default search action
Journal of Digital Forensics, Security and Law, Volume 12
Volume 12, Number 1, 2017
- Johannes Stadlinger, Andreas Dewald:
A Forensic Email Analysis Tool Using Dynamic Visualization. 7-14 - Jason Moore, Ibrahim M. Baggili, Frank Breitinger:
Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. 15-30 - Kyoung Park, Jung-Min Park, Eun-Jin Kim, Chang Cheon, Joshua James:
Anti-Forensic Trace Detection in Digital Forensic Triage Investigations. 31-40 - James E. Fowler:
Compression of Virtual-Machine Memory in Dynamic Malware Analysis. 41-46 - Patrick Tobin, Nhien-An Le-Khac, M. Tahar Kechadi:
Forensic Analysis of Virtual Hard Drives. 47-58
Volume 12, Number 2, 2017
- Travis Atkison, Nathan Wallace:
A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection. 5-18 - Konstantinos Karampidis, Giorgos Papadourakis:
File Type Identification - Computational Intelligence for Digital Forensics. 19-32 - John B. Minor:
Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology. 33-52 - Daniel Schatz, Rabih Bashroush, Julie A. Wall:
Towards a More Representative Definition of Cyber Security. 53-74 - Diane Barrett:
Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions. 75-96 - Matthew Horner, Thomas Hyslip:
SQL Injection: The Longest Running Sequel in Programming History. 97-108 - M. A. K. Sudozai, Nisar Habib, Shahzad Saleem, A. A. Khan:
Signatures of Viber Security Traffic. 109-120 - Makhdoom Shah, Shahzad Saleem, Roha Zulqarnain:
Protecting Digital Evidence Integrity and Preserving Chain of Custody. 121-130
Volume 12, Number 3, 2017
- Sungmi Park, Yunsik Jang, Joshua James:
Possession of Child Exploitation Material in Computer Temporary Internet Cache. 7-22 - Nikolay Akatyev, Joshua James:
Legislative Requirements for Cyber Peacekeeping. 23-38 - Isabel de la Torre Díez, Begoña García Zapirain, Miguel López Coronado:
Analysis of Security in Big Data Related to Healthcare. 39-46 - Deborah W. Keeling, Michael Losavio:
Public Security & Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security. 47-60 - Alexander Syatchikhin, Valery Golubtsov, Natalia Syropiatova:
Contractual Responsibility for the Disclosure of Bank Secrets. 61-66 - Michael Losavio, Adel Elmaghraby:
Security and the Transnational Information Polity. 67-76 - Olga Kuznetsova, Natalia Pavlovna Bondarenko:
Private Life Safety Provision in Digital Age. 77-86 - Pavel Pastukhov, Svetlana Polyakova, Evelina Frolovich:
The Use of Information Technologies to Combat Counterfeit Alcohol Products and Ensure the Right to Life in Russia. 87-94 - Galina Borisevich:
Providing for the Safety of the Participants of the Criminal Court Proceedings - The Subject of Cconcern of Russian Legislator, Government, Scientists and Practicians. 95-102 - Svetlana Afanasieva, Irina Kilina:
Use of House Arrest In The Context of the Respecting the Constitutional Rights of an Individual in Russia. 103-112
Volume 12, Number 4, 2017
- Chetan K. R, Shivananda Nirmala:
Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image. 5-28 - Joan Through, Gary Cantrell:
Varying Instructional Approaches to Physical Extraction of Mobile Device Memory. 29-42 - Nickson M. Karie, Simon M. Karume:
Digital Forensic Readiness in Organizations: Issues and Challenges. 43-54 - Patryk Szewczyk, Rose Macdonald:
Broadband Router Security: History, Challenges and Future Implications. 55-74 - Ryne Teague, Michael Black:
Evidence Verification Complications with Solid-State Drives. 75-86 - Sengül Dogan:
A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs. 87-100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.