default search action
Digital Investigation, Volume 12 Supplement 1
Volume 12 Supplement 1, March 2015
- David Gugelmann, Fabian Gasser, Bernhard Ager, Vincent Lenders:
Hviz: HTTP(S) traffic aggregation and visualization for network forensics. S1-S11 - Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb, Mourad Debbabi:
Spam campaign detection, analysis, and investigation. S12-S21 - Philip Penrose, William J. Buchanan, Richard Macfarlane:
Fast contraband detection in large capacity disk drives. S22-S29 - Graeme Horsman, Lynne R. Conniss:
Investigating evidence of mobile phone usage by drivers in road traffic accidents. S30-S37 - Michael I. Cohen:
Characterization of the windows kernel version variability for accurate memory analysis. S38-S49 - Johannes Stüttgen, Stefan Vömel, Michael Denzel:
Acquisition and analysis of compromised firmware using memory forensics. S50-S60 - Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi:
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code. S61-S71 - Abdul Boztas, A. R. J. Riethoven, Mark Roeloffs:
Smart TV forensics: Digital traces on televisions. S72-S80 - Matthew Davies, Huw Read, Konstantinos Xynos, Iain Sutherland:
Forensic analysis of a Sony PlayStation 4: A first look. S81-S89 - Flávio Cruz, Andreas Moser, Michael I. Cohen:
A scalable file based data store for forensic analysis. S90-S101 - Eoghan Casey, Greg Back, Sean Barnum:
Leveraging CybOX™ to standardize representation and exchange of digital forensic information. S102-S110 - Philipp Amann, Joshua I. James:
Designing robustness and resilience in digital investigation laboratories. S111-S120
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.