


default search action
Digital Investigation, Volume 9
Volume 9, Number 1, June 2012
- Eoghan Casey

:
Editorial: IT security is not enough. 1-2 - Harjinder Singh Lallie

:
An overview of the digital forensic investigation infrastructure of India. 3-7 - Rafal Drezewski

, Jan Sepielak, Wojciech Filipkowski
:
System supporting money laundering detection. 8-21 - Miao Yu, Zhengwei Qi, Qian Lin, Xianming Zhong, Bingyu Li, Haibing Guan:

Vis: Virtualization enhanced live forensics acquisition for native system. 22-33 - Li Zhang

, Yu-an Tan, Qikun Zhang:
Identification of NAND flash ECC algorithms in mobile devices. 34-48 - Ghulam Muhammad

, Muhammad Hussain, George Bebis:
Passive copy move image forgery detection using undecimated dyadic wavelet transform. 49-57 - Han Zong, Fenlin Liu, Xiangyang Luo:

Blind image steganalysis based on wavelet coefficient correlation. 58-68
Volume 9, Number Supplement, August 2012
- Andrew White, Bradley L. Schatz, Ernest Foo

:
Surveying the user space through user allocations. S3-S12 - Zhui Deng, Dongyan Xu, Xiangyu Zhang

, Xuxian Jiang:
IntroLib: Efficient and transparent library call introspection for malware forensics. S13-S23 - Noora Al Mutawa, Ibrahim M. Baggili

, Andrew Marrington
:
Forensic analysis of social networking applications on mobile devices. S24-S33 - Ralf D. Brown:

Finding and identifying text in 900+ languages. S34-S43 - Simran Fitzgerald, George Mathews, Colin Morris, Oles Zhulyn:

Using NLP techniques for file fragment classification. S44-S49 - Simson L. Garfinkel

, Alex J. Nelson
, Joel Young:
A general strategy for differential forensic analysis. S50-S59 - Vassil Roussev, Candice Quates:

Content triage with similarity digests: The M57 case study. S60-S68 - Christopher James Hargreaves

, Jonathan Patterson:
An automated timeline reconstruction approach for digital forensic investigations. S69-S79 - Simson L. Garfinkel

:
Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus. S80-S89 - Josiah Dykstra, Alan T. Sherman:

Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. S90-S98 - Brian Jones, Syd Pleno, Michael Wilkinson:

The use of random sampling in investigations involving child abuse material. S99-S107 - Scott Hand, Zhiqiang Lin, Guofei Gu, Bhavani Thuraisingham:

Bin-Carver: Automatic recovery of binary executable files. S108-S117 - Kevin D. Fairbanks

:
An analysis of Ext4 for digital forensics. S118-S130 - Neil C. Rowe:

Testing the National Software Reference Library. S131-S138
Volume 9, Number 2, November 2012
- Eoghan Casey

:
Cloud computing and digital forensics. 69-70
- Ben Martini, Kim-Kwang Raymond Choo

:
An integrated conceptual digital forensic framework for cloud computing. 71-80 - Hyunji Chung, Jungheum Park

, Sangjin Lee, Cheulhoon Kang:
Digital forensic investigation of cloud storage services. 81-95 - R. A. F. Bhoedjang, Alex van Ballegooij, Harm M. A. van Beek

, J. C. van Schie, F. W. Dillema, Ruud B. van Baar, F. A. Ouwendijk, M. Streppel:
Engineering an online computer forensic service. 96-108
- Jungheum Park

, Hyunji Chung, Sangjin Lee:
Forensic analysis techniques for fragmented flash memory pages in smartphones. 109-118
- Mohammed I. Al-Saleh

, Ziad A. Al-Sharif
:
Utilizing data lifetime of TCP buffers in digital forensics: Empirical study. 119-124 - Stefan Vömel, Felix C. Freiling:

Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. 125-137
- Oluwasola Mary Fasan

, Martin S. Olivier
:
Correctness proof for database reconstruction algorithm. 138-150
- Qiong Dong, Gaobo Yang, Ningbo Zhu:

A MCEA based passive forensics scheme for detecting frame-based video tampering. 151-159
- Tu-Thach Quach:

Locating payload embedded by group-parity steganography. 160-166
Volume 9, Numbers 3-4, February 2013
- Eoghan Casey

:
Experimental design challenges in digital forensics. 167-169
- Marnix Kaart, C. Klaver, Ruud B. van Baar:

Forensic access to Windows Mobile pim.vol and other Embedded Database (EDB) volumes. 170-192 - G. Stevenson Smith:

Using jump lists to identify fraudulent documents. 193-199 - Jan Collie

:
The windows IconCache.db: A resource for forensic artifacts from USB connectable devices. 200-210 - Joseph Lewthwaite:

FrostWire P2P forensic examinations. 211-221 - Muhammad Yasin, Muhammad Abulaish

:
DigLA - A Digsby log analysis tool to identify forensic artifacts. 222-234 - Omed S. Khalind

, Julio C. Hernandez-Castro
, Benjamin Aziz
:
A study on the false positive rate of Stegdetect. 235-245 - Panagiotis Andriotis

, George C. Oikonomou
, Theo Tryfonas
:
JPEG steganography detection with Benford's Law. 246-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














