Kim-Kwang Raymond Choo
:
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. 300926 - Asanka P. Sayakkara
, Luis Miralles-Pechuán, Nhien-An Le-Khac
, Mark Scanlon
:
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection. 300927 - Eoghan Casey
, David-Olivier Jaquet-Chiffelle
, Hannes Spichiger
, Elénore Ryser
, Thomas R. Souvignet
:
Structuring the Evaluation of Location-Related Mobile Device Evidence. 300928

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.