Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/jdfsl:"
@article{DBLP:journals/jdfsl/AngelopoulouJHP22, author = {Olga Angelopoulou and Andy Jones and Graeme Horsman and Seyedali Pourmoafi}, title = {A Study of the Data Remaining on Second-Hand Mobile Devices in the {UK}}, journal = {J. Digit. Forensics Secur. Law}, volume = {17}, number = {2}, year = {2022}, url = {https://doi.org/10.58940/1558-7223.1785}, doi = {10.58940/1558-7223.1785}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AngelopoulouJHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GogiaR22, author = {Gaurav Gogia and Parag H. Rughani}, title = {An {ML} based Digital Forensics Software for Triage Analysis through Face Recognition}, journal = {J. Digit. Forensics Secur. Law}, volume = {17}, number = {2}, year = {2022}, url = {https://doi.org/10.58940/1558-7223.1772}, doi = {10.58940/1558-7223.1772}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GogiaR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KhalidQ22, author = {Zainab Khalid and Sana Qadir}, title = {An Evaluation Framework For Digital Image Forensics Tools}, journal = {J. Digit. Forensics Secur. Law}, volume = {17}, number = {2}, year = {2022}, url = {https://doi.org/10.58940/1558-7223.1727}, doi = {10.58940/1558-7223.1727}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KhalidQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RoyB22, author = {Priya Roy and Rituraj Bhowal}, title = {An Analysis of Product Liability for {AI} Entities with special reference to the Consumer Protection Act, 2019}, journal = {J. Digit. Forensics Secur. Law}, volume = {17}, number = {2}, year = {2022}, url = {https://doi.org/10.58940/1558-7223.1820}, doi = {10.58940/1558-7223.1820}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RoyB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AsanteA21, author = {Audrey Asante and Vincent Amankona}, title = {Digital Forensic Readiness Framework based on Honeypot and Honeynet for {BYOD}}, journal = {J. Digit. Forensics Secur. Law}, volume = {16}, number = {2}, year = {2021}, url = {https://doi.org/10.58940/1558-7223.1706}, doi = {10.58940/1558-7223.1706}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AsanteA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BoozerJM21, author = {Abel Alex Boozer and Arun John and Tathagata Mukherjee}, title = {Internet of Things Software and Hardware Architectures and Their Impacts on Forensic Investigations: Current Approaches and Challenges}, journal = {J. Digit. Forensics Secur. Law}, volume = {16}, number = {2}, year = {2021}, url = {https://doi.org/10.58940/1558-7223.1759}, doi = {10.58940/1558-7223.1759}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BoozerJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HopkinsR21, author = {Brandon J. Hopkins and Kevin A. Riggle}, title = {An Economical Method for Securely Disintegrating Solid-State Drives Using Blenders}, journal = {J. Digit. Forensics Secur. Law}, volume = {16}, number = {2}, year = {2021}, url = {https://doi.org/10.58940/1558-7223.1681}, doi = {10.58940/1558-7223.1681}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HopkinsR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kara21, author = {Ilker Kara}, title = {Don't Bite the Bait: Phishing Attack for Internet Banking (E-Banking)}, journal = {J. Digit. Forensics Secur. Law}, volume = {16}, number = {2}, year = {2021}, url = {https://doi.org/10.58940/1558-7223.1743}, doi = {10.58940/1558-7223.1743}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kara21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Korkin21, author = {Igor Korkin}, title = {Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again}, journal = {J. Digit. Forensics Secur. Law}, volume = {16}, number = {1}, year = {2021}, url = {https://doi.org/10.58940/1558-7223.1726}, doi = {10.58940/1558-7223.1726}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Korkin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Olber21, author = {Pawel Olber}, title = {The survey on cross-border collection of digital evidence by representatives from Polish prosecutors' offices and judicial authorities}, journal = {J. Digit. Forensics Secur. Law}, volume = {16}, number = {2}, year = {2021}, url = {https://doi.org/10.58940/1558-7223.1700}, doi = {10.58940/1558-7223.1700}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Olber21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/OrunsoluSKB21, author = {Abdul Abiodun Orunsolu and Adesina S. Sodiya and Sakiru Oluyemi Kareem and Oladimeji G. B}, title = {Performance Assessment of some Phishing predictive models based on Minimal Feature corpus}, journal = {J. Digit. Forensics Secur. Law}, volume = {16}, number = {1}, year = {2021}, url = {https://doi.org/10.58940/1558-7223.1692}, doi = {10.58940/1558-7223.1692}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/OrunsoluSKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GetreuM19, author = {Jens Getreu and Olaf Maennel}, title = {Enhancing Forensic-Tool Security with Rust: Development of a String Extraction Utility}, journal = {J. Digit. Forensics Secur. Law}, volume = {14}, number = {2}, pages = {46--58}, year = {2019}, url = {https://commons.erau.edu/jdfsl/vol14/iss2/4}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/GetreuM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HeinlYW19, author = {Michael P. Heinl and Bo Yu and Duminda Wijesekera}, title = {A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond}, journal = {J. Digit. Forensics Secur. Law}, volume = {14}, number = {1}, pages = {2:1--2:19}, year = {2019}, url = {https://commons.erau.edu/jdfsl/vol14/iss1/2}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/HeinlYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HyslipH19, author = {Thomas Hyslip and Thomas Holt}, title = {Examining the Correlates of Failed DRDoS Attacks}, journal = {J. Digit. Forensics Secur. Law}, volume = {14}, number = {2}, pages = {1--12}, year = {2019}, url = {https://commons.erau.edu/jdfsl/vol14/iss2/2}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/HyslipH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Minor19, author = {John B. Minor}, title = {Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity Maintenance Research}, journal = {J. Digit. Forensics Secur. Law}, volume = {14}, number = {2}, pages = {59--85}, year = {2019}, url = {https://commons.erau.edu/jdfsl/vol14/iss2/5}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Minor19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SedaKC19, author = {Michael A. Seda and Bonita Peterson Kramer and Larry D. Crumbley}, title = {An Examination of Computer Forensics and Related Certifications In The Accounting Curriculum}, journal = {J. Digit. Forensics Secur. Law}, volume = {14}, number = {1}, pages = {4:1--4:23}, year = {2019}, url = {https://commons.erau.edu/jdfsl/vol14/iss1/4}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/SedaKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/VermaGCG19, author = {Robin Verma and Jayaprakash Govindaraj and Saheb Chhabra and Gaurav Gupta}, title = {{DF} 2.0: An Automated, Privacy Preserving, and Efficient Digital Forensic Framework That Leverages Machine Learning for Evidence Prediction and Privacy Evaluation}, journal = {J. Digit. Forensics Secur. Law}, volume = {14}, number = {2}, pages = {13--44}, year = {2019}, url = {https://commons.erau.edu/jdfsl/vol14/iss2/3}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/VermaGCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Zahadat19, author = {Nima Zahadat}, title = {Digital Forensics, {A} Need for Credentials and Standards}, journal = {J. Digit. Forensics Secur. Law}, volume = {14}, number = {1}, pages = {3:1--3:14}, year = {2019}, url = {https://commons.erau.edu/jdfsl/vol14/iss1/3}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Zahadat19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/0002AM18, author = {Andrew Jones and Fahad Alanazi and Catherine Menon}, title = {Sharia Law and Digital Forensics in Saudi Arabia}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {3}, pages = {5--20}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1568}, doi = {10.15394/JDFSL.2018.1568}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/0002AM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Azhar0I18, author = {M. A. Hannan Bin Azhar and Thomas Barton and Tasmina Islam}, title = {Drone Forensic Analysis Using Open Source Tools}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {1}, pages = {7--30}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1513}, doi = {10.15394/JDFSL.2018.1513}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Azhar0I18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/EnceTC18, author = {Choli Ence and Joan Through and Gary Cantrell}, title = {Chip-off Success Rate Analysis Comparing Temperature and Chip Type}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {4}, pages = {33--59}, year = {2018}, url = {https://commons.erau.edu/jdfsl/vol13/iss4/7}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/EnceTC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HaqueA18, author = {Md Shariful Haque and Travis Atkison}, title = {A Forensic Enabled Data Provenance Model for Public Cloud}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {3}, pages = {47--66}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1570}, doi = {10.15394/JDFSL.2018.1570}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HaqueA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Lancelot18, author = {Jonathan F. Lancelot}, title = {Russia Today, Cyberterrorists Tomorrow: {U.S.} Failure to Prepare Democracy for Cyberspace}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {4}, pages = {23--32}, year = {2018}, url = {https://commons.erau.edu/jdfsl/vol13/iss4/6}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Lancelot18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LeopardRM18, author = {Charles Leopard and Neil C. Rowe and Michael McCarrin}, title = {Testing Memory Forensics Tools for the Macintosh {OS} {X} Operating System}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {1}, pages = {31--42}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1491}, doi = {10.15394/JDFSL.2018.1491}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LeopardRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LillisBS18, author = {David Lillis and Frank Breitinger and Mark Scanlon}, title = {Hierarchical Bloom Filter Trees for Approximate Matching}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {1}, pages = {81--96}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1489}, doi = {10.15394/JDFSL.2018.1489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LillisBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/McAteerHMB18, author = {Ian McAteer and Peter Hannay and Muhammad Imran Malik and Zubair A. Baig}, title = {Forensic Analysis of a Crash-Damaged Cheerson {CX-20} Auto Pathfinder Drone}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {4}, pages = {5--22}, year = {2018}, url = {https://commons.erau.edu/jdfsl/vol13/iss4/5}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/McAteerHMB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/McKeown0L18, author = {Sean McKeown and Gordon Russell and Petra Leimich}, title = {Fingerprinting JPEGs With Optimised Huffman Tables}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {2}, pages = {7:1--7:14}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1451}, doi = {10.15394/JDFSL.2018.1451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/McKeown0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RenSLFZZ18, author = {Pu Ren and Wuyang Shui and Jin Liu and Yachun Fan and Wenshuo Zhao and Mingquan Zhou}, title = {A Sketch-based Rapid Modeling Method for Crime Scene Presentation}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {1}, pages = {43--58}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1484}, doi = {10.15394/JDFSL.2018.1484}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RenSLFZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RobbersonM18, author = {Stephanie Robberson and Mark McCoy}, title = {A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {2}, pages = {5:1--5:19}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1449}, doi = {10.15394/JDFSL.2018.1449}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RobbersonM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SachdevWCR18, author = {Hitesh Sachdev and Hayden Wimmer and Lei Chen and Carl M. Rebman}, title = {A New Framework for Securing, Extracting and Analyzing Big Forensic Data}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {2}, pages = {6:1--6:17}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1419}, doi = {10.15394/JDFSL.2018.1419}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SachdevWCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TeerakanokU18, author = {Songpon Teerakanok and Tetsutaro Uehara}, title = {Enhancement of Media Splicing Detection: {A} General Framework}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {2}, pages = {8:1--8:12}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1481}, doi = {10.15394/JDFSL.2018.1481}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TeerakanokU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/VondracekPR18, author = {Martin Vondr{\'{a}}cek and Jan Pluskal and Ondrej Rysav{\'{y}}}, title = {Automated Man-in-the-Middle Attack Against Wi{\unicode{8209}}Fi Networks}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {1}, pages = {59--80}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1495}, doi = {10.15394/JDFSL.2018.1495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/VondracekPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/WimmerCN18, author = {Hayden Wimmer and Lei Chen and Thomas W. Narock}, title = {Ontologies and the Semantic Web for Digital Investigation Tool Selection}, journal = {J. Digit. Forensics Secur. Law}, volume = {13}, number = {3}, pages = {21--46}, year = {2018}, url = {https://doi.org/10.15394/jdfsl.2018.1569}, doi = {10.15394/JDFSL.2018.1569}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/WimmerCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AfanasievaK17, author = {Svetlana Afanasieva and Irina Kilina}, title = {Use of House Arrest In The Context of the Respecting the Constitutional Rights of an Individual in Russia}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {103--112}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1496}, doi = {10.15394/JDFSL.2017.1496}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AfanasievaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AkatyevJ17, author = {Nikolay Akatyev and Joshua James}, title = {Legislative Requirements for Cyber Peacekeeping}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {23--38}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1447}, doi = {10.15394/JDFSL.2017.1447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AkatyevJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AtkisonW17, author = {Travis Atkison and Nathan Wallace}, title = {A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {5--18}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1480}, doi = {10.15394/JDFSL.2017.1480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AtkisonW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Barrett17, author = {Diane Barrett}, title = {Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {75--96}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1473}, doi = {10.15394/JDFSL.2017.1473}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Barrett17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Borisevich17, author = {Galina Borisevich}, title = {Providing for the Safety of the Participants of the Criminal Court Proceedings - The Subject of Cconcern of Russian Legislator, Government, Scientists and Practicians}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {95--102}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1494}, doi = {10.15394/JDFSL.2017.1494}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Borisevich17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/DiezZC17, author = {Isabel de la Torre D{\'{\i}}ez and Bego{\~{n}}a Garc{\'{\i}}a Zapirain and Miguel L{\'{o}}pez Coronado}, title = {Analysis of Security in Big Data Related to Healthcare}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {39--46}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1448}, doi = {10.15394/JDFSL.2017.1448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/DiezZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Dogan17, author = {Seng{\"{u}}l Dogan}, title = {A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {87--100}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1456}, doi = {10.15394/JDFSL.2017.1456}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Dogan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Fowler17, author = {James E. Fowler}, title = {Compression of Virtual-Machine Memory in Dynamic Malware Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {41--46}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1437}, doi = {10.15394/JDFSL.2017.1437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Fowler17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HornerH17, author = {Matthew Horner and Thomas Hyslip}, title = {{SQL} Injection: The Longest Running Sequel in Programming History}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {97--108}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1475}, doi = {10.15394/JDFSL.2017.1475}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HornerH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KarampidisP17, author = {Konstantinos Karampidis and Giorgos Papadourakis}, title = {File Type Identification - Computational Intelligence for Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {19--32}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1472}, doi = {10.15394/JDFSL.2017.1472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KarampidisP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KarieK17, author = {Nickson M. Karie and Simon M. Karume}, title = {Digital Forensic Readiness in Organizations: Issues and Challenges}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {43--54}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1436}, doi = {10.15394/JDFSL.2017.1436}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KarieK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KeelingL17, author = {Deborah W. Keeling and Michael Losavio}, title = {Public Security {\&} Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {47--60}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1452}, doi = {10.15394/JDFSL.2017.1452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KeelingL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KuznetsovaB17, author = {Olga Kuznetsova and Natalia Pavlovna Bondarenko}, title = {Private Life Safety Provision in Digital Age}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {77--86}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1460}, doi = {10.15394/JDFSL.2017.1460}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KuznetsovaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LosavioE17, author = {Michael Losavio and Adel Elmaghraby}, title = {Security and the Transnational Information Polity}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {67--76}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1458}, doi = {10.15394/JDFSL.2017.1458}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LosavioE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Minor17, author = {John B. Minor}, title = {Forensic Cell Site Analysis: {A} Validation {\&} Error Mitigation Methodology}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {33--52}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1474}, doi = {10.15394/JDFSL.2017.1474}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Minor17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MooreBB17, author = {Jason Moore and Ibrahim M. Baggili and Frank Breitinger}, title = {Find Me If You Can: Mobile {GPS} Mapping Applications Forensic Analysis {\&} {SNAVP} the Open Source, Modular, Extensible Parser}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {15--30}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1414}, doi = {10.15394/JDFSL.2017.1414}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MooreBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ParkJJ17, author = {Sungmi Park and Yunsik Jang and Joshua James}, title = {Possession of Child Exploitation Material in Computer Temporary Internet Cache}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {7--22}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1446}, doi = {10.15394/JDFSL.2017.1446}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ParkJJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ParkPKCJ17, author = {Kyoung Park and Jung{-}Min Park and Eun{-}Jin Kim and Chang Cheon and Joshua James}, title = {Anti-Forensic Trace Detection in Digital Forensic Triage Investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {31--40}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1421}, doi = {10.15394/JDFSL.2017.1421}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ParkPKCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PastukhovPF17, author = {Pavel Pastukhov and Svetlana Polyakova and Evelina Frolovich}, title = {The Use of Information Technologies to Combat Counterfeit Alcohol Products and Ensure the Right to Life in Russia}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {87--94}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1461}, doi = {10.15394/JDFSL.2017.1461}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/PastukhovPF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RN17, author = {Chetan K. R and Shivananda Nirmala}, title = {Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {5--28}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1407}, doi = {10.15394/JDFSL.2017.1407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SchatzBW17, author = {Daniel Schatz and Rabih Bashroush and Julie A. Wall}, title = {Towards a More Representative Definition of Cyber Security}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {53--74}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1476}, doi = {10.15394/JDFSL.2017.1476}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SchatzBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ShahSZ17, author = {Makhdoom Shah and Shahzad Saleem and Roha Zulqarnain}, title = {Protecting Digital Evidence Integrity and Preserving Chain of Custody}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {121--130}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1478}, doi = {10.15394/JDFSL.2017.1478}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ShahSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/StadlingerD17, author = {Johannes Stadlinger and Andreas Dewald}, title = {A Forensic Email Analysis Tool Using Dynamic Visualization}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {7--14}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1413}, doi = {10.15394/JDFSL.2017.1413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/StadlingerD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SudozaiHSK17, author = {M. A. K. Sudozai and Nisar Habib and Shahzad Saleem and A. A. Khan}, title = {Signatures of Viber Security Traffic}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {109--120}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1477}, doi = {10.15394/JDFSL.2017.1477}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SudozaiHSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SyatchikhinGS17, author = {Alexander Syatchikhin and Valery Golubtsov and Natalia Syropiatova}, title = {Contractual Responsibility for the Disclosure of Bank Secrets}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {61--66}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1454}, doi = {10.15394/JDFSL.2017.1454}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SyatchikhinGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SzewczykM17, author = {Patryk Szewczyk and Rose Macdonald}, title = {Broadband Router Security: History, Challenges and Future Implications}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {55--74}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1444}, doi = {10.15394/JDFSL.2017.1444}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SzewczykM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TeagueB17, author = {Ryne Teague and Michael Black}, title = {Evidence Verification Complications with Solid-State Drives}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {75--86}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1445}, doi = {10.15394/JDFSL.2017.1445}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TeagueB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ThroughC17, author = {Joan Through and Gary Cantrell}, title = {Varying Instructional Approaches to Physical Extraction of Mobile Device Memory}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {29--42}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1420}, doi = {10.15394/JDFSL.2017.1420}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ThroughC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TobinLK17, author = {Patrick Tobin and Nhien{-}An Le{-}Khac and M. Tahar Kechadi}, title = {Forensic Analysis of Virtual Hard Drives}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {47--58}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1438}, doi = {10.15394/JDFSL.2017.1438}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TobinLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Al-khateebCABB16, author = {Samer Al{-}khateeb and Kevin J. Conlan and Nitin Agarwal and Ibrahim M. Baggili and Frank Breitinger}, title = {Exploring Deviant Hacker Networks {(DHN)} On Social Media Platforms}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {7--20}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1375}, doi = {10.15394/JDFSL.2016.1375}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Al-khateebCABB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AldwairiAAS16, author = {Monther Aldwairi and Koloud Al{-}Khamaiseh and Fatima Alharbi and Babar Shah}, title = {Bloom Filters Optimized Wu-Manber for Intrusion Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {5--22}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1427}, doi = {10.15394/JDFSL.2016.1427}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AldwairiAAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BaekLH16, author = {Hyunin Baek and Michael Losavio and George Higgins}, title = {The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {27--42}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1417}, doi = {10.15394/JDFSL.2016.1417}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BaekLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FehisNK16, author = {Saad Fehis and Omar Nouali and Mohand Tahar Kechadi}, title = {A New Distributed Chinese Wall Security Policy Model}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {149--168}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1434}, doi = {10.15394/JDFSL.2016.1434}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FehisNK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Flory16, author = {Teri A. Flory}, title = {Digital Forensics In Law Enforcement: {A} Needs Based Analysis of Indiana Agencies}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {77--98}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1374}, doi = {10.15394/JDFSL.2016.1374}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Flory16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GlissonSBGC16, author = {William Bradley Glisson and Tim Storer and Andrew Blyth and George Grispos and Matt Campbell}, title = {In-The-Wild Residual Data Research and Privacy}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {7--36}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1371}, doi = {10.15394/JDFSL.2016.1371}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GlissonSBGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GunestasB16, author = {Murat Gunestas and Zeki Bilgin}, title = {Log Analysis Using Temporal Logic and Reconstruction Approach: Web Server Case}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {35--58}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1377}, doi = {10.15394/JDFSL.2016.1377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GunestasB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HarichandranBB16, author = {Vikram S. Harichandran and Frank Breitinger and Ibrahim M. Baggili}, title = {Bytewise Approximate Matching: The Good, The Bad, and The Unknown}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {59--78}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1379}, doi = {10.15394/JDFSL.2016.1379}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HarichandranBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JeongBKL16, author = {Doowon Jeong and Frank Breitinger and Hari Kang and Sangjin Lee}, title = {Towards Syntactic Approximate Matching - {A} Pre-Processing Experiment}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {97--110}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1381}, doi = {10.15394/JDFSL.2016.1381}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JeongBKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JulliandTN16, author = {Thibault Julliand and Hugues Talbot and Vincent Nozick}, title = {Countering Noise-based Splicing Detection Using Noise Density Transfer}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {111--122}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1382}, doi = {10.15394/JDFSL.2016.1382}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JulliandTN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KarabiyikCATAGA16, author = {Umit Karabiyik and Muhammed Abdullah Canbaz and Ahmet Aksoy and Tayfun Tuna and Esra Akbas and Bilal Gonen and Ramazan Aygun}, title = {A Survey of Social Network Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {55--128}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1430}, doi = {10.15394/JDFSL.2016.1430}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KarabiyikCATAGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler16, author = {Gary C. Kessler}, title = {The Impact of {MD5} File Hash Collisions On Digital Forensic Imaging}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {129--138}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1431}, doi = {10.15394/JDFSL.2016.1431}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler16a, author = {Gary C. Kessler}, title = {The Impact of {SHA-1} File Hash Collisions On Digital Forensic Imaging: {A} Follow-up Experiment}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {139--148}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1433}, doi = {10.15394/JDFSL.2016.1433}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LeeJEK16, author = {Kibin Lee and Joshua I. James and Tekachew Gobena Ejeta and Hyoung Joong Kim}, title = {Electronic Voting Service Using Block-Chain}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {123--136}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1383}, doi = {10.15394/JDFSL.2016.1383}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LeeJEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LiaoL16, author = {Yi{-}Ching Liao and Hanno Langweg}, title = {Evidential Reasoning for Forensic Readiness}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {37--52}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1372}, doi = {10.15394/JDFSL.2016.1372}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LiaoL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoMW16, author = {Thomas Lonardo and Tricia Martland and Doug White}, title = {A Legal Examination of Revenge Pornography and Cyber-Harassment}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {79--106}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1412}, doi = {10.15394/JDFSL.2016.1412}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MartinJA16, author = {Thomas Anthony Martin and Andy Jones and Mohammed Alzaabi}, title = {The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the {UAE}}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {23--36}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1428}, doi = {10.15394/JDFSL.2016.1428}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MartinJA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MatousekHHR16, author = {Petr Matousek and Radek Hranicky and Martin Holkovic and Ondrej Rysav{\'{y}}}, title = {On Efficiency of Distributed Password Recovery}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {79--96}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1380}, doi = {10.15394/JDFSL.2016.1380}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MatousekHHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MohammedCL16, author = {Hussam Jasim Mohammed and Nathan Luke Clarke and Fudong Li}, title = {An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {137--152}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1384}, doi = {10.15394/JDFSL.2016.1384}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MohammedCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/OlsonS16, author = {Eric Olson and Narasimha K. Shashidhar}, title = {Low Budget Forensic Drive Imaging Using {ARM} Based Single Board Computers}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {1}, pages = {53--76}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1373}, doi = {10.15394/JDFSL.2016.1373}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/OlsonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RoweSMG16, author = {Neil C. Rowe and Riqui Schwamm and Michael McCarrin and Ralucca Gera}, title = {Making Sense of Email Addresses on Drives}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {153--174}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1385}, doi = {10.15394/JDFSL.2016.1385}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RoweSMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghCS16, author = {Monika Singh and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Security Analysis of mvHash-B Similarity Hashing}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {21--34}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1376}, doi = {10.15394/JDFSL.2016.1376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghS16, author = {Bhupendra Singh and Upasna Singh}, title = {Leveraging the Windows Amcache.hve File in Forensic Investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {4}, pages = {37--54}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1429}, doi = {10.15394/JDFSL.2016.1429}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SpitzbergG16, author = {Brian H. Spitzberg and Jean Mark Gawron}, title = {A Research Agenda for Online Linguistic Surveillance of Threatening Messages}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {43--78}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1418}, doi = {10.15394/JDFSL.2016.1418}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SpitzbergG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ThompsonH16, author = {Marcus Thompson and Raymond Hansen}, title = {Verification of Recovered Digital Evidence on the Amazon Kindle}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {175--192}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1386}, doi = {10.15394/JDFSL.2016.1386}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ThompsonH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ZezulkaS16, author = {Lauren A. Zezulka and Kathryn C. Seigfried{-}Spellar}, title = {Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {3}, pages = {7--26}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1415}, doi = {10.15394/JDFSL.2016.1415}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ZezulkaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Alzaabi15, author = {Mohammed Alzaabi}, title = {The Use of Ontologies in Forensic Analysis of Smartphone Content}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {105--114}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1215}, doi = {10.15394/JDFSL.2015.1215}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Alzaabi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AwadhiRMF15, author = {Ibtesam Al Awadhi and Janet C. Read and Andrew Marrington and Virginia N. L. Franqueira}, title = {Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {7--16}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1207}, doi = {10.15394/JDFSL.2015.1207}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AwadhiRMF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Baggili15, author = {Ibrahim M. Baggili}, title = {From the Editor-in-Chief}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {1}, pages = {5--6}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1199}, doi = {10.15394/JDFSL.2015.1199}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Baggili15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Baggili15a, author = {Ibrahim M. Baggili}, title = {From the Editor-in-Chief}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {2}, pages = {5--6}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1194}, doi = {10.15394/JDFSL.2015.1194}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Baggili15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/DonnangeloKSCH15, author = {Nicholas C. Donnangelo and Walter S. Kuklinski and R. Szabo and R. A. Coury and G. R. Hamshar}, title = {Identification and Exploitation of Inadvertent Spectral Artifacts in Digital Audio}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {3}, pages = {35--58}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1204}, doi = {10.15394/JDFSL.2015.1204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/DonnangeloKSCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FanC15, author = {Xiao{-}Xi Fan and Kam{-}Pui Chow}, title = {Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {17--30}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1208}, doi = {10.15394/JDFSL.2015.1208}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FanC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FaridPW15, author = {Hany Farid and Srivamshi Pittala and Emily Whiting}, title = {A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {3}, pages = {87--98}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1206}, doi = {10.15394/JDFSL.2015.1206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FaridPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FarinaKS15, author = {Jason Farina and M. Tahar Kechadi and Mark Scanlon}, title = {Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {115--124}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1216}, doi = {10.15394/JDFSL.2015.1216}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FarinaKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HomemD15, author = {Irvin Homem and Spyridon Dossis}, title = {On the Network Performance of Digital Evidence Acquisition of Small Scale Devices over Public Networks}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {3}, pages = {59--86}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1205}, doi = {10.15394/JDFSL.2015.1205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HomemD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HyslipP15, author = {Thomas Hyslip and Jason M. Pittman}, title = {A Survey of Botnet Detection Techniques by Command and Control Infrastructure}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {1}, pages = {7--26}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1195}, doi = {10.15394/JDFSL.2015.1195}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HyslipP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kearns15, author = {Grover S. Kearns}, title = {Computer Forensic Projects for Accountants}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {3}, pages = {7--34}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1203}, doi = {10.15394/JDFSL.2015.1203}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kearns15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kong15, author = {Joe Kong}, title = {Data Extraction on MTK-based Android Mobile Phone Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {31--42}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1209}, doi = {10.15394/JDFSL.2015.1209}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kong15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Korkin15, author = {Igor Korkin}, title = {Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {2}, pages = {7--38}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1200}, doi = {10.15394/JDFSL.2015.1200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Korkin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoRW15, author = {Thomas Lonardo and Alan Rea and Doug White}, title = {To License or Not to License Reexamined: An Updated Report on State Statutes Regarding Private Investigators and Digital Examiners}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {1}, pages = {45--56}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1197}, doi = {10.15394/JDFSL.2015.1197}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LosavioPP15, author = {Michael Losavio and Pavel Sysoevich Pastukov and Svetlana Polyakova}, title = {Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives and Challenges with Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {43--58}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1210}, doi = {10.15394/JDFSL.2015.1210}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LosavioPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LuomaL15, author = {Milton H. Luoma and Vicki Luoma}, title = {Litigation Holds: Past, Present, and Future Directions}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {1}, pages = {57--68}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1198}, doi = {10.15394/JDFSL.2015.1198}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LuomaL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Sharevski15, author = {Filipo Sharevski}, title = {Rules of professional responsibility in digital forensics: {A} comparative analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {2}, pages = {39--54}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1201}, doi = {10.15394/JDFSL.2015.1201}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Sharevski15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TobinG15, author = {Lee Tobin and Pavel Gladyshev}, title = {Open Forensic Devices}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {97--104}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1214}, doi = {10.15394/JDFSL.2015.1214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TobinG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Tu15, author = {Manghui Tu}, title = {Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {1}, pages = {27--44}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1196}, doi = {10.15394/JDFSL.2015.1196}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Tu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Utter015, author = {Carla J. Utter and Alan Rea}, title = {The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {2}, pages = {55--72}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1202}, doi = {10.15394/JDFSL.2015.1202}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Utter015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/VoorstKL15, author = {Robert van Voorst and Mohand Tahar Kechadi and Nhien{-}An Le{-}Khac}, title = {Forensic Acquisition of {IMVU:} {A} Case Study}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {69--78}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1212}, doi = {10.15394/JDFSL.2015.1212}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/VoorstKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/WuN15, author = {Tina Wu and Jason R. C. Nurse}, title = {Exploring The Use Of {PLC} Debugging Tools For Digital Forensic Investigations On {SCADA} Systems}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {79--96}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1213}, doi = {10.15394/JDFSL.2015.1213}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/WuN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/YauC15, author = {Ken Yau and Kam{-}Pui Chow}, title = {{PLC} Forensics Based on Control Program Logic Change Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {10}, number = {4}, pages = {59--68}, year = {2015}, url = {https://doi.org/10.15394/jdfsl.2015.1211}, doi = {10.15394/JDFSL.2015.1211}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/YauC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Al-khateebA14, author = {Samer Al{-}khateeb and Nitin Agarwal}, title = {Developing a Conceptual Framwork for Modeling Deviant Cyber Flash Mob: {A} Socio-Computational Approach Leveraging Hypergraph Constructs}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {113--128}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1175}, doi = {10.15394/JDFSL.2014.1175}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Al-khateebA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AlmullaIJ14, author = {Sameera Abdulrahman Almulla and Youssef Iraqi and Andrew Jones}, title = {A State-of-the-Art Review of Cloud Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {4}, pages = {7--28}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1190}, doi = {10.15394/JDFSL.2014.1190}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AlmullaIJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AnobahSP14, author = {Maxwell Anobah and Shahzad Saleem and Oliver Popov}, title = {Testing Framework for Mobile Device Forensics Tools}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {221--234}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1183}, doi = {10.15394/JDFSL.2014.1183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AnobahSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Baggili14, author = {Ibrahim M. Baggili}, title = {From the Editor-in-Chief}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {7--8}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1189}, doi = {10.15394/JDFSL.2014.1189}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Baggili14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Baggili14a, author = {Ibrahim M. Baggili}, title = {From the Editor-in-Chief}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {3}, pages = {5}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1166}, doi = {10.15394/JDFSL.2014.1166}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Baggili14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Baggili14b, author = {Ibrahim M. Baggili}, title = {From the Editor-in-Chief}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {4}, pages = {5--6}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1184}, doi = {10.15394/JDFSL.2014.1184}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Baggili14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BartolacciLP14, author = {Michael Raymond Bartolacci and Larry J. LeBlanc and Ashley L. Podhradsky}, title = {Personal Denial Of Service {(PDOS)} Attacks: {A} Discussion and Exploration of a New Category of Cyber Crime}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {1}, pages = {19--36}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1161}, doi = {10.15394/JDFSL.2014.1161}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BartolacciLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Bhattathiripad14, author = {Vinod Polpaya Bhattathiripad}, title = {Forensics of Software Copyright Infringement Crimes: The Modern {POSAR} Test Juxtaposed With the Dated {AFC} Test}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {73--84}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1172}, doi = {10.15394/JDFSL.2014.1172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Bhattathiripad14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BreitingerB14, author = {Frank Breitinger and Ibrahim M. Baggili}, title = {File Detection On Network Traffic Using Approximate Matching}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {23--36}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1168}, doi = {10.15394/JDFSL.2014.1168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BreitingerB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BreitingerRB14, author = {Frank Breitinger and Christian Rathgeb and Harald Baier}, title = {An Efficient Similarity Digests Database Lookup - {A} Logarithmic Divide {\&} Conquer Approach}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {155--166}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1178}, doi = {10.15394/JDFSL.2014.1178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BreitingerRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ChowLM14, author = {Kam{-}Pui Chow and Frank Y. W. Law and Y. H. Mai}, title = {Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {51--58}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1170}, doi = {10.15394/JDFSL.2014.1170}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ChowLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Crabb14, author = {Erin Smith Crabb}, title = {"Time for Some Traffic Problems": Enhancing E-Discovery and Big Data Processing Tools with Linguistic Methods for Deception Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {167--180}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1179}, doi = {10.15394/JDFSL.2014.1179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Crabb14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/EggesteinK14, author = {Jasmine Eggestein and Kenneth J. Knapp}, title = {Fighting Child Pornography: {A} Review of Legal and Technological Developments}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {4}, pages = {29--48}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1191}, doi = {10.15394/JDFSL.2014.1191}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/EggesteinK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GaoM14, author = {Wei Gao and Thomas H. Morris}, title = {On Cyber Attacks and Signature Based Intrusion Detection for {MODBUS} Based Industrial Control Systems}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {1}, pages = {37--56}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1162}, doi = {10.15394/JDFSL.2014.1162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GaoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GuptaR14, author = {Shruti Gupta and Marcus Rogers}, title = {Exploring Forensic Implications of the Fusion Drive}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {145--154}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1177}, doi = {10.15394/JDFSL.2014.1177}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GuptaR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/James14, author = {Joshua I. James}, title = {Multi-Stakeholder Case Prioritization in Digital Investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {59--72}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1171}, doi = {10.15394/JDFSL.2014.1171}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/James14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KarabiyikA14, author = {Umit Karabiyik and Sudhir Aggarwal}, title = {Audit: Automated Disk Investigation Toolkit}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {129--144}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1176}, doi = {10.15394/JDFSL.2014.1176}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KarabiyikA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KesslerC14, author = {Gary C. Kessler and Gregory H. Carlton}, title = {An Analysis of Forensic Imaging in the Absence of Write-Blockers}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {3}, pages = {51--58}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1187}, doi = {10.15394/JDFSL.2014.1187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KesslerC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KhanMHS14, author = {Rasib Khan and Mainul Mizan and Ragib Hasan and Alan P. Sprague}, title = {Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {1}, pages = {67--82}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1164}, doi = {10.15394/JDFSL.2014.1164}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/KhanMHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KleinmannW14, author = {Amit Kleinmann and Avishai Wool}, title = {Accurate Modeling of The Siemens {S7} {SCADA} Protocol For Intrusion Detection And Digital Forensic}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {37--50}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1169}, doi = {10.15394/JDFSL.2014.1169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KleinmannW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Larson14, author = {Stephen Larson}, title = {Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {1}, pages = {83--85}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1165}, doi = {10.15394/JDFSL.2014.1165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Larson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Lau14, author = {Linda K. Lau}, title = {Book Review: The X-Ways Forensics Practitioner's Guide}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {3}, pages = {59--61}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1188}, doi = {10.15394/JDFSL.2014.1188}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Lau14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LiuSW14, author = {Changwei Liu and Anoop Singhal and Duminda Wijesekera}, title = {Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {181--196}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1180}, doi = {10.15394/JDFSL.2014.1180}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LiuSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LosavioK14, author = {Michael Losavio and Deborah W. Keeling}, title = {Evidentiary Power and Propriety of Digital Identifiers and the Impact on Privacy Rights in the United States}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {197--204}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1181}, doi = {10.15394/JDFSL.2014.1181}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LosavioK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MatousekRK14, author = {Petr Matousek and Ondrej Rysav{\'{y}} and Martin Kmet}, title = {Fast {RTP} Detection and Codecs Classification in Internet Traffic}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {101--112}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1174}, doi = {10.15394/JDFSL.2014.1174}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MatousekRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MooreLP14, author = {Jennifer Moore and Jonathan Langton and Joseph Pochron}, title = {The Cost of Privacy: Riley v. California's Impact on Cell Phone Searches}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {3}, pages = {7--18}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1185}, doi = {10.15394/JDFSL.2014.1185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MooreLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PolcakHM14, author = {Libor Polcak and Radek Hranicky and Tom{\'{a}}s Mart{\'{\i}}nek}, title = {On Identities in Modern Networks}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {9--22}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1167}, doi = {10.15394/JDFSL.2014.1167}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/PolcakHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RogersS14, author = {Marcus K. Rogers and Kathryn C. Seigfried{-}Spellar}, title = {Using Internet Artifacts to Profile a Child Pornography Suspect}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {1}, pages = {57--66}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1163}, doi = {10.15394/JDFSL.2014.1163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RogersS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SaleemBP14, author = {Shahzad Saleem and Ibrahim M. Baggili and Oliver Popov}, title = {Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: {A} Survey and a Guide for Best Practices}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {3}, pages = {19--50}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1186}, doi = {10.15394/JDFSL.2014.1186}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SaleemBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Sanchez14, author = {Pedro Lu{\'{\i}}s Pr{\'{o}}spero Sanchez}, title = {Book Review: Judiciary-Friendly Forensics of Software Copyright Infringement (Vinod Polpaya Bhattathiripad)}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {4}, pages = {63--64}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1193}, doi = {10.15394/JDFSL.2014.1193}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Sanchez14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ScanlonFKK14, author = {Mark Scanlon and Jason Farina and Nhien{-}An Le{-}Khac and M. Tahar Kechadi}, title = {Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {85--100}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1173}, doi = {10.15394/JDFSL.2014.1173}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ScanlonFKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SchwammR14, author = {Riqui Schwamm and Neil C. Rowe}, title = {Effects of the Factory Reset on Mobile Devices}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {205--220}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1182}, doi = {10.15394/JDFSL.2014.1182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SchwammR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Steel14, author = {Chad M. S. Steel}, title = {Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {1}, pages = {7--18}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1160}, doi = {10.15394/JDFSL.2014.1160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Steel14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Steel14a, author = {Chad M. S. Steel}, title = {Technical Soddi Defenses: The Trojan Horse Defense Revisited}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {4}, pages = {49--62}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1192}, doi = {10.15394/JDFSL.2014.1192}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Steel14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AdamsHM13, author = {Richard Brian Adams and Valerie Hobbs and Graham Mann}, title = {The Advanced Data Acquisition Model {(ADAM):} {A} Process Model for Digital Forensic Practice}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {25--48}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1154}, doi = {10.15394/JDFSL.2013.1154}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AdamsHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Bartolomie13, author = {Joshua Bartolomie}, title = {Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {87--90}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1152}, doi = {10.15394/JDFSL.2013.1152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Bartolomie13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Carlton13, author = {Gregory H. Carlton}, title = {A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {17--38}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1139}, doi = {10.15394/JDFSL.2013.1139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Carlton13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen13, author = {Fred Cohen}, title = {Science Column: Measuring Inconsistency Methods for Evidentiary Value}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {7--16}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1138}, doi = {10.15394/JDFSL.2013.1138}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen13a, author = {Fred Cohen}, title = {Science Column: Reconstruction: The Experimental Side of Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {49--56}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1155}, doi = {10.15394/JDFSL.2013.1155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Garfinkel13, author = {Simson L. Garfinkel}, title = {Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {65--68}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1157}, doi = {10.15394/JDFSL.2013.1157}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Garfinkel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler13, author = {Gary C. Kessler}, title = {Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {57--64}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1156}, doi = {10.15394/JDFSL.2013.1156}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Larson13, author = {Stephen Parker Larson}, title = {Analysis of Second Hand Google Mini Search Appliance}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {4}, pages = {7--24}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1153}, doi = {10.15394/JDFSL.2013.1153}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Larson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MabutoV13, author = {Enos K. Mabuto and Hein S. Venter}, title = {System-Generated Digital Forensic Evidence in Graphic Design Applications}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {71--86}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1151}, doi = {10.15394/JDFSL.2013.1151}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MabutoV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MehmetB13, author = {Murad Mehmet and Miguel Fuentes Buchholtz}, title = {Money Laundering Detection Framework to Link the Disparate and Evolving Schemes}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {41--70}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1150}, doi = {10.15394/JDFSL.2013.1150}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MehmetB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Nash13, author = {Thomas Nash}, title = {Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {115--118}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1146}, doi = {10.15394/JDFSL.2013.1146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Nash13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RuhnkaL13, author = {John C. Ruhnka and Windham E. Loopesko}, title = {Risk Management Of Email And Internet Use In The Workplace}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {7--20}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1148}, doi = {10.15394/JDFSL.2013.1148}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RuhnkaL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Schofield13, author = {Damian Schofield}, title = {Visualizing Forensic Data: Evidence Guidelines (Part 1)}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {73--90}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1141}, doi = {10.15394/JDFSL.2013.1141}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Schofield13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SchofieldF13, author = {Damian Schofield and Ken Fowle}, title = {Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2)}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {93--114}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1145}, doi = {10.15394/JDFSL.2013.1145}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SchofieldF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ShaerpourDM13, author = {Kaveh Shaerpour and Ali Dehghantanha and Ramlan Mahmod}, title = {Trends In Android Malware Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {3}, pages = {21--40}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1149}, doi = {10.15394/JDFSL.2013.1149}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ShaerpourDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Shaw13, author = {Eric D. Shaw}, title = {How Often is Employee Anger an Insider Risk I?}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {1}, pages = {39--72}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1140}, doi = {10.15394/JDFSL.2013.1140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Shaw13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Shaw13a, author = {Eric D. Shaw}, title = {How Often is Employee Aanger an Insider Risk II?}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {73--92}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1144}, doi = {10.15394/JDFSL.2013.1144}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Shaw13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghBM13, author = {Kishore Singh and Peter J. Best and Joseph M. Mula}, title = {Automating Vendor Fraud Detection in Enterprise Systems}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {7--40}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1142}, doi = {10.15394/JDFSL.2013.1142}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ThompsonL13, author = {Nik Thompson and Kevin Lee}, title = {The Digital Forensics and Security Challenge of {QR} Codes}, journal = {J. Digit. Forensics Secur. Law}, volume = {8}, number = {2}, pages = {41--72}, year = {2013}, url = {https://doi.org/10.15394/jdfsl.2013.1143}, doi = {10.15394/JDFSL.2013.1143}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ThompsonL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AlvaE12, author = {Aaron Alva and Barbara Endicott{-}Popovsky}, title = {Digital Evidence Education in Schools of Law}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {75--88}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1120}, doi = {10.15394/JDFSL.2012.1120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AlvaE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Barrett12, author = {Diane Barrett}, title = {Book Review: The Software {IP} Detective's Handbook: Measurement, Comparison, and Infringement Detections}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {87--92}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1114}, doi = {10.15394/JDFSL.2012.1114}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Barrett12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BoddingtonAB12, author = {Richard Boddington and Jeremy Ardley and Grant Austin Boxall}, title = {Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery Detection and Validation}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {29--54}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1111}, doi = {10.15394/JDFSL.2012.1111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BoddingtonAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/CantrellD12, author = {Gary Cantrell and David A. Dampier}, title = {Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {99--116}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1135}, doi = {10.15394/JDFSL.2012.1135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/CantrellD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/CarltonK12, author = {Gregory H. Carlton and Gary C. Kessler}, title = {Identifying trace evidence in data wiping application software}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {113--142}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1122}, doi = {10.15394/JDFSL.2012.1122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/CarltonK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12, author = {Fred Cohen}, title = {Column: The Physics of Digital Information-Part 2}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {7--14}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1109}, doi = {10.15394/JDFSL.2012.1109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12a, author = {Fred Cohen}, title = {Identifying and Attributing Similar Traces with Greatest Common Factor Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {89--112}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1121}, doi = {10.15394/JDFSL.2012.1121}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12b, author = {Fred Cohen}, title = {Column: The Science of Digital Forensics: Analysis of Digital Traces}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {5--12}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1125}, doi = {10.15394/JDFSL.2012.1125}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen12c, author = {Fred Cohen}, title = {Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {7--20}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1131}, doi = {10.15394/JDFSL.2012.1131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Ebert12, author = {John C. Ebert}, title = {Book Review: Mastering Windows Network Forensics and Investigation, 2/e}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {117--124}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1136}, doi = {10.15394/JDFSL.2012.1136}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Ebert12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FairbanksG12, author = {Kevin D. Fairbanks and Simson L. Garfinkel}, title = {Column: Factors Affecting Data Decay}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {7--10}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1116}, doi = {10.15394/JDFSL.2012.1116}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/FairbanksG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Flor12, author = {Nick V. Flor}, title = {Technology Corner: Automated Data Extraction Using Facebook}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {149--164}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1124}, doi = {10.15394/JDFSL.2012.1124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Flor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Flor12a, author = {Nick V. Flor}, title = {Technology Corner: {A} Regular Expression Training App}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {125--132}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1137}, doi = {10.15394/JDFSL.2012.1137}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Flor12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/IrwinDS12, author = {David Irwin and Arek Dadej and Jill Slay}, title = {Extraction Of Electronic Evidence From VoIP: Identification {\&} Analysis Of Digital Speech}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {55--82}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1128}, doi = {10.15394/JDFSL.2012.1128}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/IrwinDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Ismail12, author = {Sellam Ismail}, title = {Technology Corner: Dating of Electronic Hardware for Prior Art Investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {93--100}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1115}, doi = {10.15394/JDFSL.2012.1115}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Ismail12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Keith12, author = {Nate Keith}, title = {Book Review: System Forensics, Investigation, and Response}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {143--148}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1123}, doi = {10.15394/JDFSL.2012.1123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Keith12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Lallie12, author = {Harjinder Singh Lallie}, title = {Challenges in applying the {ACPO} principles in cloud forensic investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {71--86}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1113}, doi = {10.15394/JDFSL.2012.1113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Lallie12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LallieB12, author = {Harjinder Singh Lallie and Parmjit Bains}, title = {An Overview of the Jumplist Configuration File in Windows 7}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {15--28}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1110}, doi = {10.15394/JDFSL.2012.1110}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LallieB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoW012, author = {Thomas Lonardo and Doug White and Alan Rea}, title = {To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {83--110}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1129}, doi = {10.15394/JDFSL.2012.1129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoW012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Luoma12, author = {Milton H. Luoma}, title = {Book Review: Dispute Resolution and e-Discovery}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {111--114}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1130}, doi = {10.15394/JDFSL.2012.1130}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Luoma12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MellingZ12, author = {Larry Melling and Robert Zeidman}, title = {Comparing Android Applications to Find Copying}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {1}, pages = {55--70}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1112}, doi = {10.15394/JDFSL.2012.1112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MellingZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MoranO12, author = {John Moran and Douglas Orr}, title = {Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {33--54}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1127}, doi = {10.15394/JDFSL.2012.1127}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MoranO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/NicholsBW12, author = {Jason Nichols and David P. Biros and Mark Weiser}, title = {Toward Alignment between Communities of Practice and Knowledge-Based Decision Support}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {61--74}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1119}, doi = {10.15394/JDFSL.2012.1119}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/NicholsBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PattersonH12, author = {Jonathan Patterson and Christopher James Hargreaves}, title = {Automated Identification and Reconstruction of YouTube Video Access}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {43--60}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1118}, doi = {10.15394/JDFSL.2012.1118}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/PattersonH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Simpson12, author = {Robert Vose Simpson}, title = {Confronting Potential Injustice with Preemptive Suppression}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {21--50}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1132}, doi = {10.15394/JDFSL.2012.1132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Simpson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Szewczyk12, author = {Patryk Szewczyk}, title = {An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {51--72}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1133}, doi = {10.15394/JDFSL.2012.1133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Szewczyk12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Tu12, author = {Manghui Tu}, title = {Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {4}, pages = {73--98}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1134}, doi = {10.15394/JDFSL.2012.1134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Tu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TuXBC12, author = {Manghui Tu and Dianxiang Xu and Cristian Balan and Kyle Cronin}, title = {On the Development of Digital Forensics Curriculum}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {3}, pages = {13--32}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1126}, doi = {10.15394/JDFSL.2012.1126}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TuXBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Wright12, author = {Neil Fowler Wright}, title = {{DNS} in Computer Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {7}, number = {2}, pages = {11--42}, year = {2012}, url = {https://doi.org/10.15394/jdfsl.2012.1117}, doi = {10.15394/JDFSL.2012.1117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Wright12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Banday11, author = {M. Tariq Banday}, title = {Technology Corner: Analysing E-mail Headers For Forensic Investigation}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {2}, pages = {49--64}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1095}, doi = {10.15394/JDFSL.2011.1095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Banday11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/CarltonM11, author = {Gregory H. Carlton and Joe Matsumoto}, title = {A survey of contemporary enterprise storage technologies from a digital forensics perspective}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {3}, pages = {63--74}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1100}, doi = {10.15394/JDFSL.2011.1100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/CarltonM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen11, author = {Fred Cohen}, title = {Column: Putting the Science in Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {1}, pages = {7--14}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1085}, doi = {10.15394/JDFSL.2011.1085}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen11a, author = {Fred Cohen}, title = {A Case Study in Forensic Analysis of Control}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {1}, pages = {37--54}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1087}, doi = {10.15394/JDFSL.2011.1087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cohen11b, author = {Fred Cohen}, title = {Column: The Physics of Digital Information}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {3}, pages = {11--16}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1097}, doi = {10.15394/JDFSL.2011.1097}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cohen11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Flor11, author = {Nick Flor}, title = {Technology Corner: Virtual Crime Scene Reconstruction: The Basics of 3D Modeling}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {4}, pages = {67--74}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1108}, doi = {10.15394/JDFSL.2011.1108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Flor11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FlorG11, author = {Nick Flor and Kenneth Guillory}, title = {Technology Corner: Internet Packet Sniffers}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {1}, pages = {77--90}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1090}, doi = {10.15394/JDFSL.2011.1090}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FlorG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FlorS11, author = {Nick Flor and Haile Shannon}, title = {Technology Corner: Brute Force Password Generation - Basic Iterative and Recursive Algorithms}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {3}, pages = {79--86}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1102}, doi = {10.15394/JDFSL.2011.1102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FlorS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Garfinkel11, author = {Simson L. Garfinkel}, title = {Column: Every Last Byte}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {2}, pages = {7--8}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1091}, doi = {10.15394/JDFSL.2011.1091}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Garfinkel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Garfinkel11a, author = {Simson L. Garfinkel}, title = {Column: File Cabinet Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {4}, pages = {7--10}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1103}, doi = {10.15394/JDFSL.2011.1103}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdfsl/Garfinkel11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Hannay11, author = {Peter Hannay}, title = {Kindle Forensics: Acquisition {\&} Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {2}, pages = {17--24}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1093}, doi = {10.15394/JDFSL.2011.1093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Hannay11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/IrwinSDS11, author = {David Irwin and Jill Slay and Arek Dadej and Malcolm Shore}, title = {Extraction of Electronic Evidence from VoIP: Forensic Analysis of {A} Virtual Hard Disk Vs {RAM}}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {1}, pages = {15--36}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1086}, doi = {10.15394/JDFSL.2011.1086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/IrwinSDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kearns11, author = {Grover S. Kearns}, title = {Developing a Forensic Continuous Audit Model}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {2}, pages = {25--48}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1094}, doi = {10.15394/JDFSL.2011.1094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kearns11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kelley11, author = {Christopher Kelley}, title = {Column: The Consortium of Digital Forensics Specialists {(CDFS)}}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {3}, pages = {7--10}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1096}, doi = {10.15394/JDFSL.2011.1096}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kelley11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler11, author = {Gary C. Kessler}, title = {Judges Awareness, Understanding, and Application of Digital Evidence}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {1}, pages = {55--72}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1088}, doi = {10.15394/JDFSL.2011.1088}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LaTulippe11, author = {Timothy James LaTulippe}, title = {Working Inside The Box: An Example Of Google Desktop Search in a Forensic Examination}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {4}, pages = {11--18}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1104}, doi = {10.15394/JDFSL.2011.1104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LaTulippe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoMW011, author = {Thomas Lonardo and Tricia Martland and Doug White and Alan Rea}, title = {Legal Issues Regarding Digital Forensic Examiners Third Party Consent to Search}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {4}, pages = {19--34}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1105}, doi = {10.15394/JDFSL.2011.1105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoMW011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LuomaL11, author = {Milton H. Luoma and Vicki Miller Luoma}, title = {Sampling: Making Electronic Discovery More Cost Effective}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {2}, pages = {9--16}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1092}, doi = {10.15394/JDFSL.2011.1092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LuomaL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PiccinelliG11, author = {Mario Piccinelli and Paolo Gubian}, title = {Exploring the iPhone Backup made by iTunes}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {3}, pages = {31--62}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1099}, doi = {10.15394/JDFSL.2011.1099}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/PiccinelliG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Schulte11, author = {Christopher Schulte}, title = {Book Review: iOS Forensic Analysis: For iPhone, iPad and iPod Touch}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {1}, pages = {73--76}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1089}, doi = {10.15394/JDFSL.2011.1089}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Schulte11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Schulte11a, author = {Christopher Schulte}, title = {Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {4}, pages = {63--66}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1107}, doi = {10.15394/JDFSL.2011.1107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Schulte11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Simon11, author = {Matthew Phillip Simon}, title = {Investigating Modern Communication Technologies: The effect of Internet-based Communication Technologies on the Investigation Process}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {4}, pages = {35--62}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1106}, doi = {10.15394/JDFSL.2011.1106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Simon11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Szewczyk11, author = {Patryk Szewczyk}, title = {Analysis of Data Remaining on Second Hand {ADSL} Routers}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {3}, pages = {17--30}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1098}, doi = {10.15394/JDFSL.2011.1098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Szewczyk11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Tester11, author = {Darlene M. Tester}, title = {Book Review: Online Privacy: Issues in the Digital Age}, journal = {J. Digit. Forensics Secur. Law}, volume = {6}, number = {3}, pages = {75--78}, year = {2011}, url = {https://doi.org/10.15394/jdfsl.2011.1101}, doi = {10.15394/JDFSL.2011.1101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Tester11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AlghafliJM10, author = {Khawla Abdulla Alghafli and Andrew Jones and Thomas Anthony Martin}, title = {Forensic Analysis of the Windows 7 Registry}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {4}, pages = {5--30}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1081}, doi = {10.15394/JDFSL.2010.1081}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AlghafliJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BellB10, author = {Graeme Baxter Bell and Richard Boddington}, title = {The Beginning of the End for Digital Forensic Recovery?}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {3}, pages = {5--32}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1078}, doi = {10.15394/JDFSL.2010.1078}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BellB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BrandVW10, author = {Murray Brand and Craig Valli and Andrew Woodward}, title = {Malware Forensics: Discovery of the Intent of Deception}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {4}, pages = {31--42}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1082}, doi = {10.15394/JDFSL.2010.1082}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BrandVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ByrskiSC10, author = {Aleksander Byrski and Wojciech Stryjewski and Bartlomiej Czechowicz}, title = {Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {1}, pages = {49--62}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1071}, doi = {10.15394/JDFSL.2010.1071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ByrskiSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/CarltonW10, author = {Gregory H. Carlton and Reginald Worthley}, title = {Identifying a Computer Forensics Expert: {A} Study to Measure the Characteristics of Forensic Computer Examiners}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {1}, pages = {5--20}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1069}, doi = {10.15394/JDFSL.2010.1069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/CarltonW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/DurantiE10, author = {Luciana Duranti and Barbara Endicott{-}Popovsky}, title = {Digital Records Forensics: {A} New Science and Academic Program for Forensic Readiness}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {45--62}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1075}, doi = {10.15394/JDFSL.2010.1075}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/DurantiE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/GuoS10, author = {Yinghua Guo and Jill Slay}, title = {Computer Forensic Function Testing: Media Preparation, Write Protection And Verification}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {5--20}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1072}, doi = {10.15394/JDFSL.2010.1072}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/GuoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVDSDD10, author = {Andy Jones and Craig Valli and Glenn S. Dardick and Iain Sutherland and G. Dabibi and Gareth Davies}, title = {The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {4}, pages = {43--64}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1083}, doi = {10.15394/JDFSL.2010.1083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVDSDD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kearns10, author = {Grover S. Kearns}, title = {Computer Forensics for Graduate Accountants: {A} Motivational Curriculum Design Approach}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {63--84}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1076}, doi = {10.15394/JDFSL.2010.1076}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kearns10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler10, author = {Gary C. Kessler}, title = {Book Review: Digital Forensic Evidence Examination (2nd ed.)}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {85--88}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1077}, doi = {10.15394/JDFSL.2010.1077}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LuomaL10, author = {Milton H. Luoma and Vicki Miller Luoma}, title = {Avoiding Sanctions at the E-Discovery Meet-And- Confer in Common Law Countries}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {4}, pages = {65--80}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1084}, doi = {10.15394/JDFSL.2010.1084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LuomaL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Mubarak10, author = {Sameera Mubarak}, title = {Trust Account Fraud And Effective Information Security Management}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {3}, pages = {57--72}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1080}, doi = {10.15394/JDFSL.2010.1080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Mubarak10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SakuraiAUYS10, author = {Yui Sakurai and Yuki Ashino and Tetsutaro Uehara and Hiroshi Yoshiura and Ry{\^{o}}ichi Sasaki}, title = {HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {21--34}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1073}, doi = {10.15394/JDFSL.2010.1073}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SakuraiAUYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Valli10, author = {Craig Valli}, title = {Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {2}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1074}, doi = {10.15394/JDFSL.2010.1074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Valli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Wardman10, author = {Brad Wardman}, title = {The Deadliest Catch: Reeling In Big Phish With a Deep {MD5} Net}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {3}, pages = {33--56}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1079}, doi = {10.15394/JDFSL.2010.1079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Wardman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/WeiSWS10, author = {Chun Wei and Alan P. Sprague and Gary Warner and Anthony Skjellum}, title = {Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining}, journal = {J. Digit. Forensics Secur. Law}, volume = {5}, number = {1}, pages = {21--48}, year = {2010}, url = {https://doi.org/10.15394/jdfsl.2010.1070}, doi = {10.15394/JDFSL.2010.1070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/WeiSWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BestRT09, author = {Peter J. Best and Pall Rikhardsson and Mark Toleman}, title = {Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {1}, pages = {39--60}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1053}, doi = {10.15394/JDFSL.2009.1053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BestRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BrowningK09, author = {Dennis Browning and Gary C. Kessler}, title = {Bluetooth Hacking: {A} Case Study}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {57--72}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1058}, doi = {10.15394/JDFSL.2009.1058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BrowningK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Chawki09, author = {Mohamed Chawki}, title = {Online Child Sexual Abuse: The French Response}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {7--42}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1164}, doi = {10.15394/JDFSL.2009.1164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Chawki09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Cronje09, author = {Francis S. Cronj{\'{e}}}, title = {A Synopsis of Proposed Data Protection Legislation in {SA}}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {43--50}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1165}, doi = {10.15394/JDFSL.2009.1165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Cronje09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Fick09, author = {Jacqueline Fick}, title = {Prevention is Better than Prosecution: Deepening the Defence against Cyber Crime}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {51--72}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1166}, doi = {10.15394/JDFSL.2009.1166}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Fick09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Jobodwana09, author = {Z. Ntozintle Jobodwana}, title = {Telecommunications Liberalisation in Africa: Proposed Regulatory Model for the {SADC} Region}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {4}, pages = {73--94}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1167}, doi = {10.15394/JDFSL.2009.1167}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Jobodwana09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KahvedzicK09, author = {Damir Kahvedzic and M. Tahar Kechadi}, title = {Correlating Orphaned Windows Registry Data Structures}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {39--56}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1057}, doi = {10.15394/JDFSL.2009.1057}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KahvedzicK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kearns09, author = {Grover S. Kearns}, title = {Graduate Accounting Students' Perception of {IT} Forensics: {A} Multi-Dimensional Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {1}, pages = {5--38}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1052}, doi = {10.15394/JDFSL.2009.1052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kearns09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler09, author = {Gary C. Kessler}, title = {Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {57--60}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1163}, doi = {10.15394/JDFSL.2009.1163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KulkarniGNE09, author = {Asawaree Kulkarni and James Goldman and Brad Nabholz and William Eyre}, title = {Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {5--26}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1055}, doi = {10.15394/JDFSL.2009.1055}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KulkarniGNE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoW009, author = {Thomas Lonardo and Doug White and Alan Rea}, title = {To License or Not to License Revisited: An Examination of State Statutes Regarding Private Investigators and Digital Examiners}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {35--56}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1162}, doi = {10.15394/JDFSL.2009.1162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoW009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LuseMT09, author = {Andy Luse and Brian E. Mennecke and Anthony M. Townsend}, title = {Electronic Forms-Based Computing for Evidentiary Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {17--34}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1161}, doi = {10.15394/JDFSL.2009.1161}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LuseMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SmithC09, author = {Stevenson G. Smith and Larry D. Crumbley}, title = {Defining a Forensic Audit}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {1}, pages = {61--80}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1054}, doi = {10.15394/JDFSL.2009.1054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SmithC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SutherlandDPB09, author = {Iain Sutherland and Gareth Davies and Nick Pringle and Andrew Blyth}, title = {The Impact of Hard Disk Firmware Steganography on Computer Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {73--84}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1059}, doi = {10.15394/JDFSL.2009.1059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SutherlandDPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Valli09, author = {Craig Valli}, title = {Visualisation of Honeypot Data Using Graphviz and Afterglow}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {2}, pages = {27--38}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1056}, doi = {10.15394/JDFSL.2009.1056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Valli09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ValliS09, author = {Craig Valli and Patryk Szewczyk}, title = {Insecurity by Obscurity: {A} Review of SoHo Router Literature from a Network Security Perspective}, journal = {J. Digit. Forensics Secur. Law}, volume = {4}, number = {3}, pages = {5--16}, year = {2009}, url = {https://doi.org/10.15394/jdfsl.2009.1160}, doi = {10.15394/JDFSL.2009.1160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ValliS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Barrett08, author = {Diane Barrett}, title = {Trends in Virtualized User Environments}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {2}, pages = {5--16}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1038}, doi = {10.15394/JDFSL.2008.1038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Barrett08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Bhowmik08, author = {Rekha Bhowmik}, title = {Data Mining Techniques in Fraud Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {2}, pages = {35--54}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1040}, doi = {10.15394/JDFSL.2008.1040}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Bhowmik08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Carlton08, author = {Gregory H. Carlton}, title = {An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {3}, pages = {43--60}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1045}, doi = {10.15394/JDFSL.2008.1045}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Carlton08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/DailySDM08, author = {Jeremy S. Daily and Nathan Singleton and Elizabeth Downing and Gavin Wylie Manes}, title = {The Forensics Aspects of Event Data Recorders}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {3}, pages = {29--42}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1044}, doi = {10.15394/JDFSL.2008.1044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/DailySDM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JiangX08, author = {Keyu Jiang and Ruifeng Xuan}, title = {Book Review: Guide to computer forensics and investigations (3rd ed.)}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {3}, pages = {81--84}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1047}, doi = {10.15394/JDFSL.2008.1047}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JiangX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVDS08, author = {Andy Jones and Craig Valli and Glenn S. Dardick and Iain Sutherland}, title = {The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {1}, pages = {5--24}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1034}, doi = {10.15394/JDFSL.2008.1034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVS08, author = {Andy Jones and Craig Valli and Iain Sutherland}, title = {Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {2}, pages = {55--70}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1041}, doi = {10.15394/JDFSL.2008.1041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KahvedzicK08, author = {Damir Kahvedzic and M. Tahar Kechadi}, title = {Extraction and Categorisation of User Activity from Windows Restore Points}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {4}, pages = {23--42}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1049}, doi = {10.15394/JDFSL.2008.1049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KahvedzicK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler08, author = {Gary C. Kessler}, title = {Book Review: Challenges to Digital Forensic Evidence}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {1}, pages = {57--60}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1037}, doi = {10.15394/JDFSL.2008.1037}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler08a, author = {Gary C. Kessler}, title = {Book Review: The dotCrime Manifesto: How to Stop Internet Crime}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {2}, pages = {71--74}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1042}, doi = {10.15394/JDFSL.2008.1042}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler08b, author = {Gary C. Kessler}, title = {Book Review: Mac {OS} X, iPod, and iPhone Forensic Analysis {DVD} Toolkit}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {4}, pages = {59--62}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1051}, doi = {10.15394/JDFSL.2008.1051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LonardoW008, author = {Thomas Lonardo and Doug White and Alan Rea}, title = {To License or Not to License: An Examination of State Statutes Regarding Private Investigators and Digital Examiners}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {3}, pages = {61--80}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1046}, doi = {10.15394/JDFSL.2008.1046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LonardoW008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Mee08, author = {Vivienne Mee}, title = {Who is Reading the Data on Your Old Computer?}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {1}, pages = {25--34}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1035}, doi = {10.15394/JDFSL.2008.1035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Mee08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MlitwaK08, author = {N. Mlitwa and Y. Kachala}, title = {Data Security Measures in the {IT} Service Industry: {A} Balance between Knowledge {\&} Action}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {4}, pages = {5--22}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1048}, doi = {10.15394/JDFSL.2008.1048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MlitwaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Pasupatheeswaran08, author = {Satheesaan Pasupatheeswaran}, title = {Data recovery from PalmmsgV001}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {4}, pages = {43--58}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1050}, doi = {10.15394/JDFSL.2008.1050}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Pasupatheeswaran08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PavlicST08, author = {Timothy Pavlic and Jill Slay and Benjamin P. Turnbull}, title = {Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {1}, pages = {35--56}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1036}, doi = {10.15394/JDFSL.2008.1036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/PavlicST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SchwerhaI08, author = {Joseph J. Schwerha and Scott Inch}, title = {Remote Forensics May Bring the Next Sea Change in E-discovery: Are All Networked Computers Now Readily Accessible Under the Revised Federal Rules of Civil Procedure?}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {3}, pages = {5--28}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1043}, doi = {10.15394/JDFSL.2008.1043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SchwerhaI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/WarkentinBS08, author = {Merrill Warkentin and Ernst Bekkering and Mark B. Schmidt}, title = {Steganography: Forensic, Security, and Legal Issues}, journal = {J. Digit. Forensics Secur. Law}, volume = {3}, number = {2}, pages = {17--34}, year = {2008}, url = {https://doi.org/10.15394/jdfsl.2008.1039}, doi = {10.15394/JDFSL.2008.1039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/WarkentinBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Al-Hamdani07, author = {Wasim A. Al{-}Hamdani}, title = {Education Organization Baseline Control Protection and Trusted Level Security}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {4}, pages = {19--42}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1030}, doi = {10.15394/JDFSL.2007.1030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Al-Hamdani07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AppuduraiR07, author = {Janaletchumi Appudurai and Chitra Latha Ramalingam}, title = {Computer Crimes: {A} Case Study of What Malaysia Can Learn from Others?}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {2}, pages = {7--22}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1020}, doi = {10.15394/JDFSL.2007.1020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AppuduraiR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BarnesB07, author = {Stephen Barnes and David P. Biros}, title = {An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {3}, pages = {7--28}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1025}, doi = {10.15394/JDFSL.2007.1025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BarnesB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Blake07, author = {Errol A. Blake}, title = {Network and Database Security: Regulatory Compliance, Network, and Database Security - {A} Unified Process and Goal}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {4}, pages = {77--106}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1033}, doi = {10.15394/JDFSL.2007.1033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Blake07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BudimirS07, author = {Nikica Budimir and Jill Slay}, title = {Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {1}, pages = {75--92}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1018}, doi = {10.15394/JDFSL.2007.1018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BudimirS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Carlton07, author = {Gregory H. Carlton}, title = {A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {1}, pages = {35--56}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1015}, doi = {10.15394/JDFSL.2007.1015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Carlton07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Etsebeth07, author = {Verine Etsebeth}, title = {Monitoring and Surveillance in the Workplace: Lessons Learnt? {\^{a}}{\mbox{\texteuro}}" Investigating the International Legal Position}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {2}, pages = {23--40}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1021}, doi = {10.15394/JDFSL.2007.1021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Etsebeth07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/FranciaEFNS07, author = {Guillermo Francia III and Brian Estes and Rahjima R. Francia and Vu Nguyen and Alex Scroggins}, title = {The Design and Implementation of an Automated Security Compliance Toolkit: {A} Pedagogical Exercise}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {4}, pages = {59--76}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1032}, doi = {10.15394/JDFSL.2007.1032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/FranciaEFNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler07, author = {Gary C. Kessler}, title = {Book Review: No Place To Hide}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {1}, pages = {93--96}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1019}, doi = {10.15394/JDFSL.2007.1019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler07a, author = {Gary C. Kessler}, title = {Book Review: Conquest in Cyberspace: National Security and Information Warfare}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {2}, pages = {67--70}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1024}, doi = {10.15394/JDFSL.2007.1024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KnappFMR07, author = {Kenneth J. Knapp and F. Nelson Ford and Thomas E. Marshall and R. Kelly Rainer Jr.}, title = {The Common Body of Knowledge: {A} Framework to Promote Relevant Information Security Research}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {1}, pages = {9--34}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1016}, doi = {10.15394/JDFSL.2007.1016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KnappFMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LeeS07, author = {Ki Jung Lee and Il{-}Yeol Song}, title = {Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {3}, pages = {29--44}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1028}, doi = {10.15394/JDFSL.2007.1028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LeeS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Liu07, author = {Jigang Liu}, title = {Book Review: Computer Forensics: Principles and Practices}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {3}, pages = {57--60}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1027}, doi = {10.15394/JDFSL.2007.1027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Liu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PawarSK07, author = {R. G. Pawar and B. S. Sawant and A. Kaiwade}, title = {Information Technology Act 2000 in India - Authentication of E-Documents}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {2}, pages = {57--66}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1023}, doi = {10.15394/JDFSL.2007.1023}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/PawarSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Taylor07, author = {Richard G. Taylor}, title = {Making Molehills Out of Mountains: Bringing Security Research to the Classroom}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {4}, pages = {43--58}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1031}, doi = {10.15394/JDFSL.2007.1031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Taylor07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Twitchell07, author = {Douglas P. Twitchell}, title = {SecurityCom: {A} Multi-Player Game for Researching and Teaching Information Security Teams}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {4}, pages = {9--18}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1029}, doi = {10.15394/JDFSL.2007.1029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Twitchell07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Vidas07, author = {Timothy Vidas}, title = {Providing a Foundation for Analysis of Volatile Data Stores}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {3}, pages = {45--56}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1026}, doi = {10.15394/JDFSL.2007.1026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Vidas07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Watney07, author = {Murdoch Watney}, title = {The Evolution of Internet Legal Regulation in Addressing Crime and Terrorism}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {2}, pages = {41--56}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1022}, doi = {10.15394/JDFSL.2007.1022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Watney07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Williams07, author = {Patricia A. H. Williams}, title = {Information Governance: {A} Model for Security in Medical Practice}, journal = {J. Digit. Forensics Secur. Law}, volume = {2}, number = {1}, pages = {57--74}, year = {2007}, url = {https://doi.org/10.15394/jdfsl.2007.1017}, doi = {10.15394/JDFSL.2007.1017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Williams07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AlbrechtAWF06, author = {Chad Albrecht and Conan C. Albrecht and Jonathan Wareham and Paul B. Fox}, title = {The Role of Power and Negotiation in Online Deception}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {29--48}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1012}, doi = {10.15394/JDFSL.2006.1012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AlbrechtAWF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BagbyR06, author = {John W. Bagby and John C. Ruhnka}, title = {Electronic Data Discovery: Integrating Due Process into Cyber Forensic Practice}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {1}, pages = {5--24}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1000}, doi = {10.15394/JDFSL.2006.1000}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BagbyR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/BagbyR06a, author = {John W. Bagby and John C. Ruhnka}, title = {Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {39--74}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1005}, doi = {10.15394/JDFSL.2006.1005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/BagbyR06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JansenA06, author = {Wayne A. Jansen and Rick Ayers}, title = {Forensic Tools for Mobile Phone Subscriber Identity Modules}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {75--94}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1006}, doi = {10.15394/JDFSL.2006.1006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JansenA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/JonesVST06, author = {Andy Jones and Craig Valli and Iain Sutherland and Paula Thomas}, title = {The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {23--36}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1008}, doi = {10.15394/JDFSL.2006.1008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/JonesVST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kearns06, author = {Grover S. Kearns}, title = {A Curriculum for Teaching Information Technology Investigative Techniques for Auditors}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {9--28}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1011}, doi = {10.15394/JDFSL.2006.1011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kearns06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Kessler06, author = {Gary C. Kessler}, title = {Book Review: Digital Crime and Forensic Science in Cyberspace}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {67--70}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1014}, doi = {10.15394/JDFSL.2006.1014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Kessler06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KesslerS06, author = {Gary C. Kessler and Michael E. Schirling}, title = {The Design of an Undergraduate Degree Program in Computer {\&} Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {37--50}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1009}, doi = {10.15394/JDFSL.2006.1009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KesslerS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MorfittV06, author = {Kim Morfitt and Craig Valli}, title = {A Forensic Log File Extraction Tool for {ICQ} Instant Messaging Clients}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {51--64}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1010}, doi = {10.15394/JDFSL.2006.1010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MorfittV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RogersGMWD06, author = {Marcus K. Rogers and James Goldman and Richard Mislan and Timothy Wedge and Steve Debrota}, title = {Computer Forensics Field Triage Process Model}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {19--38}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1004}, doi = {10.15394/JDFSL.2006.1004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RogersGMWD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SlayS06, author = {Jill Slay and Fiona Schulz}, title = {Development of an Ontology Based Forensic Search Mechanism: Proof of Concept}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {1}, pages = {25--44}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1002}, doi = {10.15394/JDFSL.2006.1002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SlayS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SongLHMCC06, author = {Il{-}Yeol Song and Ki Jung Lee and Xiaohua Hu and John D. Maguire and Namyoun Choi and Peter P. Chen}, title = {Designing a Data Warehouse for Cyber Crimes}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {3}, pages = {5--22}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1007}, doi = {10.15394/JDFSL.2006.1007}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SongLHMCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Stahl06, author = {Bernd Carsten Stahl}, title = {Is Forensic Computing a Profession? Revisiting an Old Debate in a New Field}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {4}, pages = {49--66}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1043}, doi = {10.15394/JDFSL.2006.1043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Stahl06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TanriverdiHMBHH06, author = {H{\"{u}}seyin Tanriverdi and Jonathan Harrison and Ketan S. Mesuria and Joshua Bertsch and Po{-}Ling Hsiao and David Hendrawirawan}, title = {AlphaCo: {A} Teaching Case on Information Technology Audit and Security}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {1}, pages = {45--68}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1001}, doi = {10.15394/JDFSL.2006.1001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TanriverdiHMBHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/WeiserBM06, author = {Mark Weiser and David P. Biros and Greg Mosier}, title = {Development of a National Repository of Digital Forensic Intelligence}, journal = {J. Digit. Forensics Secur. Law}, volume = {1}, number = {2}, pages = {5--18}, year = {2006}, url = {https://doi.org/10.15394/jdfsl.2006.1003}, doi = {10.15394/JDFSL.2006.1003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/WeiserBM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.