Search dblp for Publications

export results for "stream:streams/journals/jdfsl:"

 download as .bib file

@article{DBLP:journals/jdfsl/AngelopoulouJHP22,
  author       = {Olga Angelopoulou and
                  Andy Jones and
                  Graeme Horsman and
                  Seyedali Pourmoafi},
  title        = {A Study of the Data Remaining on Second-Hand Mobile Devices in the
                  {UK}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {17},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.58940/1558-7223.1785},
  doi          = {10.58940/1558-7223.1785},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AngelopoulouJHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GogiaR22,
  author       = {Gaurav Gogia and
                  Parag H. Rughani},
  title        = {An {ML} based Digital Forensics Software for Triage Analysis through
                  Face Recognition},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {17},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.58940/1558-7223.1772},
  doi          = {10.58940/1558-7223.1772},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GogiaR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KhalidQ22,
  author       = {Zainab Khalid and
                  Sana Qadir},
  title        = {An Evaluation Framework For Digital Image Forensics Tools},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {17},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.58940/1558-7223.1727},
  doi          = {10.58940/1558-7223.1727},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KhalidQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RoyB22,
  author       = {Priya Roy and
                  Rituraj Bhowal},
  title        = {An Analysis of Product Liability for {AI} Entities with special reference
                  to the Consumer Protection Act, 2019},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {17},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.58940/1558-7223.1820},
  doi          = {10.58940/1558-7223.1820},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RoyB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AsanteA21,
  author       = {Audrey Asante and
                  Vincent Amankona},
  title        = {Digital Forensic Readiness Framework based on Honeypot and Honeynet
                  for {BYOD}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1706},
  doi          = {10.58940/1558-7223.1706},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AsanteA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BoozerJM21,
  author       = {Abel Alex Boozer and
                  Arun John and
                  Tathagata Mukherjee},
  title        = {Internet of Things Software and Hardware Architectures and Their Impacts
                  on Forensic Investigations: Current Approaches and Challenges},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1759},
  doi          = {10.58940/1558-7223.1759},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BoozerJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HopkinsR21,
  author       = {Brandon J. Hopkins and
                  Kevin A. Riggle},
  title        = {An Economical Method for Securely Disintegrating Solid-State Drives
                  Using Blenders},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1681},
  doi          = {10.58940/1558-7223.1681},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HopkinsR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kara21,
  author       = {Ilker Kara},
  title        = {Don't Bite the Bait: Phishing Attack for Internet Banking (E-Banking)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1743},
  doi          = {10.58940/1558-7223.1743},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kara21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Korkin21,
  author       = {Igor Korkin},
  title        = {Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the
                  Rescue Again},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1726},
  doi          = {10.58940/1558-7223.1726},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Korkin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Olber21,
  author       = {Pawel Olber},
  title        = {The survey on cross-border collection of digital evidence by representatives
                  from Polish prosecutors' offices and judicial authorities},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1700},
  doi          = {10.58940/1558-7223.1700},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Olber21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/OrunsoluSKB21,
  author       = {Abdul Abiodun Orunsolu and
                  Adesina S. Sodiya and
                  Sakiru Oluyemi Kareem and
                  Oladimeji G. B},
  title        = {Performance Assessment of some Phishing predictive models based on
                  Minimal Feature corpus},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {16},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.58940/1558-7223.1692},
  doi          = {10.58940/1558-7223.1692},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/OrunsoluSKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GetreuM19,
  author       = {Jens Getreu and
                  Olaf Maennel},
  title        = {Enhancing Forensic-Tool Security with Rust: Development of a String
                  Extraction Utility},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {14},
  number       = {2},
  pages        = {46--58},
  year         = {2019},
  url          = {https://commons.erau.edu/jdfsl/vol14/iss2/4},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GetreuM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HeinlYW19,
  author       = {Michael P. Heinl and
                  Bo Yu and
                  Duminda Wijesekera},
  title        = {A Framework to Reveal Clandestine Organ Trafficking in the Dark Web
                  and Beyond},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {14},
  number       = {1},
  pages        = {2:1--2:19},
  year         = {2019},
  url          = {https://commons.erau.edu/jdfsl/vol14/iss1/2},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HeinlYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HyslipH19,
  author       = {Thomas Hyslip and
                  Thomas Holt},
  title        = {Examining the Correlates of Failed DRDoS Attacks},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {14},
  number       = {2},
  pages        = {1--12},
  year         = {2019},
  url          = {https://commons.erau.edu/jdfsl/vol14/iss2/2},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HyslipH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Minor19,
  author       = {John B. Minor},
  title        = {Forensic Cell Site Analysis: Mobile Network Operator Evidence Integrity
                  Maintenance Research},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {14},
  number       = {2},
  pages        = {59--85},
  year         = {2019},
  url          = {https://commons.erau.edu/jdfsl/vol14/iss2/5},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Minor19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SedaKC19,
  author       = {Michael A. Seda and
                  Bonita Peterson Kramer and
                  Larry D. Crumbley},
  title        = {An Examination of Computer Forensics and Related Certifications In
                  The Accounting Curriculum},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {14},
  number       = {1},
  pages        = {4:1--4:23},
  year         = {2019},
  url          = {https://commons.erau.edu/jdfsl/vol14/iss1/4},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SedaKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/VermaGCG19,
  author       = {Robin Verma and
                  Jayaprakash Govindaraj and
                  Saheb Chhabra and
                  Gaurav Gupta},
  title        = {{DF} 2.0: An Automated, Privacy Preserving, and Efficient Digital
                  Forensic Framework That Leverages Machine Learning for Evidence Prediction
                  and Privacy Evaluation},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {14},
  number       = {2},
  pages        = {13--44},
  year         = {2019},
  url          = {https://commons.erau.edu/jdfsl/vol14/iss2/3},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/VermaGCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Zahadat19,
  author       = {Nima Zahadat},
  title        = {Digital Forensics, {A} Need for Credentials and Standards},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {14},
  number       = {1},
  pages        = {3:1--3:14},
  year         = {2019},
  url          = {https://commons.erau.edu/jdfsl/vol14/iss1/3},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Zahadat19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/0002AM18,
  author       = {Andrew Jones and
                  Fahad Alanazi and
                  Catherine Menon},
  title        = {Sharia Law and Digital Forensics in Saudi Arabia},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {3},
  pages        = {5--20},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1568},
  doi          = {10.15394/JDFSL.2018.1568},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/0002AM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Azhar0I18,
  author       = {M. A. Hannan Bin Azhar and
                  Thomas Barton and
                  Tasmina Islam},
  title        = {Drone Forensic Analysis Using Open Source Tools},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {1},
  pages        = {7--30},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1513},
  doi          = {10.15394/JDFSL.2018.1513},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Azhar0I18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/EnceTC18,
  author       = {Choli Ence and
                  Joan Through and
                  Gary Cantrell},
  title        = {Chip-off Success Rate Analysis Comparing Temperature and Chip Type},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {4},
  pages        = {33--59},
  year         = {2018},
  url          = {https://commons.erau.edu/jdfsl/vol13/iss4/7},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/EnceTC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HaqueA18,
  author       = {Md Shariful Haque and
                  Travis Atkison},
  title        = {A Forensic Enabled Data Provenance Model for Public Cloud},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {3},
  pages        = {47--66},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1570},
  doi          = {10.15394/JDFSL.2018.1570},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HaqueA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Lancelot18,
  author       = {Jonathan F. Lancelot},
  title        = {Russia Today, Cyberterrorists Tomorrow: {U.S.} Failure to Prepare
                  Democracy for Cyberspace},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {4},
  pages        = {23--32},
  year         = {2018},
  url          = {https://commons.erau.edu/jdfsl/vol13/iss4/6},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Lancelot18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LeopardRM18,
  author       = {Charles Leopard and
                  Neil C. Rowe and
                  Michael McCarrin},
  title        = {Testing Memory Forensics Tools for the Macintosh {OS} {X} Operating
                  System},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {1},
  pages        = {31--42},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1491},
  doi          = {10.15394/JDFSL.2018.1491},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LeopardRM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LillisBS18,
  author       = {David Lillis and
                  Frank Breitinger and
                  Mark Scanlon},
  title        = {Hierarchical Bloom Filter Trees for Approximate Matching},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {1},
  pages        = {81--96},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1489},
  doi          = {10.15394/JDFSL.2018.1489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LillisBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/McAteerHMB18,
  author       = {Ian McAteer and
                  Peter Hannay and
                  Muhammad Imran Malik and
                  Zubair A. Baig},
  title        = {Forensic Analysis of a Crash-Damaged Cheerson {CX-20} Auto Pathfinder
                  Drone},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {4},
  pages        = {5--22},
  year         = {2018},
  url          = {https://commons.erau.edu/jdfsl/vol13/iss4/5},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/McAteerHMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/McKeown0L18,
  author       = {Sean McKeown and
                  Gordon Russell and
                  Petra Leimich},
  title        = {Fingerprinting JPEGs With Optimised Huffman Tables},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {2},
  pages        = {7:1--7:14},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1451},
  doi          = {10.15394/JDFSL.2018.1451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/McKeown0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RenSLFZZ18,
  author       = {Pu Ren and
                  Wuyang Shui and
                  Jin Liu and
                  Yachun Fan and
                  Wenshuo Zhao and
                  Mingquan Zhou},
  title        = {A Sketch-based Rapid Modeling Method for Crime Scene Presentation},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {1},
  pages        = {43--58},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1484},
  doi          = {10.15394/JDFSL.2018.1484},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RenSLFZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RobbersonM18,
  author       = {Stephanie Robberson and
                  Mark McCoy},
  title        = {A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through
                  Individual Vendors},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {2},
  pages        = {5:1--5:19},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1449},
  doi          = {10.15394/JDFSL.2018.1449},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RobbersonM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SachdevWCR18,
  author       = {Hitesh Sachdev and
                  Hayden Wimmer and
                  Lei Chen and
                  Carl M. Rebman},
  title        = {A New Framework for Securing, Extracting and Analyzing Big Forensic
                  Data},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {2},
  pages        = {6:1--6:17},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1419},
  doi          = {10.15394/JDFSL.2018.1419},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SachdevWCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TeerakanokU18,
  author       = {Songpon Teerakanok and
                  Tetsutaro Uehara},
  title        = {Enhancement of Media Splicing Detection: {A} General Framework},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {2},
  pages        = {8:1--8:12},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1481},
  doi          = {10.15394/JDFSL.2018.1481},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TeerakanokU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/VondracekPR18,
  author       = {Martin Vondr{\'{a}}cek and
                  Jan Pluskal and
                  Ondrej Rysav{\'{y}}},
  title        = {Automated Man-in-the-Middle Attack Against Wi{\unicode{8209}}Fi Networks},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {1},
  pages        = {59--80},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1495},
  doi          = {10.15394/JDFSL.2018.1495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/VondracekPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/WimmerCN18,
  author       = {Hayden Wimmer and
                  Lei Chen and
                  Thomas W. Narock},
  title        = {Ontologies and the Semantic Web for Digital Investigation Tool Selection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {13},
  number       = {3},
  pages        = {21--46},
  year         = {2018},
  url          = {https://doi.org/10.15394/jdfsl.2018.1569},
  doi          = {10.15394/JDFSL.2018.1569},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/WimmerCN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AfanasievaK17,
  author       = {Svetlana Afanasieva and
                  Irina Kilina},
  title        = {Use of House Arrest In The Context of the Respecting the Constitutional
                  Rights of an Individual in Russia},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {103--112},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1496},
  doi          = {10.15394/JDFSL.2017.1496},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AfanasievaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AkatyevJ17,
  author       = {Nikolay Akatyev and
                  Joshua James},
  title        = {Legislative Requirements for Cyber Peacekeeping},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {23--38},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1447},
  doi          = {10.15394/JDFSL.2017.1447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AkatyevJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AtkisonW17,
  author       = {Travis Atkison and
                  Nathan Wallace},
  title        = {A Power Grid Incident Identification Based on Physically Derived Cyber-Event
                  Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {5--18},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1480},
  doi          = {10.15394/JDFSL.2017.1480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AtkisonW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Barrett17,
  author       = {Diane Barrett},
  title        = {Applying a Contingency Framework to Digital Forensic Processes in
                  Cloud Based Acquisitions},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {75--96},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1473},
  doi          = {10.15394/JDFSL.2017.1473},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Barrett17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Borisevich17,
  author       = {Galina Borisevich},
  title        = {Providing for the Safety of the Participants of the Criminal Court
                  Proceedings - The Subject of Cconcern of Russian Legislator, Government,
                  Scientists and Practicians},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {95--102},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1494},
  doi          = {10.15394/JDFSL.2017.1494},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Borisevich17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/DiezZC17,
  author       = {Isabel de la Torre D{\'{\i}}ez and
                  Bego{\~{n}}a Garc{\'{\i}}a Zapirain and
                  Miguel L{\'{o}}pez Coronado},
  title        = {Analysis of Security in Big Data Related to Healthcare},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {39--46},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1448},
  doi          = {10.15394/JDFSL.2017.1448},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/DiezZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Dogan17,
  author       = {Seng{\"{u}}l Dogan},
  title        = {A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {87--100},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1456},
  doi          = {10.15394/JDFSL.2017.1456},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Dogan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Fowler17,
  author       = {James E. Fowler},
  title        = {Compression of Virtual-Machine Memory in Dynamic Malware Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {41--46},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1437},
  doi          = {10.15394/JDFSL.2017.1437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Fowler17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HornerH17,
  author       = {Matthew Horner and
                  Thomas Hyslip},
  title        = {{SQL} Injection: The Longest Running Sequel in Programming History},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {97--108},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1475},
  doi          = {10.15394/JDFSL.2017.1475},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HornerH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KarampidisP17,
  author       = {Konstantinos Karampidis and
                  Giorgos Papadourakis},
  title        = {File Type Identification - Computational Intelligence for Digital
                  Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {19--32},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1472},
  doi          = {10.15394/JDFSL.2017.1472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KarampidisP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KarieK17,
  author       = {Nickson M. Karie and
                  Simon M. Karume},
  title        = {Digital Forensic Readiness in Organizations: Issues and Challenges},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {43--54},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1436},
  doi          = {10.15394/JDFSL.2017.1436},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KarieK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KeelingL17,
  author       = {Deborah W. Keeling and
                  Michael Losavio},
  title        = {Public Security {\&} Digital Forensics in the United States: The
                  Continued Need for Expanded Digital Systems for Security},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {47--60},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1452},
  doi          = {10.15394/JDFSL.2017.1452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KeelingL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KuznetsovaB17,
  author       = {Olga Kuznetsova and
                  Natalia Pavlovna Bondarenko},
  title        = {Private Life Safety Provision in Digital Age},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {77--86},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1460},
  doi          = {10.15394/JDFSL.2017.1460},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KuznetsovaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LosavioE17,
  author       = {Michael Losavio and
                  Adel Elmaghraby},
  title        = {Security and the Transnational Information Polity},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {67--76},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1458},
  doi          = {10.15394/JDFSL.2017.1458},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LosavioE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Minor17,
  author       = {John B. Minor},
  title        = {Forensic Cell Site Analysis: {A} Validation {\&} Error Mitigation
                  Methodology},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {33--52},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1474},
  doi          = {10.15394/JDFSL.2017.1474},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Minor17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MooreBB17,
  author       = {Jason Moore and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Find Me If You Can: Mobile {GPS} Mapping Applications Forensic Analysis
                  {\&} {SNAVP} the Open Source, Modular, Extensible Parser},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {15--30},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1414},
  doi          = {10.15394/JDFSL.2017.1414},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MooreBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ParkJJ17,
  author       = {Sungmi Park and
                  Yunsik Jang and
                  Joshua James},
  title        = {Possession of Child Exploitation Material in Computer Temporary Internet
                  Cache},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {7--22},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1446},
  doi          = {10.15394/JDFSL.2017.1446},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ParkJJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ParkPKCJ17,
  author       = {Kyoung Park and
                  Jung{-}Min Park and
                  Eun{-}Jin Kim and
                  Chang Cheon and
                  Joshua James},
  title        = {Anti-Forensic Trace Detection in Digital Forensic Triage Investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {31--40},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1421},
  doi          = {10.15394/JDFSL.2017.1421},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ParkPKCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PastukhovPF17,
  author       = {Pavel Pastukhov and
                  Svetlana Polyakova and
                  Evelina Frolovich},
  title        = {The Use of Information Technologies to Combat Counterfeit Alcohol
                  Products and Ensure the Right to Life in Russia},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {87--94},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1461},
  doi          = {10.15394/JDFSL.2017.1461},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PastukhovPF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RN17,
  author       = {Chetan K. R and
                  Shivananda Nirmala},
  title        = {Multiple Content Adaptive Intelligent Watermarking Schemes for the
                  Protection of Blocks of a Document Image},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {5--28},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1407},
  doi          = {10.15394/JDFSL.2017.1407},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SchatzBW17,
  author       = {Daniel Schatz and
                  Rabih Bashroush and
                  Julie A. Wall},
  title        = {Towards a More Representative Definition of Cyber Security},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {53--74},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1476},
  doi          = {10.15394/JDFSL.2017.1476},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SchatzBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ShahSZ17,
  author       = {Makhdoom Shah and
                  Shahzad Saleem and
                  Roha Zulqarnain},
  title        = {Protecting Digital Evidence Integrity and Preserving Chain of Custody},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {121--130},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1478},
  doi          = {10.15394/JDFSL.2017.1478},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ShahSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/StadlingerD17,
  author       = {Johannes Stadlinger and
                  Andreas Dewald},
  title        = {A Forensic Email Analysis Tool Using Dynamic Visualization},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {7--14},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1413},
  doi          = {10.15394/JDFSL.2017.1413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/StadlingerD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SudozaiHSK17,
  author       = {M. A. K. Sudozai and
                  Nisar Habib and
                  Shahzad Saleem and
                  A. A. Khan},
  title        = {Signatures of Viber Security Traffic},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {109--120},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1477},
  doi          = {10.15394/JDFSL.2017.1477},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SudozaiHSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SyatchikhinGS17,
  author       = {Alexander Syatchikhin and
                  Valery Golubtsov and
                  Natalia Syropiatova},
  title        = {Contractual Responsibility for the Disclosure of Bank Secrets},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {61--66},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1454},
  doi          = {10.15394/JDFSL.2017.1454},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SyatchikhinGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SzewczykM17,
  author       = {Patryk Szewczyk and
                  Rose Macdonald},
  title        = {Broadband Router Security: History, Challenges and Future Implications},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {55--74},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1444},
  doi          = {10.15394/JDFSL.2017.1444},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SzewczykM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TeagueB17,
  author       = {Ryne Teague and
                  Michael Black},
  title        = {Evidence Verification Complications with Solid-State Drives},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {75--86},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1445},
  doi          = {10.15394/JDFSL.2017.1445},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TeagueB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ThroughC17,
  author       = {Joan Through and
                  Gary Cantrell},
  title        = {Varying Instructional Approaches to Physical Extraction of Mobile
                  Device Memory},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {29--42},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1420},
  doi          = {10.15394/JDFSL.2017.1420},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ThroughC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TobinLK17,
  author       = {Patrick Tobin and
                  Nhien{-}An Le{-}Khac and
                  M. Tahar Kechadi},
  title        = {Forensic Analysis of Virtual Hard Drives},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {47--58},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1438},
  doi          = {10.15394/JDFSL.2017.1438},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TobinLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Al-khateebCABB16,
  author       = {Samer Al{-}khateeb and
                  Kevin J. Conlan and
                  Nitin Agarwal and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Exploring Deviant Hacker Networks {(DHN)} On Social Media Platforms},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {7--20},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1375},
  doi          = {10.15394/JDFSL.2016.1375},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Al-khateebCABB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AldwairiAAS16,
  author       = {Monther Aldwairi and
                  Koloud Al{-}Khamaiseh and
                  Fatima Alharbi and
                  Babar Shah},
  title        = {Bloom Filters Optimized Wu-Manber for Intrusion Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {5--22},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1427},
  doi          = {10.15394/JDFSL.2016.1427},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AldwairiAAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BaekLH16,
  author       = {Hyunin Baek and
                  Michael Losavio and
                  George Higgins},
  title        = {The Impact of Low Self-Control on Online Harassment: Interaction with
                  Opportunity},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {27--42},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1417},
  doi          = {10.15394/JDFSL.2016.1417},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BaekLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FehisNK16,
  author       = {Saad Fehis and
                  Omar Nouali and
                  Mohand Tahar Kechadi},
  title        = {A New Distributed Chinese Wall Security Policy Model},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {149--168},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1434},
  doi          = {10.15394/JDFSL.2016.1434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FehisNK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Flory16,
  author       = {Teri A. Flory},
  title        = {Digital Forensics In Law Enforcement: {A} Needs Based Analysis of
                  Indiana Agencies},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {77--98},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1374},
  doi          = {10.15394/JDFSL.2016.1374},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Flory16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GlissonSBGC16,
  author       = {William Bradley Glisson and
                  Tim Storer and
                  Andrew Blyth and
                  George Grispos and
                  Matt Campbell},
  title        = {In-The-Wild Residual Data Research and Privacy},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {7--36},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1371},
  doi          = {10.15394/JDFSL.2016.1371},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GlissonSBGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GunestasB16,
  author       = {Murat Gunestas and
                  Zeki Bilgin},
  title        = {Log Analysis Using Temporal Logic and Reconstruction Approach: Web
                  Server Case},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {35--58},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1377},
  doi          = {10.15394/JDFSL.2016.1377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GunestasB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HarichandranBB16,
  author       = {Vikram S. Harichandran and
                  Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {Bytewise Approximate Matching: The Good, The Bad, and The Unknown},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {59--78},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1379},
  doi          = {10.15394/JDFSL.2016.1379},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HarichandranBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JeongBKL16,
  author       = {Doowon Jeong and
                  Frank Breitinger and
                  Hari Kang and
                  Sangjin Lee},
  title        = {Towards Syntactic Approximate Matching - {A} Pre-Processing Experiment},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {97--110},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1381},
  doi          = {10.15394/JDFSL.2016.1381},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JeongBKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JulliandTN16,
  author       = {Thibault Julliand and
                  Hugues Talbot and
                  Vincent Nozick},
  title        = {Countering Noise-based Splicing Detection Using Noise Density Transfer},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {111--122},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1382},
  doi          = {10.15394/JDFSL.2016.1382},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JulliandTN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KarabiyikCATAGA16,
  author       = {Umit Karabiyik and
                  Muhammed Abdullah Canbaz and
                  Ahmet Aksoy and
                  Tayfun Tuna and
                  Esra Akbas and
                  Bilal Gonen and
                  Ramazan Aygun},
  title        = {A Survey of Social Network Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {55--128},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1430},
  doi          = {10.15394/JDFSL.2016.1430},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KarabiyikCATAGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler16,
  author       = {Gary C. Kessler},
  title        = {The Impact of {MD5} File Hash Collisions On Digital Forensic Imaging},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {129--138},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1431},
  doi          = {10.15394/JDFSL.2016.1431},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler16a,
  author       = {Gary C. Kessler},
  title        = {The Impact of {SHA-1} File Hash Collisions On Digital Forensic Imaging:
                  {A} Follow-up Experiment},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {139--148},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1433},
  doi          = {10.15394/JDFSL.2016.1433},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LeeJEK16,
  author       = {Kibin Lee and
                  Joshua I. James and
                  Tekachew Gobena Ejeta and
                  Hyoung Joong Kim},
  title        = {Electronic Voting Service Using Block-Chain},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {123--136},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1383},
  doi          = {10.15394/JDFSL.2016.1383},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LeeJEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LiaoL16,
  author       = {Yi{-}Ching Liao and
                  Hanno Langweg},
  title        = {Evidential Reasoning for Forensic Readiness},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {37--52},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1372},
  doi          = {10.15394/JDFSL.2016.1372},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LiaoL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoMW16,
  author       = {Thomas Lonardo and
                  Tricia Martland and
                  Doug White},
  title        = {A Legal Examination of Revenge Pornography and Cyber-Harassment},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {79--106},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1412},
  doi          = {10.15394/JDFSL.2016.1412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MartinJA16,
  author       = {Thomas Anthony Martin and
                  Andy Jones and
                  Mohammed Alzaabi},
  title        = {The 2016 Analysis of Information Remaining on Computer Hard Disks
                  Offered for Sale on the Second Hand Market in the {UAE}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {23--36},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1428},
  doi          = {10.15394/JDFSL.2016.1428},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MartinJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MatousekHHR16,
  author       = {Petr Matousek and
                  Radek Hranicky and
                  Martin Holkovic and
                  Ondrej Rysav{\'{y}}},
  title        = {On Efficiency of Distributed Password Recovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {79--96},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1380},
  doi          = {10.15394/JDFSL.2016.1380},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MatousekHHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MohammedCL16,
  author       = {Hussam Jasim Mohammed and
                  Nathan Luke Clarke and
                  Fudong Li},
  title        = {An Automated Approach for Digital Forensic Analysis of Heterogeneous
                  Big Data},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {137--152},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1384},
  doi          = {10.15394/JDFSL.2016.1384},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MohammedCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/OlsonS16,
  author       = {Eric Olson and
                  Narasimha K. Shashidhar},
  title        = {Low Budget Forensic Drive Imaging Using {ARM} Based Single Board Computers},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {1},
  pages        = {53--76},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1373},
  doi          = {10.15394/JDFSL.2016.1373},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/OlsonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RoweSMG16,
  author       = {Neil C. Rowe and
                  Riqui Schwamm and
                  Michael McCarrin and
                  Ralucca Gera},
  title        = {Making Sense of Email Addresses on Drives},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {153--174},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1385},
  doi          = {10.15394/JDFSL.2016.1385},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RoweSMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghCS16,
  author       = {Monika Singh and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Security Analysis of mvHash-B Similarity Hashing},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {21--34},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1376},
  doi          = {10.15394/JDFSL.2016.1376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghS16,
  author       = {Bhupendra Singh and
                  Upasna Singh},
  title        = {Leveraging the Windows Amcache.hve File in Forensic Investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {4},
  pages        = {37--54},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1429},
  doi          = {10.15394/JDFSL.2016.1429},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SpitzbergG16,
  author       = {Brian H. Spitzberg and
                  Jean Mark Gawron},
  title        = {A Research Agenda for Online Linguistic Surveillance of Threatening
                  Messages},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {43--78},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1418},
  doi          = {10.15394/JDFSL.2016.1418},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SpitzbergG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ThompsonH16,
  author       = {Marcus Thompson and
                  Raymond Hansen},
  title        = {Verification of Recovered Digital Evidence on the Amazon Kindle},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {175--192},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1386},
  doi          = {10.15394/JDFSL.2016.1386},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ThompsonH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ZezulkaS16,
  author       = {Lauren A. Zezulka and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Differentiating Cyberbullies and Internet Trolls by Personality Characteristics
                  and Self-Esteem},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {3},
  pages        = {7--26},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1415},
  doi          = {10.15394/JDFSL.2016.1415},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ZezulkaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Alzaabi15,
  author       = {Mohammed Alzaabi},
  title        = {The Use of Ontologies in Forensic Analysis of Smartphone Content},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {105--114},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1215},
  doi          = {10.15394/JDFSL.2015.1215},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Alzaabi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AwadhiRMF15,
  author       = {Ibtesam Al Awadhi and
                  Janet C. Read and
                  Andrew Marrington and
                  Virginia N. L. Franqueira},
  title        = {Factors Influencing Digital Forensic Investigations: Empirical Evaluation
                  of 12 Years of Dubai Police Cases},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {7--16},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1207},
  doi          = {10.15394/JDFSL.2015.1207},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AwadhiRMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Baggili15,
  author       = {Ibrahim M. Baggili},
  title        = {From the Editor-in-Chief},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {1},
  pages        = {5--6},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1199},
  doi          = {10.15394/JDFSL.2015.1199},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Baggili15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Baggili15a,
  author       = {Ibrahim M. Baggili},
  title        = {From the Editor-in-Chief},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {2},
  pages        = {5--6},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1194},
  doi          = {10.15394/JDFSL.2015.1194},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Baggili15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/DonnangeloKSCH15,
  author       = {Nicholas C. Donnangelo and
                  Walter S. Kuklinski and
                  R. Szabo and
                  R. A. Coury and
                  G. R. Hamshar},
  title        = {Identification and Exploitation of Inadvertent Spectral Artifacts
                  in Digital Audio},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {3},
  pages        = {35--58},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1204},
  doi          = {10.15394/JDFSL.2015.1204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/DonnangeloKSCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FanC15,
  author       = {Xiao{-}Xi Fan and
                  Kam{-}Pui Chow},
  title        = {Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior
                  Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {17--30},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1208},
  doi          = {10.15394/JDFSL.2015.1208},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FanC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FaridPW15,
  author       = {Hany Farid and
                  Srivamshi Pittala and
                  Emily Whiting},
  title        = {A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {3},
  pages        = {87--98},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1206},
  doi          = {10.15394/JDFSL.2015.1206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FaridPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FarinaKS15,
  author       = {Jason Farina and
                  M. Tahar Kechadi and
                  Mark Scanlon},
  title        = {Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {115--124},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1216},
  doi          = {10.15394/JDFSL.2015.1216},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FarinaKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HomemD15,
  author       = {Irvin Homem and
                  Spyridon Dossis},
  title        = {On the Network Performance of Digital Evidence Acquisition of Small
                  Scale Devices over Public Networks},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {3},
  pages        = {59--86},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1205},
  doi          = {10.15394/JDFSL.2015.1205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HomemD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HyslipP15,
  author       = {Thomas Hyslip and
                  Jason M. Pittman},
  title        = {A Survey of Botnet Detection Techniques by Command and Control Infrastructure},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {1},
  pages        = {7--26},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1195},
  doi          = {10.15394/JDFSL.2015.1195},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HyslipP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kearns15,
  author       = {Grover S. Kearns},
  title        = {Computer Forensic Projects for Accountants},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {3},
  pages        = {7--34},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1203},
  doi          = {10.15394/JDFSL.2015.1203},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kearns15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kong15,
  author       = {Joe Kong},
  title        = {Data Extraction on MTK-based Android Mobile Phone Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {31--42},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1209},
  doi          = {10.15394/JDFSL.2015.1209},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kong15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Korkin15,
  author       = {Igor Korkin},
  title        = {Two Challenges of Stealthy Hypervisors Detection: Time Cheating and
                  Data Fluctuations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {2},
  pages        = {7--38},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1200},
  doi          = {10.15394/JDFSL.2015.1200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Korkin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoRW15,
  author       = {Thomas Lonardo and
                  Alan Rea and
                  Doug White},
  title        = {To License or Not to License Reexamined: An Updated Report on State
                  Statutes Regarding Private Investigators and Digital Examiners},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {1},
  pages        = {45--56},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1197},
  doi          = {10.15394/JDFSL.2015.1197},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LosavioPP15,
  author       = {Michael Losavio and
                  Pavel Sysoevich Pastukov and
                  Svetlana Polyakova},
  title        = {Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives
                  and Challenges with Digital Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {43--58},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1210},
  doi          = {10.15394/JDFSL.2015.1210},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LosavioPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LuomaL15,
  author       = {Milton H. Luoma and
                  Vicki Luoma},
  title        = {Litigation Holds: Past, Present, and Future Directions},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {1},
  pages        = {57--68},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1198},
  doi          = {10.15394/JDFSL.2015.1198},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LuomaL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Sharevski15,
  author       = {Filipo Sharevski},
  title        = {Rules of professional responsibility in digital forensics: {A} comparative
                  analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {2},
  pages        = {39--54},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1201},
  doi          = {10.15394/JDFSL.2015.1201},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Sharevski15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TobinG15,
  author       = {Lee Tobin and
                  Pavel Gladyshev},
  title        = {Open Forensic Devices},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {97--104},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1214},
  doi          = {10.15394/JDFSL.2015.1214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TobinG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Tu15,
  author       = {Manghui Tu},
  title        = {Data Loss Prevention Management and Control: Inside Activity Incident
                  Monitoring, Identification, and Tracking in Healthcare Enterprise
                  Environments},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {1},
  pages        = {27--44},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1196},
  doi          = {10.15394/JDFSL.2015.1196},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Tu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Utter015,
  author       = {Carla J. Utter and
                  Alan Rea},
  title        = {The "Bring your own device" conundrum for organizations and investigators:
                  An examination of the policy and legal concerns in light of investigatory
                  challenges},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {2},
  pages        = {55--72},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1202},
  doi          = {10.15394/JDFSL.2015.1202},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Utter015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/VoorstKL15,
  author       = {Robert van Voorst and
                  Mohand Tahar Kechadi and
                  Nhien{-}An Le{-}Khac},
  title        = {Forensic Acquisition of {IMVU:} {A} Case Study},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {69--78},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1212},
  doi          = {10.15394/JDFSL.2015.1212},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/VoorstKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/WuN15,
  author       = {Tina Wu and
                  Jason R. C. Nurse},
  title        = {Exploring The Use Of {PLC} Debugging Tools For Digital Forensic Investigations
                  On {SCADA} Systems},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {79--96},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1213},
  doi          = {10.15394/JDFSL.2015.1213},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/WuN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/YauC15,
  author       = {Ken Yau and
                  Kam{-}Pui Chow},
  title        = {{PLC} Forensics Based on Control Program Logic Change Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {10},
  number       = {4},
  pages        = {59--68},
  year         = {2015},
  url          = {https://doi.org/10.15394/jdfsl.2015.1211},
  doi          = {10.15394/JDFSL.2015.1211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/YauC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Al-khateebA14,
  author       = {Samer Al{-}khateeb and
                  Nitin Agarwal},
  title        = {Developing a Conceptual Framwork for Modeling Deviant Cyber Flash
                  Mob: {A} Socio-Computational Approach Leveraging Hypergraph Constructs},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {113--128},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1175},
  doi          = {10.15394/JDFSL.2014.1175},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Al-khateebA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AlmullaIJ14,
  author       = {Sameera Abdulrahman Almulla and
                  Youssef Iraqi and
                  Andrew Jones},
  title        = {A State-of-the-Art Review of Cloud Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {4},
  pages        = {7--28},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1190},
  doi          = {10.15394/JDFSL.2014.1190},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AlmullaIJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AnobahSP14,
  author       = {Maxwell Anobah and
                  Shahzad Saleem and
                  Oliver Popov},
  title        = {Testing Framework for Mobile Device Forensics Tools},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {221--234},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1183},
  doi          = {10.15394/JDFSL.2014.1183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AnobahSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Baggili14,
  author       = {Ibrahim M. Baggili},
  title        = {From the Editor-in-Chief},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {7--8},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1189},
  doi          = {10.15394/JDFSL.2014.1189},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Baggili14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Baggili14a,
  author       = {Ibrahim M. Baggili},
  title        = {From the Editor-in-Chief},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {3},
  pages        = {5},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1166},
  doi          = {10.15394/JDFSL.2014.1166},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Baggili14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Baggili14b,
  author       = {Ibrahim M. Baggili},
  title        = {From the Editor-in-Chief},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {4},
  pages        = {5--6},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1184},
  doi          = {10.15394/JDFSL.2014.1184},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Baggili14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BartolacciLP14,
  author       = {Michael Raymond Bartolacci and
                  Larry J. LeBlanc and
                  Ashley L. Podhradsky},
  title        = {Personal Denial Of Service {(PDOS)} Attacks: {A} Discussion and Exploration
                  of a New Category of Cyber Crime},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {1},
  pages        = {19--36},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1161},
  doi          = {10.15394/JDFSL.2014.1161},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BartolacciLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Bhattathiripad14,
  author       = {Vinod Polpaya Bhattathiripad},
  title        = {Forensics of Software Copyright Infringement Crimes: The Modern {POSAR}
                  Test Juxtaposed With the Dated {AFC} Test},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {73--84},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1172},
  doi          = {10.15394/JDFSL.2014.1172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Bhattathiripad14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BreitingerB14,
  author       = {Frank Breitinger and
                  Ibrahim M. Baggili},
  title        = {File Detection On Network Traffic Using Approximate Matching},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {23--36},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1168},
  doi          = {10.15394/JDFSL.2014.1168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BreitingerB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BreitingerRB14,
  author       = {Frank Breitinger and
                  Christian Rathgeb and
                  Harald Baier},
  title        = {An Efficient Similarity Digests Database Lookup - {A} Logarithmic
                  Divide {\&} Conquer Approach},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {155--166},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1178},
  doi          = {10.15394/JDFSL.2014.1178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BreitingerRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ChowLM14,
  author       = {Kam{-}Pui Chow and
                  Frank Y. W. Law and
                  Y. H. Mai},
  title        = {Understanding Computer Forensics Requirements in China Via The "Panda
                  Burning Incense" Virus Case},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {51--58},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1170},
  doi          = {10.15394/JDFSL.2014.1170},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ChowLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Crabb14,
  author       = {Erin Smith Crabb},
  title        = {"Time for Some Traffic Problems": Enhancing E-Discovery and Big Data
                  Processing Tools with Linguistic Methods for Deception Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {167--180},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1179},
  doi          = {10.15394/JDFSL.2014.1179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Crabb14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/EggesteinK14,
  author       = {Jasmine Eggestein and
                  Kenneth J. Knapp},
  title        = {Fighting Child Pornography: {A} Review of Legal and Technological
                  Developments},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {4},
  pages        = {29--48},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1191},
  doi          = {10.15394/JDFSL.2014.1191},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/EggesteinK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GaoM14,
  author       = {Wei Gao and
                  Thomas H. Morris},
  title        = {On Cyber Attacks and Signature Based Intrusion Detection for {MODBUS}
                  Based Industrial Control Systems},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {1},
  pages        = {37--56},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1162},
  doi          = {10.15394/JDFSL.2014.1162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GaoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GuptaR14,
  author       = {Shruti Gupta and
                  Marcus Rogers},
  title        = {Exploring Forensic Implications of the Fusion Drive},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {145--154},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1177},
  doi          = {10.15394/JDFSL.2014.1177},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GuptaR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/James14,
  author       = {Joshua I. James},
  title        = {Multi-Stakeholder Case Prioritization in Digital Investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {59--72},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1171},
  doi          = {10.15394/JDFSL.2014.1171},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/James14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KarabiyikA14,
  author       = {Umit Karabiyik and
                  Sudhir Aggarwal},
  title        = {Audit: Automated Disk Investigation Toolkit},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {129--144},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1176},
  doi          = {10.15394/JDFSL.2014.1176},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KarabiyikA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KesslerC14,
  author       = {Gary C. Kessler and
                  Gregory H. Carlton},
  title        = {An Analysis of Forensic Imaging in the Absence of Write-Blockers},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {3},
  pages        = {51--58},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1187},
  doi          = {10.15394/JDFSL.2014.1187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KesslerC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KhanMHS14,
  author       = {Rasib Khan and
                  Mainul Mizan and
                  Ragib Hasan and
                  Alan P. Sprague},
  title        = {Hot Zone Identification: Analyzing Effects of Data Sampling on Spam
                  Clustering},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {1},
  pages        = {67--82},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1164},
  doi          = {10.15394/JDFSL.2014.1164},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KhanMHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KleinmannW14,
  author       = {Amit Kleinmann and
                  Avishai Wool},
  title        = {Accurate Modeling of The Siemens {S7} {SCADA} Protocol For Intrusion
                  Detection And Digital Forensic},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {37--50},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1169},
  doi          = {10.15394/JDFSL.2014.1169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KleinmannW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Larson14,
  author       = {Stephen Larson},
  title        = {Book Review: The Basics of Digital Forensics: The Primer for Getting
                  Started in Digital Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {1},
  pages        = {83--85},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1165},
  doi          = {10.15394/JDFSL.2014.1165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Larson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Lau14,
  author       = {Linda K. Lau},
  title        = {Book Review: The X-Ways Forensics Practitioner's Guide},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {3},
  pages        = {59--61},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1188},
  doi          = {10.15394/JDFSL.2014.1188},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Lau14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LiuSW14,
  author       = {Changwei Liu and
                  Anoop Singhal and
                  Duminda Wijesekera},
  title        = {Relating Admissibility Standards for Digital Evidence to Attack Scenario
                  Reconstruction},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {181--196},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1180},
  doi          = {10.15394/JDFSL.2014.1180},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LiuSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LosavioK14,
  author       = {Michael Losavio and
                  Deborah W. Keeling},
  title        = {Evidentiary Power and Propriety of Digital Identifiers and the Impact
                  on Privacy Rights in the United States},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {197--204},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1181},
  doi          = {10.15394/JDFSL.2014.1181},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LosavioK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MatousekRK14,
  author       = {Petr Matousek and
                  Ondrej Rysav{\'{y}} and
                  Martin Kmet},
  title        = {Fast {RTP} Detection and Codecs Classification in Internet Traffic},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {101--112},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1174},
  doi          = {10.15394/JDFSL.2014.1174},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MatousekRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MooreLP14,
  author       = {Jennifer Moore and
                  Jonathan Langton and
                  Joseph Pochron},
  title        = {The Cost of Privacy: Riley v. California's Impact on Cell Phone Searches},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {3},
  pages        = {7--18},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1185},
  doi          = {10.15394/JDFSL.2014.1185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MooreLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PolcakHM14,
  author       = {Libor Polcak and
                  Radek Hranicky and
                  Tom{\'{a}}s Mart{\'{\i}}nek},
  title        = {On Identities in Modern Networks},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {9--22},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1167},
  doi          = {10.15394/JDFSL.2014.1167},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PolcakHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RogersS14,
  author       = {Marcus K. Rogers and
                  Kathryn C. Seigfried{-}Spellar},
  title        = {Using Internet Artifacts to Profile a Child Pornography Suspect},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {1},
  pages        = {57--66},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1163},
  doi          = {10.15394/JDFSL.2014.1163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RogersS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SaleemBP14,
  author       = {Shahzad Saleem and
                  Ibrahim M. Baggili and
                  Oliver Popov},
  title        = {Quantifying Relevance of Mobile Digital Evidence As They Relate to
                  Case Types: {A} Survey and a Guide for Best Practices},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {3},
  pages        = {19--50},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1186},
  doi          = {10.15394/JDFSL.2014.1186},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SaleemBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Sanchez14,
  author       = {Pedro Lu{\'{\i}}s Pr{\'{o}}spero Sanchez},
  title        = {Book Review: Judiciary-Friendly Forensics of Software Copyright Infringement
                  (Vinod Polpaya Bhattathiripad)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {4},
  pages        = {63--64},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1193},
  doi          = {10.15394/JDFSL.2014.1193},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Sanchez14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ScanlonFKK14,
  author       = {Mark Scanlon and
                  Jason Farina and
                  Nhien{-}An Le{-}Khac and
                  M. Tahar Kechadi},
  title        = {Leveraging Decentralization to Extend the Digital Evidence Acquisition
                  Window: Case Study on Bittorrent Sync},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {85--100},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1173},
  doi          = {10.15394/JDFSL.2014.1173},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ScanlonFKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SchwammR14,
  author       = {Riqui Schwamm and
                  Neil C. Rowe},
  title        = {Effects of the Factory Reset on Mobile Devices},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {205--220},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1182},
  doi          = {10.15394/JDFSL.2014.1182},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SchwammR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Steel14,
  author       = {Chad M. S. Steel},
  title        = {Idiographic Digital Profiling: Behavioral Analysis Based on Digital
                  Footprints},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {1},
  pages        = {7--18},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1160},
  doi          = {10.15394/JDFSL.2014.1160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Steel14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Steel14a,
  author       = {Chad M. S. Steel},
  title        = {Technical Soddi Defenses: The Trojan Horse Defense Revisited},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {4},
  pages        = {49--62},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1192},
  doi          = {10.15394/JDFSL.2014.1192},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Steel14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AdamsHM13,
  author       = {Richard Brian Adams and
                  Valerie Hobbs and
                  Graham Mann},
  title        = {The Advanced Data Acquisition Model {(ADAM):} {A} Process Model for
                  Digital Forensic Practice},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {25--48},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1154},
  doi          = {10.15394/JDFSL.2013.1154},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AdamsHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Bartolomie13,
  author       = {Joshua Bartolomie},
  title        = {Book Review: Professional Penetration Testing: Creating and Learning
                  in a Hacking Lab 2E},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {87--90},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1152},
  doi          = {10.15394/JDFSL.2013.1152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Bartolomie13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Carlton13,
  author       = {Gregory H. Carlton},
  title        = {A simple experiment with Microsoft Office 2010 and Windows 7 utilizing
                  digital forensic methodology},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {17--38},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1139},
  doi          = {10.15394/JDFSL.2013.1139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Carlton13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen13,
  author       = {Fred Cohen},
  title        = {Science Column: Measuring Inconsistency Methods for Evidentiary Value},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {7--16},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1138},
  doi          = {10.15394/JDFSL.2013.1138},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen13a,
  author       = {Fred Cohen},
  title        = {Science Column: Reconstruction: The Experimental Side of Digital Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {49--56},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1155},
  doi          = {10.15394/JDFSL.2013.1155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Garfinkel13,
  author       = {Simson L. Garfinkel},
  title        = {Book Review: iPhone and iOS Forensic: Investigation, Analysis and
                  Mobile Security for Apple iPhone, iPad and iOS Devices},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {65--68},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1157},
  doi          = {10.15394/JDFSL.2013.1157},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Garfinkel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler13,
  author       = {Gary C. Kessler},
  title        = {Technology Corner: Calculating the Number of Android Lock Patterns:
                  An Unfinished Study in Number Theory},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {57--64},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1156},
  doi          = {10.15394/JDFSL.2013.1156},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Larson13,
  author       = {Stephen Parker Larson},
  title        = {Analysis of Second Hand Google Mini Search Appliance},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {4},
  pages        = {7--24},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1153},
  doi          = {10.15394/JDFSL.2013.1153},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Larson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MabutoV13,
  author       = {Enos K. Mabuto and
                  Hein S. Venter},
  title        = {System-Generated Digital Forensic Evidence in Graphic Design Applications},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {71--86},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1151},
  doi          = {10.15394/JDFSL.2013.1151},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MabutoV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MehmetB13,
  author       = {Murad Mehmet and
                  Miguel Fuentes Buchholtz},
  title        = {Money Laundering Detection Framework to Link the Disparate and Evolving
                  Schemes},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {41--70},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1150},
  doi          = {10.15394/JDFSL.2013.1150},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MehmetB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Nash13,
  author       = {Thomas Nash},
  title        = {Book Review: Placing the Suspect behind the Keyboard: Using Digital
                  Forensics and Investigative Techniques to Identify Cybercrime Suspects},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {115--118},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1146},
  doi          = {10.15394/JDFSL.2013.1146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Nash13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RuhnkaL13,
  author       = {John C. Ruhnka and
                  Windham E. Loopesko},
  title        = {Risk Management Of Email And Internet Use In The Workplace},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {7--20},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1148},
  doi          = {10.15394/JDFSL.2013.1148},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RuhnkaL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Schofield13,
  author       = {Damian Schofield},
  title        = {Visualizing Forensic Data: Evidence Guidelines (Part 1)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {73--90},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1141},
  doi          = {10.15394/JDFSL.2013.1141},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Schofield13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SchofieldF13,
  author       = {Damian Schofield and
                  Ken Fowle},
  title        = {Technology Corner: Visualising Forensic Data: Evidence Guidelines
                  (Part 2)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {93--114},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1145},
  doi          = {10.15394/JDFSL.2013.1145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SchofieldF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ShaerpourDM13,
  author       = {Kaveh Shaerpour and
                  Ali Dehghantanha and
                  Ramlan Mahmod},
  title        = {Trends In Android Malware Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {3},
  pages        = {21--40},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1149},
  doi          = {10.15394/JDFSL.2013.1149},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ShaerpourDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Shaw13,
  author       = {Eric D. Shaw},
  title        = {How Often is Employee Anger an Insider Risk I?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {1},
  pages        = {39--72},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1140},
  doi          = {10.15394/JDFSL.2013.1140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Shaw13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Shaw13a,
  author       = {Eric D. Shaw},
  title        = {How Often is Employee Aanger an Insider Risk II?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {73--92},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1144},
  doi          = {10.15394/JDFSL.2013.1144},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Shaw13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghBM13,
  author       = {Kishore Singh and
                  Peter J. Best and
                  Joseph M. Mula},
  title        = {Automating Vendor Fraud Detection in Enterprise Systems},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {7--40},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1142},
  doi          = {10.15394/JDFSL.2013.1142},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ThompsonL13,
  author       = {Nik Thompson and
                  Kevin Lee},
  title        = {The Digital Forensics and Security Challenge of {QR} Codes},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {8},
  number       = {2},
  pages        = {41--72},
  year         = {2013},
  url          = {https://doi.org/10.15394/jdfsl.2013.1143},
  doi          = {10.15394/JDFSL.2013.1143},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ThompsonL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AlvaE12,
  author       = {Aaron Alva and
                  Barbara Endicott{-}Popovsky},
  title        = {Digital Evidence Education in Schools of Law},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {75--88},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1120},
  doi          = {10.15394/JDFSL.2012.1120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AlvaE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Barrett12,
  author       = {Diane Barrett},
  title        = {Book Review: The Software {IP} Detective's Handbook: Measurement,
                  Comparison, and Infringement Detections},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {87--92},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1114},
  doi          = {10.15394/JDFSL.2012.1114},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Barrett12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BoddingtonAB12,
  author       = {Richard Boddington and
                  Jeremy Ardley and
                  Grant Austin Boxall},
  title        = {Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery
                  Detection and Validation},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {29--54},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1111},
  doi          = {10.15394/JDFSL.2012.1111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BoddingtonAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/CantrellD12,
  author       = {Gary Cantrell and
                  David A. Dampier},
  title        = {Implementing The Automated Phases Of The Partially-Automated Digital
                  Triage Process Model},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {99--116},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1135},
  doi          = {10.15394/JDFSL.2012.1135},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/CantrellD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/CarltonK12,
  author       = {Gregory H. Carlton and
                  Gary C. Kessler},
  title        = {Identifying trace evidence in data wiping application software},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {113--142},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1122},
  doi          = {10.15394/JDFSL.2012.1122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/CarltonK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12,
  author       = {Fred Cohen},
  title        = {Column: The Physics of Digital Information-Part 2},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {7--14},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1109},
  doi          = {10.15394/JDFSL.2012.1109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12a,
  author       = {Fred Cohen},
  title        = {Identifying and Attributing Similar Traces with Greatest Common Factor
                  Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {89--112},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1121},
  doi          = {10.15394/JDFSL.2012.1121},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12b,
  author       = {Fred Cohen},
  title        = {Column: The Science of Digital Forensics: Analysis of Digital Traces},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {5--12},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1125},
  doi          = {10.15394/JDFSL.2012.1125},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen12c,
  author       = {Fred Cohen},
  title        = {Column: The Science of Digital Forensics: Recovery of Data from Overwritten
                  Areas of Magnetic Media},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {7--20},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1131},
  doi          = {10.15394/JDFSL.2012.1131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Ebert12,
  author       = {John C. Ebert},
  title        = {Book Review: Mastering Windows Network Forensics and Investigation,
                  2/e},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {117--124},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1136},
  doi          = {10.15394/JDFSL.2012.1136},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Ebert12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FairbanksG12,
  author       = {Kevin D. Fairbanks and
                  Simson L. Garfinkel},
  title        = {Column: Factors Affecting Data Decay},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {7--10},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1116},
  doi          = {10.15394/JDFSL.2012.1116},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FairbanksG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Flor12,
  author       = {Nick V. Flor},
  title        = {Technology Corner: Automated Data Extraction Using Facebook},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {149--164},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1124},
  doi          = {10.15394/JDFSL.2012.1124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Flor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Flor12a,
  author       = {Nick V. Flor},
  title        = {Technology Corner: {A} Regular Expression Training App},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {125--132},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1137},
  doi          = {10.15394/JDFSL.2012.1137},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Flor12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/IrwinDS12,
  author       = {David Irwin and
                  Arek Dadej and
                  Jill Slay},
  title        = {Extraction Of Electronic Evidence From VoIP: Identification {\&}
                  Analysis Of Digital Speech},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {55--82},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1128},
  doi          = {10.15394/JDFSL.2012.1128},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/IrwinDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Ismail12,
  author       = {Sellam Ismail},
  title        = {Technology Corner: Dating of Electronic Hardware for Prior Art Investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {93--100},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1115},
  doi          = {10.15394/JDFSL.2012.1115},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Ismail12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Keith12,
  author       = {Nate Keith},
  title        = {Book Review: System Forensics, Investigation, and Response},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {143--148},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1123},
  doi          = {10.15394/JDFSL.2012.1123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Keith12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Lallie12,
  author       = {Harjinder Singh Lallie},
  title        = {Challenges in applying the {ACPO} principles in cloud forensic investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {71--86},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1113},
  doi          = {10.15394/JDFSL.2012.1113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Lallie12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LallieB12,
  author       = {Harjinder Singh Lallie and
                  Parmjit Bains},
  title        = {An Overview of the Jumplist Configuration File in Windows 7},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {15--28},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1110},
  doi          = {10.15394/JDFSL.2012.1110},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LallieB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoW012,
  author       = {Thomas Lonardo and
                  Doug White and
                  Alan Rea},
  title        = {To License or Not to License Updated: An Examination of State Statutes
                  Regarding Private Investigators and Digital Examiners},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {83--110},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1129},
  doi          = {10.15394/JDFSL.2012.1129},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoW012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Luoma12,
  author       = {Milton H. Luoma},
  title        = {Book Review: Dispute Resolution and e-Discovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {111--114},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1130},
  doi          = {10.15394/JDFSL.2012.1130},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Luoma12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MellingZ12,
  author       = {Larry Melling and
                  Robert Zeidman},
  title        = {Comparing Android Applications to Find Copying},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {1},
  pages        = {55--70},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1112},
  doi          = {10.15394/JDFSL.2012.1112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MellingZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MoranO12,
  author       = {John Moran and
                  Douglas Orr},
  title        = {Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {33--54},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1127},
  doi          = {10.15394/JDFSL.2012.1127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MoranO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/NicholsBW12,
  author       = {Jason Nichols and
                  David P. Biros and
                  Mark Weiser},
  title        = {Toward Alignment between Communities of Practice and Knowledge-Based
                  Decision Support},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {61--74},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1119},
  doi          = {10.15394/JDFSL.2012.1119},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/NicholsBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PattersonH12,
  author       = {Jonathan Patterson and
                  Christopher James Hargreaves},
  title        = {Automated Identification and Reconstruction of YouTube Video Access},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {43--60},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1118},
  doi          = {10.15394/JDFSL.2012.1118},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PattersonH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Simpson12,
  author       = {Robert Vose Simpson},
  title        = {Confronting Potential Injustice with Preemptive Suppression},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {21--50},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1132},
  doi          = {10.15394/JDFSL.2012.1132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Simpson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Szewczyk12,
  author       = {Patryk Szewczyk},
  title        = {An Australian Perspective On The Challenges For Computer And Network
                  Security For Novice End-Users},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {51--72},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1133},
  doi          = {10.15394/JDFSL.2012.1133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Szewczyk12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Tu12,
  author       = {Manghui Tu},
  title        = {Forensic Evidence Identification and Modeling for Attacks against
                  a Simulated Online Business Information System},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {4},
  pages        = {73--98},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1134},
  doi          = {10.15394/JDFSL.2012.1134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Tu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TuXBC12,
  author       = {Manghui Tu and
                  Dianxiang Xu and
                  Cristian Balan and
                  Kyle Cronin},
  title        = {On the Development of Digital Forensics Curriculum},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {3},
  pages        = {13--32},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1126},
  doi          = {10.15394/JDFSL.2012.1126},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TuXBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Wright12,
  author       = {Neil Fowler Wright},
  title        = {{DNS} in Computer Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {7},
  number       = {2},
  pages        = {11--42},
  year         = {2012},
  url          = {https://doi.org/10.15394/jdfsl.2012.1117},
  doi          = {10.15394/JDFSL.2012.1117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Wright12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Banday11,
  author       = {M. Tariq Banday},
  title        = {Technology Corner: Analysing E-mail Headers For Forensic Investigation},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {2},
  pages        = {49--64},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1095},
  doi          = {10.15394/JDFSL.2011.1095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Banday11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/CarltonM11,
  author       = {Gregory H. Carlton and
                  Joe Matsumoto},
  title        = {A survey of contemporary enterprise storage technologies from a digital
                  forensics perspective},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {3},
  pages        = {63--74},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1100},
  doi          = {10.15394/JDFSL.2011.1100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/CarltonM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen11,
  author       = {Fred Cohen},
  title        = {Column: Putting the Science in Digital Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {1},
  pages        = {7--14},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1085},
  doi          = {10.15394/JDFSL.2011.1085},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen11a,
  author       = {Fred Cohen},
  title        = {A Case Study in Forensic Analysis of Control},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {1},
  pages        = {37--54},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1087},
  doi          = {10.15394/JDFSL.2011.1087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cohen11b,
  author       = {Fred Cohen},
  title        = {Column: The Physics of Digital Information},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {3},
  pages        = {11--16},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1097},
  doi          = {10.15394/JDFSL.2011.1097},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cohen11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Flor11,
  author       = {Nick Flor},
  title        = {Technology Corner: Virtual Crime Scene Reconstruction: The Basics
                  of 3D Modeling},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {4},
  pages        = {67--74},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1108},
  doi          = {10.15394/JDFSL.2011.1108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Flor11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FlorG11,
  author       = {Nick Flor and
                  Kenneth Guillory},
  title        = {Technology Corner: Internet Packet Sniffers},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {1},
  pages        = {77--90},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1090},
  doi          = {10.15394/JDFSL.2011.1090},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FlorG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FlorS11,
  author       = {Nick Flor and
                  Haile Shannon},
  title        = {Technology Corner: Brute Force Password Generation - Basic Iterative
                  and Recursive Algorithms},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {3},
  pages        = {79--86},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1102},
  doi          = {10.15394/JDFSL.2011.1102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FlorS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Garfinkel11,
  author       = {Simson L. Garfinkel},
  title        = {Column: Every Last Byte},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {2},
  pages        = {7--8},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1091},
  doi          = {10.15394/JDFSL.2011.1091},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Garfinkel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Garfinkel11a,
  author       = {Simson L. Garfinkel},
  title        = {Column: File Cabinet Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {4},
  pages        = {7--10},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1103},
  doi          = {10.15394/JDFSL.2011.1103},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Garfinkel11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Hannay11,
  author       = {Peter Hannay},
  title        = {Kindle Forensics: Acquisition {\&} Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {2},
  pages        = {17--24},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1093},
  doi          = {10.15394/JDFSL.2011.1093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Hannay11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/IrwinSDS11,
  author       = {David Irwin and
                  Jill Slay and
                  Arek Dadej and
                  Malcolm Shore},
  title        = {Extraction of Electronic Evidence from VoIP: Forensic Analysis of
                  {A} Virtual Hard Disk Vs {RAM}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {1},
  pages        = {15--36},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1086},
  doi          = {10.15394/JDFSL.2011.1086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/IrwinSDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kearns11,
  author       = {Grover S. Kearns},
  title        = {Developing a Forensic Continuous Audit Model},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {2},
  pages        = {25--48},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1094},
  doi          = {10.15394/JDFSL.2011.1094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kearns11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kelley11,
  author       = {Christopher Kelley},
  title        = {Column: The Consortium of Digital Forensics Specialists {(CDFS)}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {3},
  pages        = {7--10},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1096},
  doi          = {10.15394/JDFSL.2011.1096},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kelley11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler11,
  author       = {Gary C. Kessler},
  title        = {Judges Awareness, Understanding, and Application of Digital Evidence},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {1},
  pages        = {55--72},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1088},
  doi          = {10.15394/JDFSL.2011.1088},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LaTulippe11,
  author       = {Timothy James LaTulippe},
  title        = {Working Inside The Box: An Example Of Google Desktop Search in a Forensic
                  Examination},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {4},
  pages        = {11--18},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1104},
  doi          = {10.15394/JDFSL.2011.1104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LaTulippe11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoMW011,
  author       = {Thomas Lonardo and
                  Tricia Martland and
                  Doug White and
                  Alan Rea},
  title        = {Legal Issues Regarding Digital Forensic Examiners Third Party Consent
                  to Search},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {4},
  pages        = {19--34},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1105},
  doi          = {10.15394/JDFSL.2011.1105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoMW011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LuomaL11,
  author       = {Milton H. Luoma and
                  Vicki Miller Luoma},
  title        = {Sampling: Making Electronic Discovery More Cost Effective},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {2},
  pages        = {9--16},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1092},
  doi          = {10.15394/JDFSL.2011.1092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LuomaL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PiccinelliG11,
  author       = {Mario Piccinelli and
                  Paolo Gubian},
  title        = {Exploring the iPhone Backup made by iTunes},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {3},
  pages        = {31--62},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1099},
  doi          = {10.15394/JDFSL.2011.1099},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PiccinelliG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Schulte11,
  author       = {Christopher Schulte},
  title        = {Book Review: iOS Forensic Analysis: For iPhone, iPad and iPod Touch},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {1},
  pages        = {73--76},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1089},
  doi          = {10.15394/JDFSL.2011.1089},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Schulte11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Schulte11a,
  author       = {Christopher Schulte},
  title        = {Book Review: iPhone and iOS Forensics: Investigation, Analysis and
                  Mobile Security for Apple iPhone, iPad and iOS Devices},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {4},
  pages        = {63--66},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1107},
  doi          = {10.15394/JDFSL.2011.1107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Schulte11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Simon11,
  author       = {Matthew Phillip Simon},
  title        = {Investigating Modern Communication Technologies: The effect of Internet-based
                  Communication Technologies on the Investigation Process},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {4},
  pages        = {35--62},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1106},
  doi          = {10.15394/JDFSL.2011.1106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Simon11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Szewczyk11,
  author       = {Patryk Szewczyk},
  title        = {Analysis of Data Remaining on Second Hand {ADSL} Routers},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {3},
  pages        = {17--30},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1098},
  doi          = {10.15394/JDFSL.2011.1098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Szewczyk11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Tester11,
  author       = {Darlene M. Tester},
  title        = {Book Review: Online Privacy: Issues in the Digital Age},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {6},
  number       = {3},
  pages        = {75--78},
  year         = {2011},
  url          = {https://doi.org/10.15394/jdfsl.2011.1101},
  doi          = {10.15394/JDFSL.2011.1101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Tester11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AlghafliJM10,
  author       = {Khawla Abdulla Alghafli and
                  Andrew Jones and
                  Thomas Anthony Martin},
  title        = {Forensic Analysis of the Windows 7 Registry},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {4},
  pages        = {5--30},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1081},
  doi          = {10.15394/JDFSL.2010.1081},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AlghafliJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BellB10,
  author       = {Graeme Baxter Bell and
                  Richard Boddington},
  title        = {The Beginning of the End for Digital Forensic Recovery?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {3},
  pages        = {5--32},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1078},
  doi          = {10.15394/JDFSL.2010.1078},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BellB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BrandVW10,
  author       = {Murray Brand and
                  Craig Valli and
                  Andrew Woodward},
  title        = {Malware Forensics: Discovery of the Intent of Deception},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {4},
  pages        = {31--42},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1082},
  doi          = {10.15394/JDFSL.2010.1082},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BrandVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ByrskiSC10,
  author       = {Aleksander Byrski and
                  Wojciech Stryjewski and
                  Bartlomiej Czechowicz},
  title        = {Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data
                  Storage},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {1},
  pages        = {49--62},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1071},
  doi          = {10.15394/JDFSL.2010.1071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ByrskiSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/CarltonW10,
  author       = {Gregory H. Carlton and
                  Reginald Worthley},
  title        = {Identifying a Computer Forensics Expert: {A} Study to Measure the
                  Characteristics of Forensic Computer Examiners},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {1},
  pages        = {5--20},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1069},
  doi          = {10.15394/JDFSL.2010.1069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/CarltonW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/DurantiE10,
  author       = {Luciana Duranti and
                  Barbara Endicott{-}Popovsky},
  title        = {Digital Records Forensics: {A} New Science and Academic Program for
                  Forensic Readiness},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {45--62},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1075},
  doi          = {10.15394/JDFSL.2010.1075},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/DurantiE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/GuoS10,
  author       = {Yinghua Guo and
                  Jill Slay},
  title        = {Computer Forensic Function Testing: Media Preparation, Write Protection
                  And Verification},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {5--20},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1072},
  doi          = {10.15394/JDFSL.2010.1072},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/GuoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVDSDD10,
  author       = {Andy Jones and
                  Craig Valli and
                  Glenn S. Dardick and
                  Iain Sutherland and
                  G. Dabibi and
                  Gareth Davies},
  title        = {The 2009 Analysis of Information Remaining on Disks Offered for Sale
                  on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {4},
  pages        = {43--64},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1083},
  doi          = {10.15394/JDFSL.2010.1083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVDSDD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kearns10,
  author       = {Grover S. Kearns},
  title        = {Computer Forensics for Graduate Accountants: {A} Motivational Curriculum
                  Design Approach},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {63--84},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1076},
  doi          = {10.15394/JDFSL.2010.1076},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kearns10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler10,
  author       = {Gary C. Kessler},
  title        = {Book Review: Digital Forensic Evidence Examination (2nd ed.)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {85--88},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1077},
  doi          = {10.15394/JDFSL.2010.1077},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LuomaL10,
  author       = {Milton H. Luoma and
                  Vicki Miller Luoma},
  title        = {Avoiding Sanctions at the E-Discovery Meet-And- Confer in Common Law
                  Countries},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {4},
  pages        = {65--80},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1084},
  doi          = {10.15394/JDFSL.2010.1084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LuomaL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Mubarak10,
  author       = {Sameera Mubarak},
  title        = {Trust Account Fraud And Effective Information Security Management},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {3},
  pages        = {57--72},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1080},
  doi          = {10.15394/JDFSL.2010.1080},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Mubarak10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SakuraiAUYS10,
  author       = {Yui Sakurai and
                  Yuki Ashino and
                  Tetsutaro Uehara and
                  Hiroshi Yoshiura and
                  Ry{\^{o}}ichi Sasaki},
  title        = {HiGate (High Grade Anti-Tamper Equipment) Prototype and Application
                  to e-Discovery},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {21--34},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1073},
  doi          = {10.15394/JDFSL.2010.1073},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SakuraiAUYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Valli10,
  author       = {Craig Valli},
  title        = {Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant
                  Activity},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {2},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1074},
  doi          = {10.15394/JDFSL.2010.1074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Valli10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Wardman10,
  author       = {Brad Wardman},
  title        = {The Deadliest Catch: Reeling In Big Phish With a Deep {MD5} Net},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {3},
  pages        = {33--56},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1079},
  doi          = {10.15394/JDFSL.2010.1079},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Wardman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/WeiSWS10,
  author       = {Chun Wei and
                  Alan P. Sprague and
                  Gary Warner and
                  Anthony Skjellum},
  title        = {Clustering Spam Domains and Destination Websites: Digital Forensics
                  with Data Mining},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {5},
  number       = {1},
  pages        = {21--48},
  year         = {2010},
  url          = {https://doi.org/10.15394/jdfsl.2010.1070},
  doi          = {10.15394/JDFSL.2010.1070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/WeiSWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BestRT09,
  author       = {Peter J. Best and
                  Pall Rikhardsson and
                  Mark Toleman},
  title        = {Continuous Fraud Detection in Enterprise Systems through Audit Trail
                  Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {1},
  pages        = {39--60},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1053},
  doi          = {10.15394/JDFSL.2009.1053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BestRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BrowningK09,
  author       = {Dennis Browning and
                  Gary C. Kessler},
  title        = {Bluetooth Hacking: {A} Case Study},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {57--72},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1058},
  doi          = {10.15394/JDFSL.2009.1058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BrowningK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Chawki09,
  author       = {Mohamed Chawki},
  title        = {Online Child Sexual Abuse: The French Response},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {7--42},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1164},
  doi          = {10.15394/JDFSL.2009.1164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Chawki09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Cronje09,
  author       = {Francis S. Cronj{\'{e}}},
  title        = {A Synopsis of Proposed Data Protection Legislation in {SA}},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {43--50},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1165},
  doi          = {10.15394/JDFSL.2009.1165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Cronje09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Fick09,
  author       = {Jacqueline Fick},
  title        = {Prevention is Better than Prosecution: Deepening the Defence against
                  Cyber Crime},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {51--72},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1166},
  doi          = {10.15394/JDFSL.2009.1166},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Fick09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Jobodwana09,
  author       = {Z. Ntozintle Jobodwana},
  title        = {Telecommunications Liberalisation in Africa: Proposed Regulatory Model
                  for the {SADC} Region},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {4},
  pages        = {73--94},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1167},
  doi          = {10.15394/JDFSL.2009.1167},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Jobodwana09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KahvedzicK09,
  author       = {Damir Kahvedzic and
                  M. Tahar Kechadi},
  title        = {Correlating Orphaned Windows Registry Data Structures},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {39--56},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1057},
  doi          = {10.15394/JDFSL.2009.1057},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KahvedzicK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kearns09,
  author       = {Grover S. Kearns},
  title        = {Graduate Accounting Students' Perception of {IT} Forensics: {A} Multi-Dimensional
                  Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {1},
  pages        = {5--38},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1052},
  doi          = {10.15394/JDFSL.2009.1052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kearns09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler09,
  author       = {Gary C. Kessler},
  title        = {Book Review: Cyber Security and Global Information Assurance: Threat
                  Analysis and Response Solutions},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {57--60},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1163},
  doi          = {10.15394/JDFSL.2009.1163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KulkarniGNE09,
  author       = {Asawaree Kulkarni and
                  James Goldman and
                  Brad Nabholz and
                  William Eyre},
  title        = {Detection of Steganography-Producing Software Artifacts on Crime-Related
                  Seized Computers},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {5--26},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1055},
  doi          = {10.15394/JDFSL.2009.1055},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KulkarniGNE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoW009,
  author       = {Thomas Lonardo and
                  Doug White and
                  Alan Rea},
  title        = {To License or Not to License Revisited: An Examination of State Statutes
                  Regarding Private Investigators and Digital Examiners},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {35--56},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1162},
  doi          = {10.15394/JDFSL.2009.1162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoW009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LuseMT09,
  author       = {Andy Luse and
                  Brian E. Mennecke and
                  Anthony M. Townsend},
  title        = {Electronic Forms-Based Computing for Evidentiary Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {17--34},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1161},
  doi          = {10.15394/JDFSL.2009.1161},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LuseMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SmithC09,
  author       = {Stevenson G. Smith and
                  Larry D. Crumbley},
  title        = {Defining a Forensic Audit},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {1},
  pages        = {61--80},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1054},
  doi          = {10.15394/JDFSL.2009.1054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SmithC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SutherlandDPB09,
  author       = {Iain Sutherland and
                  Gareth Davies and
                  Nick Pringle and
                  Andrew Blyth},
  title        = {The Impact of Hard Disk Firmware Steganography on Computer Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {73--84},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1059},
  doi          = {10.15394/JDFSL.2009.1059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SutherlandDPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Valli09,
  author       = {Craig Valli},
  title        = {Visualisation of Honeypot Data Using Graphviz and Afterglow},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {2},
  pages        = {27--38},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1056},
  doi          = {10.15394/JDFSL.2009.1056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Valli09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ValliS09,
  author       = {Craig Valli and
                  Patryk Szewczyk},
  title        = {Insecurity by Obscurity: {A} Review of SoHo Router Literature from
                  a Network Security Perspective},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {4},
  number       = {3},
  pages        = {5--16},
  year         = {2009},
  url          = {https://doi.org/10.15394/jdfsl.2009.1160},
  doi          = {10.15394/JDFSL.2009.1160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ValliS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Barrett08,
  author       = {Diane Barrett},
  title        = {Trends in Virtualized User Environments},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {2},
  pages        = {5--16},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1038},
  doi          = {10.15394/JDFSL.2008.1038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Barrett08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Bhowmik08,
  author       = {Rekha Bhowmik},
  title        = {Data Mining Techniques in Fraud Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {2},
  pages        = {35--54},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1040},
  doi          = {10.15394/JDFSL.2008.1040},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Bhowmik08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Carlton08,
  author       = {Gregory H. Carlton},
  title        = {An Evaluation of Windows-Based Computer Forensics Application Software
                  Running on a Macintosh},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {3},
  pages        = {43--60},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1045},
  doi          = {10.15394/JDFSL.2008.1045},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Carlton08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/DailySDM08,
  author       = {Jeremy S. Daily and
                  Nathan Singleton and
                  Elizabeth Downing and
                  Gavin Wylie Manes},
  title        = {The Forensics Aspects of Event Data Recorders},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {3},
  pages        = {29--42},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1044},
  doi          = {10.15394/JDFSL.2008.1044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/DailySDM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JiangX08,
  author       = {Keyu Jiang and
                  Ruifeng Xuan},
  title        = {Book Review: Guide to computer forensics and investigations (3rd ed.)},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {3},
  pages        = {81--84},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1047},
  doi          = {10.15394/JDFSL.2008.1047},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JiangX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVDS08,
  author       = {Andy Jones and
                  Craig Valli and
                  Glenn S. Dardick and
                  Iain Sutherland},
  title        = {The 2007 Analysis of Information Remaining on Disks Offered for Sale
                  on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {1},
  pages        = {5--24},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1034},
  doi          = {10.15394/JDFSL.2008.1034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVDS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVS08,
  author       = {Andy Jones and
                  Craig Valli and
                  Iain Sutherland},
  title        = {Analysis of Information Remaining on Hand Held Devices Offered for
                  Sale on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {2},
  pages        = {55--70},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1041},
  doi          = {10.15394/JDFSL.2008.1041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KahvedzicK08,
  author       = {Damir Kahvedzic and
                  M. Tahar Kechadi},
  title        = {Extraction and Categorisation of User Activity from Windows Restore
                  Points},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {4},
  pages        = {23--42},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1049},
  doi          = {10.15394/JDFSL.2008.1049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KahvedzicK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler08,
  author       = {Gary C. Kessler},
  title        = {Book Review: Challenges to Digital Forensic Evidence},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {1},
  pages        = {57--60},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1037},
  doi          = {10.15394/JDFSL.2008.1037},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler08a,
  author       = {Gary C. Kessler},
  title        = {Book Review: The dotCrime Manifesto: How to Stop Internet Crime},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {2},
  pages        = {71--74},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1042},
  doi          = {10.15394/JDFSL.2008.1042},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler08b,
  author       = {Gary C. Kessler},
  title        = {Book Review: Mac {OS} X, iPod, and iPhone Forensic Analysis {DVD}
                  Toolkit},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {4},
  pages        = {59--62},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1051},
  doi          = {10.15394/JDFSL.2008.1051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LonardoW008,
  author       = {Thomas Lonardo and
                  Doug White and
                  Alan Rea},
  title        = {To License or Not to License: An Examination of State Statutes Regarding
                  Private Investigators and Digital Examiners},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {3},
  pages        = {61--80},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1046},
  doi          = {10.15394/JDFSL.2008.1046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LonardoW008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Mee08,
  author       = {Vivienne Mee},
  title        = {Who is Reading the Data on Your Old Computer?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {1},
  pages        = {25--34},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1035},
  doi          = {10.15394/JDFSL.2008.1035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Mee08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MlitwaK08,
  author       = {N. Mlitwa and
                  Y. Kachala},
  title        = {Data Security Measures in the {IT} Service Industry: {A} Balance between
                  Knowledge {\&} Action},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {4},
  pages        = {5--22},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1048},
  doi          = {10.15394/JDFSL.2008.1048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MlitwaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Pasupatheeswaran08,
  author       = {Satheesaan Pasupatheeswaran},
  title        = {Data recovery from PalmmsgV001},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {4},
  pages        = {43--58},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1050},
  doi          = {10.15394/JDFSL.2008.1050},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Pasupatheeswaran08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PavlicST08,
  author       = {Timothy Pavlic and
                  Jill Slay and
                  Benjamin P. Turnbull},
  title        = {Developing a Process Model for the Forensic Extraction of Information
                  from Desktop Search Applications},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {1},
  pages        = {35--56},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1036},
  doi          = {10.15394/JDFSL.2008.1036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PavlicST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SchwerhaI08,
  author       = {Joseph J. Schwerha and
                  Scott Inch},
  title        = {Remote Forensics May Bring the Next Sea Change in E-discovery: Are
                  All Networked Computers Now Readily Accessible Under the Revised Federal
                  Rules of Civil Procedure?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {3},
  pages        = {5--28},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1043},
  doi          = {10.15394/JDFSL.2008.1043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SchwerhaI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/WarkentinBS08,
  author       = {Merrill Warkentin and
                  Ernst Bekkering and
                  Mark B. Schmidt},
  title        = {Steganography: Forensic, Security, and Legal Issues},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {3},
  number       = {2},
  pages        = {17--34},
  year         = {2008},
  url          = {https://doi.org/10.15394/jdfsl.2008.1039},
  doi          = {10.15394/JDFSL.2008.1039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/WarkentinBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Al-Hamdani07,
  author       = {Wasim A. Al{-}Hamdani},
  title        = {Education Organization Baseline Control Protection and Trusted Level
                  Security},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {4},
  pages        = {19--42},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1030},
  doi          = {10.15394/JDFSL.2007.1030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Al-Hamdani07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AppuduraiR07,
  author       = {Janaletchumi Appudurai and
                  Chitra Latha Ramalingam},
  title        = {Computer Crimes: {A} Case Study of What Malaysia Can Learn from Others?},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {2},
  pages        = {7--22},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1020},
  doi          = {10.15394/JDFSL.2007.1020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AppuduraiR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BarnesB07,
  author       = {Stephen Barnes and
                  David P. Biros},
  title        = {An Exploratory Analysis of Computer Mediated Communications on Cyberstalking
                  Severity},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {3},
  pages        = {7--28},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1025},
  doi          = {10.15394/JDFSL.2007.1025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BarnesB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Blake07,
  author       = {Errol A. Blake},
  title        = {Network and Database Security: Regulatory Compliance, Network, and
                  Database Security - {A} Unified Process and Goal},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {4},
  pages        = {77--106},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1033},
  doi          = {10.15394/JDFSL.2007.1033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Blake07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BudimirS07,
  author       = {Nikica Budimir and
                  Jill Slay},
  title        = {Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification
                  Information as Digital Evidence},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {1},
  pages        = {75--92},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1018},
  doi          = {10.15394/JDFSL.2007.1018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BudimirS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Carlton07,
  author       = {Gregory H. Carlton},
  title        = {A Grounded Theory Approach to Identifying and Measuring Forensic Data
                  Acquisition Tasks},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {1},
  pages        = {35--56},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1015},
  doi          = {10.15394/JDFSL.2007.1015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Carlton07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Etsebeth07,
  author       = {Verine Etsebeth},
  title        = {Monitoring and Surveillance in the Workplace: Lessons Learnt? {\^{a}}{\mbox{\texteuro}}"
                  Investigating the International Legal Position},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {2},
  pages        = {23--40},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1021},
  doi          = {10.15394/JDFSL.2007.1021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Etsebeth07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/FranciaEFNS07,
  author       = {Guillermo Francia III and
                  Brian Estes and
                  Rahjima R. Francia and
                  Vu Nguyen and
                  Alex Scroggins},
  title        = {The Design and Implementation of an Automated Security Compliance
                  Toolkit: {A} Pedagogical Exercise},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {4},
  pages        = {59--76},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1032},
  doi          = {10.15394/JDFSL.2007.1032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/FranciaEFNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler07,
  author       = {Gary C. Kessler},
  title        = {Book Review: No Place To Hide},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {1},
  pages        = {93--96},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1019},
  doi          = {10.15394/JDFSL.2007.1019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler07a,
  author       = {Gary C. Kessler},
  title        = {Book Review: Conquest in Cyberspace: National Security and Information
                  Warfare},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {2},
  pages        = {67--70},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1024},
  doi          = {10.15394/JDFSL.2007.1024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KnappFMR07,
  author       = {Kenneth J. Knapp and
                  F. Nelson Ford and
                  Thomas E. Marshall and
                  R. Kelly Rainer Jr.},
  title        = {The Common Body of Knowledge: {A} Framework to Promote Relevant Information
                  Security Research},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {1},
  pages        = {9--34},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1016},
  doi          = {10.15394/JDFSL.2007.1016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KnappFMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LeeS07,
  author       = {Ki Jung Lee and
                  Il{-}Yeol Song},
  title        = {Investigating Information Structure of Phishing Emails Based on Persuasive
                  Communication Perspective},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {3},
  pages        = {29--44},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1028},
  doi          = {10.15394/JDFSL.2007.1028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LeeS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Liu07,
  author       = {Jigang Liu},
  title        = {Book Review: Computer Forensics: Principles and Practices},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {3},
  pages        = {57--60},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1027},
  doi          = {10.15394/JDFSL.2007.1027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Liu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PawarSK07,
  author       = {R. G. Pawar and
                  B. S. Sawant and
                  A. Kaiwade},
  title        = {Information Technology Act 2000 in India - Authentication of E-Documents},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {2},
  pages        = {57--66},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1023},
  doi          = {10.15394/JDFSL.2007.1023},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PawarSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Taylor07,
  author       = {Richard G. Taylor},
  title        = {Making Molehills Out of Mountains: Bringing Security Research to the
                  Classroom},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {4},
  pages        = {43--58},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1031},
  doi          = {10.15394/JDFSL.2007.1031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Taylor07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Twitchell07,
  author       = {Douglas P. Twitchell},
  title        = {SecurityCom: {A} Multi-Player Game for Researching and Teaching Information
                  Security Teams},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {4},
  pages        = {9--18},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1029},
  doi          = {10.15394/JDFSL.2007.1029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Twitchell07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Vidas07,
  author       = {Timothy Vidas},
  title        = {Providing a Foundation for Analysis of Volatile Data Stores},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {3},
  pages        = {45--56},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1026},
  doi          = {10.15394/JDFSL.2007.1026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Vidas07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Watney07,
  author       = {Murdoch Watney},
  title        = {The Evolution of Internet Legal Regulation in Addressing Crime and
                  Terrorism},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {2},
  pages        = {41--56},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1022},
  doi          = {10.15394/JDFSL.2007.1022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Watney07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Williams07,
  author       = {Patricia A. H. Williams},
  title        = {Information Governance: {A} Model for Security in Medical Practice},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {2},
  number       = {1},
  pages        = {57--74},
  year         = {2007},
  url          = {https://doi.org/10.15394/jdfsl.2007.1017},
  doi          = {10.15394/JDFSL.2007.1017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Williams07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AlbrechtAWF06,
  author       = {Chad Albrecht and
                  Conan C. Albrecht and
                  Jonathan Wareham and
                  Paul B. Fox},
  title        = {The Role of Power and Negotiation in Online Deception},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {29--48},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1012},
  doi          = {10.15394/JDFSL.2006.1012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AlbrechtAWF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BagbyR06,
  author       = {John W. Bagby and
                  John C. Ruhnka},
  title        = {Electronic Data Discovery: Integrating Due Process into Cyber Forensic
                  Practice},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {1},
  pages        = {5--24},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1000},
  doi          = {10.15394/JDFSL.2006.1000},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BagbyR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BagbyR06a,
  author       = {John W. Bagby and
                  John C. Ruhnka},
  title        = {Development and Delivery of Coursework: The Legal/Regulatory/Policy
                  Environment of Cyberforensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {39--74},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1005},
  doi          = {10.15394/JDFSL.2006.1005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BagbyR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JansenA06,
  author       = {Wayne A. Jansen and
                  Rick Ayers},
  title        = {Forensic Tools for Mobile Phone Subscriber Identity Modules},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {75--94},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1006},
  doi          = {10.15394/JDFSL.2006.1006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JansenA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVST06,
  author       = {Andy Jones and
                  Craig Valli and
                  Iain Sutherland and
                  Paula Thomas},
  title        = {The 2006 Analysis of Information Remaining on Disks Offered for Sale
                  on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {23--36},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1008},
  doi          = {10.15394/JDFSL.2006.1008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kearns06,
  author       = {Grover S. Kearns},
  title        = {A Curriculum for Teaching Information Technology Investigative Techniques
                  for Auditors},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {9--28},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1011},
  doi          = {10.15394/JDFSL.2006.1011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kearns06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler06,
  author       = {Gary C. Kessler},
  title        = {Book Review: Digital Crime and Forensic Science in Cyberspace},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {67--70},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1014},
  doi          = {10.15394/JDFSL.2006.1014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KesslerS06,
  author       = {Gary C. Kessler and
                  Michael E. Schirling},
  title        = {The Design of an Undergraduate Degree Program in Computer {\&}
                  Digital Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {37--50},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1009},
  doi          = {10.15394/JDFSL.2006.1009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KesslerS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MorfittV06,
  author       = {Kim Morfitt and
                  Craig Valli},
  title        = {A Forensic Log File Extraction Tool for {ICQ} Instant Messaging Clients},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {51--64},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1010},
  doi          = {10.15394/JDFSL.2006.1010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MorfittV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RogersGMWD06,
  author       = {Marcus K. Rogers and
                  James Goldman and
                  Richard Mislan and
                  Timothy Wedge and
                  Steve Debrota},
  title        = {Computer Forensics Field Triage Process Model},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {19--38},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1004},
  doi          = {10.15394/JDFSL.2006.1004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RogersGMWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SlayS06,
  author       = {Jill Slay and
                  Fiona Schulz},
  title        = {Development of an Ontology Based Forensic Search Mechanism: Proof
                  of Concept},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {1},
  pages        = {25--44},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1002},
  doi          = {10.15394/JDFSL.2006.1002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SlayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SongLHMCC06,
  author       = {Il{-}Yeol Song and
                  Ki Jung Lee and
                  Xiaohua Hu and
                  John D. Maguire and
                  Namyoun Choi and
                  Peter P. Chen},
  title        = {Designing a Data Warehouse for Cyber Crimes},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {5--22},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1007},
  doi          = {10.15394/JDFSL.2006.1007},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SongLHMCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Stahl06,
  author       = {Bernd Carsten Stahl},
  title        = {Is Forensic Computing a Profession? Revisiting an Old Debate in a
                  New Field},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {49--66},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1043},
  doi          = {10.15394/JDFSL.2006.1043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Stahl06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TanriverdiHMBHH06,
  author       = {H{\"{u}}seyin Tanriverdi and
                  Jonathan Harrison and
                  Ketan S. Mesuria and
                  Joshua Bertsch and
                  Po{-}Ling Hsiao and
                  David Hendrawirawan},
  title        = {AlphaCo: {A} Teaching Case on Information Technology Audit and Security},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {1},
  pages        = {45--68},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1001},
  doi          = {10.15394/JDFSL.2006.1001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TanriverdiHMBHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/WeiserBM06,
  author       = {Mark Weiser and
                  David P. Biros and
                  Greg Mosier},
  title        = {Development of a National Repository of Digital Forensic Intelligence},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {5--18},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1003},
  doi          = {10.15394/JDFSL.2006.1003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/WeiserBM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics