Search dblp for Publications

export results for "toc:db/journals/jdfp/jdfp3.bht:"

 download as .bib file

@article{DBLP:journals/jdfp/BogenDVRAC10,
  author       = {Alfred C. Bogen and
                  David A. Dampier and
                  Rayford B. Vaughn and
                  Donna S. Reese and
                  Edward B. Allen and
                  Jeffrey C. Carver},
  title        = {Structured Forensics Examination Planning with Domain Modeling: {A}
                  Report of Three Experiment Trials},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {23--32},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903376896},
  doi          = {10.1080/15567280903376896},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BogenDVRAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BrungsJ10,
  author       = {Angela Brungs and
                  Rodger Jamieson},
  title        = {Identification of Legal Issues for Computer Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {140--149},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536740},
  doi          = {10.1080/15567281.2010.536740},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BrungsJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/EtgesS10,
  author       = {Rafael Etges and
                  Emma Sutcliffe},
  title        = {An Overview of Transnational Organized Cyber Crime},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {106--114},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536731},
  doi          = {10.1080/15567281.2010.536731},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/EtgesS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Freeman10,
  author       = {Edward H. Freeman},
  title        = {Computer Printouts as Legal Evidence},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {98--105},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536730},
  doi          = {10.1080/15567281.2010.536730},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Freeman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Geers10,
  author       = {Kenneth Geers},
  title        = {The Cyber Threat to National Critical Infrastructures: Beyond Theory},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {124--130},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536735},
  doi          = {10.1080/15567281.2010.536735},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Geers10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GloeB10,
  author       = {Thomas Gloe and
                  Rainer B{\"{o}}hme},
  title        = {The Dresden Image Database for Benchmarking Digital Image Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {150--159},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.531500},
  doi          = {10.1080/15567281.2010.531500},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GloeB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GogolinJ10,
  author       = {Greg Gogolin and
                  James Jones},
  title        = {Law Enforcement's Ability to Deal with Digital Crime and the Implications
                  for Business},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {131--139},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536737},
  doi          = {10.1080/15567281.2010.536737},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GogolinJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GuoS10,
  author       = {Yinghua Guo and
                  Jill Slay},
  title        = {Testing Forensic Copy Function of Computer Forensics Investigation
                  Tools},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {46--61},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903521392},
  doi          = {10.1080/15567280903521392},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GuoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kessler10,
  author       = {Gary C. Kessler},
  title        = {\emph{Building a Digital Forensic Laboratory: Establishing and Managing
                  a Successful Facility}. By A. Jones and C. Valli},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {62--63},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903463801},
  doi          = {10.1080/15567280903463801},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kessler10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Kessler10a,
  author       = {Gary C. Kessler},
  title        = {\emph{Windows Forensic Analysis {DVD} Toolkit}, 2nd edition. By Harlan
                  Carvey},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {64--66},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903463819},
  doi          = {10.1080/15567280903463819},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Kessler10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/KesslerH10,
  author       = {Gary C. Kessler and
                  Don A. Haggerty},
  title        = {An Online Graduate Program in Digital Investigation Management: Pedagogy
                  and Overview},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {11--22},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903357771},
  doi          = {10.1080/15567280903357771},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/KesslerH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/LiebrockPH10,
  author       = {Lorie M. Liebrock and
                  Brajendra Panda and
                  Robert L. Hutchinson},
  title        = {Special Issue Guest Editorial: Computer Forensics Track of Symposium
                  on Applied Computing},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {4},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903177856},
  doi          = {10.1080/15567280903177856},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/LiebrockPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Matusitz10,
  author       = {Jonathan Matusitz},
  title        = {Cyberterrorism: Postmodern State of Chaos},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {115--123},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.536733},
  doi          = {10.1080/15567281.2010.536733},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Matusitz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/MohamadPHD10,
  author       = {Kamaruddin Malik Mohamad and
                  Ahmed Patel and
                  Tutut Herawan and
                  Mustafa Mat Deris},
  title        = {myKarve: {JPEG} Image and Thumbnail Carver},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {74--97},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.531607},
  doi          = {10.1080/15567281.2010.531607},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/MohamadPHD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Pollitt10,
  author       = {Mark Pollitt},
  title        = {Forensic Twitter},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {1--3},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903171024},
  doi          = {10.1080/15567280903171024},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Pollitt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Riley10,
  author       = {John H. Riley Jr.},
  title        = {Recycling in Vista{\textregistered}},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {5--10},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903357763},
  doi          = {10.1080/15567280903357763},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Riley10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/Suffern10,
  author       = {Lawrence Suffern},
  title        = {A Study of Current Trends in Database Forensics},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {2-4},
  pages        = {67--73},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567281.2010.500646},
  doi          = {10.1080/15567281.2010.500646},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/Suffern10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/ZwanC10,
  author       = {Pawel Zwan and
                  Andrzej Czyzewski},
  title        = {Verification of the Parameterization Methods in the Context of Automatic
                  Recognition of Sounds Related to Danger},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {33--45},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903493881},
  doi          = {10.1080/15567280903493881},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/ZwanC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics