


default search action
Journal of Digital Forensics, Security and Law, Volume 10
Volume 10, Number 1, 2015
- Ibrahim M. Baggili:

From the Editor-in-Chief. 5-6 - Thomas Hyslip, Jason M. Pittman:

A Survey of Botnet Detection Techniques by Command and Control Infrastructure. 7-26 - Manghui Tu:

Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments. 27-44 - Thomas Lonardo, Alan Rea, Doug White:

To License or Not to License Reexamined: An Updated Report on State Statutes Regarding Private Investigators and Digital Examiners. 45-56 - Milton H. Luoma, Vicki Luoma:

Litigation Holds: Past, Present, and Future Directions. 57-68
Volume 10, Number 2, 2015
- Ibrahim M. Baggili:

From the Editor-in-Chief. 5-6 - Igor Korkin

:
Two Challenges of Stealthy Hypervisors Detection: Time Cheating and Data Fluctuations. 7-38 - Carla J. Utter, Alan Rea:

The "Bring your own device" conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges. 55-72
Volume 10, Number 3, 2015
- Grover S. Kearns:

Computer Forensic Projects for Accountants. 7-34 - Nicholas C. Donnangelo, Walter S. Kuklinski, R. Szabo, R. A. Coury, G. R. Hamshar:

Identification and Exploitation of Inadvertent Spectral Artifacts in Digital Audio. 35-58 - Irvin Homem

, Spyridon Dossis:
On the Network Performance of Digital Evidence Acquisition of Small Scale Devices over Public Networks. 59-86 - Hany Farid, Srivamshi Pittala, Emily Whiting:

A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo. 87-98
Volume 10, Number 4, 2015
- Ibtesam Al Awadhi

, Janet C. Read, Andrew Marrington, Virginia N. L. Franqueira
:
Factors Influencing Digital Forensic Investigations: Empirical Evaluation of 12 Years of Dubai Police Cases. 7-16 - Xiao-Xi Fan, Kam-Pui Chow:

Tracking and Taxonomy of Cyberlocker Link Sharers Based on Behavior Analysis. 17-30 - Joe Kong:

Data Extraction on MTK-based Android Mobile Phone Forensics. 31-42 - Michael Losavio, Pavel Sysoevich Pastukov, Svetlana Polyakova:

Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives and Challenges with Digital Forensics. 43-58 - Ken Yau, Kam-Pui Chow:

PLC Forensics Based on Control Program Logic Change Detection. 59-68 - Robert van Voorst, Mohand Tahar Kechadi

, Nhien-An Le-Khac
:
Forensic Acquisition of IMVU: A Case Study. 69-78 - Tina Wu, Jason R. C. Nurse:

Exploring The Use Of PLC Debugging Tools For Digital Forensic Investigations On SCADA Systems. 79-96 - Lee Tobin, Pavel Gladyshev:

Open Forensic Devices. 97-104 - Mohammed Alzaabi:

The Use of Ontologies in Forensic Analysis of Smartphone Content. 105-114 - Jason Farina, M. Tahar Kechadi

, Mark Scanlon:
Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser. 115-124

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














