default search action
Digital Investigation, Volume 14 Supplement 1
Volume 14 Supplement 1, August 2015
- Elizabeth Schweinsberg:
Fifteenth Annual DFRWS Conference. S1-S2 - Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, May El Barachi:
Graph-theoretic characterization of cyber-threat infrastructures. S3-S15 - Davide Balzarotti, Roberto Di Pietro, Antonio Villani:
The impact of GPU-assisted malware on memory forensics: A case study. S16-S24 - Andrew Case, Golden G. Richard III:
Advancing Mac OS X rootkit detection. S25-S33 - Jonathan Grier, Golden G. Richard III:
Rapid forensic imaging of large disks with sifting collectors. S34-S44 - Bradley L. Schatz:
Wirespeed: Extending the AFF4 forensic container format for scalable acquisition and live analysis. S45-S54 - Shams Zawoad, Ragib Hasan, John Grimes:
LINCS: Towards building a trustworthy litigation hold enabled cloud storage system. S55-S67 - Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Taejoo Chang:
New acquisition method based on firmware update protocols for Android smartphones. S68-S76 - Daniel Walnycky, Ibrahim M. Baggili, Andrew Marrington, Jason Moore, Frank Breitinger:
Network and device forensic analysis of Android social-messaging applications. S77-S84 - Adrien Larbanet, Jonas Lerebours, J. P. David:
Detecting very large sets of referenced files at 40/100 GbE, especially MP4 files. S85-S94 - Simson L. Garfinkel, Michael McCarrin:
Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb. S95-S105 - James Wagner, Alexander Rasin, Jonathan Grier:
Database forensic analysis through internal structure carving. S106-S115 - Michael R. Schmid, Farkhund Iqbal, Benjamin C. M. Fung:
E-mail authorship attribution using customized associative classification. S116-S126 - Frederik Armknecht, Andreas Dewald:
Privacy-preserving email forensics. S127-S136 - Dianne Dietrich, Frank Adelstein:
Archival science, digital forensics, and new media art. S137-S145 - Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinComp: A stratified approach to compiler provenance Attribution. S146-S155 - John Clemens:
Automatic classification of object code using machine learning. S156-S162
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.