![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Digital Investigation, Volume 14 Supplement 1
Volume 14 Supplement 1, August 2015
- Elizabeth Schweinsberg:
Fifteenth Annual DFRWS Conference. S1-S2 - Amine Boukhtouta, Djedjiga Mouheb
, Mourad Debbabi
, Omar Alfandi
, Farkhund Iqbal
, May El Barachi
:
Graph-theoretic characterization of cyber-threat infrastructures. S3-S15 - Davide Balzarotti, Roberto Di Pietro
, Antonio Villani:
The impact of GPU-assisted malware on memory forensics: A case study. S16-S24 - Andrew Case
, Golden G. Richard III
:
Advancing Mac OS X rootkit detection. S25-S33 - Jonathan Grier, Golden G. Richard III
:
Rapid forensic imaging of large disks with sifting collectors. S34-S44 - Bradley L. Schatz:
Wirespeed: Extending the AFF4 forensic container format for scalable acquisition and live analysis. S45-S54 - Shams Zawoad, Ragib Hasan
, John Grimes:
LINCS: Towards building a trustworthy litigation hold enabled cloud storage system. S55-S67 - Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Taejoo Chang:
New acquisition method based on firmware update protocols for Android smartphones. S68-S76 - Daniel Walnycky, Ibrahim M. Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
:
Network and device forensic analysis of Android social-messaging applications. S77-S84 - Adrien Larbanet, Jonas Lerebours, J. P. David:
Detecting very large sets of referenced files at 40/100 GbE, especially MP4 files. S85-S94 - Simson L. Garfinkel, Michael McCarrin:
Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb. S95-S105 - James Wagner, Alexander Rasin, Jonathan Grier:
Database forensic analysis through internal structure carving. S106-S115 - Michael R. Schmid, Farkhund Iqbal
, Benjamin C. M. Fung:
E-mail authorship attribution using customized associative classification. S116-S126 - Frederik Armknecht, Andreas Dewald:
Privacy-preserving email forensics. S127-S136 - Dianne Dietrich, Frank Adelstein:
Archival science, digital forensics, and new media art. S137-S145 - Ashkan Rahimian, Paria Shirani, Saed Alrabaee, Lingyu Wang, Mourad Debbabi
:
BinComp: A stratified approach to compiler provenance Attribution. S146-S155 - John Clemens
:
Automatic classification of object code using machine learning. S156-S162
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.