


default search action
Forensic Science International: Digital Investigation, Volume 45
Volume 45, June 2023
- Pedro Fernandes
, Mário Antunes
:
Benford's law applied to digital forensic analysis. 301515
- Christopher Neale:
Fool me once: A systematic review of techniques to authenticate digital artefacts. 301516
- Mustafa A. Qamhan
, Yousef Ajami Alotaibi
, Sid-Ahmed Selouani:
Transformer for authenticating the source microphone in digital audio forensics. 301539
- Yee Ching Tok
, Sudipta Chattopadhyay:
Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling. 301540
- Scott Lorenz, Stanley Stinehour, Anitha Chennamaneni
, Abdul B. Subhani, Damiano Torre:
IoT forensic analysis: A family of experiments with Amazon Echo devices. 301541
- Rune Nordvik, Stefan Axelsson:
Corrigendum to "It is about time-do exFAT implementations handle timestamps correctly?" [Forensic Science International: Digital Investigation 42-43 (2022) 301476]. 301542
- Radina Stoykova
, Katrin Franke:
Reliability validation enabling framework (RVEF) for digital forensics in criminal investigations. 301554
- Patrício Domingues
, José Carlos Francisco, Miguel Frade
:
Post-mortem digital forensics analysis of the Zepp Life android application. 301555
Volume 45, Number Supplement, July 2023
Twenty third annual DFRWS conference
- Twenty third annual DFRWS conference. 301556
- Lukas Schmidt, Sebastian Kortmann
, Thomas Hupperich:
Improving trace synthesis by utilizing computer vision for user action emulation. 301557 - Harjinder Singh Lallie:
Dashcam forensic investigation guidelines. 301558 - Lauren R. Pace
, Lasean A. Salmon, Christopher J. Bowen, Ibrahim Baggili
, Golden G. Richard III:
Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application. 301559 - Evangelos Dragonas
, Costas Lambrinoudakis, Michael Kotsis:
IoT forensics: Analysis of a HIKVISION's mobile app. 301560 - Frank Block
:
Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files. 301561 - Frank Breitinger
, Alexandre Jotterand:
Sharing datasets for digital forensic: A novel taxonomy and legal concerns. 301562 - Milan Cermák
, Tatiana Fritzová, Vít Rusnák, Denisa Sramkova:
Using relational graphs for exploratory analysis of network traffic data. 301563 - Aisha I. Ali-Gombe, Sneha Sudhakaran, Ramyapandian Vijayakanthan, Golden G. Richard III:
cRGB_Mem: At the intersection of memory forensics and machine learning. 301564 - Syed Ali Qasim, Wooyeon Jo, Irfan Ahmed
:
PREE: Heuristic builder for reverse engineering of network protocols in industrial control systems. 301565 - Cinthya Grajeda, Jessica Berrios, Sankofa Benzo, Emmanuel Ogunwobi
, Ibrahim Baggili
:
Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project. 301566 - James Wagner, Mahfuzul I. Nissan
, Alexander Rasin:
Database memory forensics: Identifying cache patterns for log verification. 301567 - Uk Hur, Soojin Kang, Giyoon Kim, Jongsung Kim:
A study on cloud data access through browser credential migration in Windows environment. 301568 - Jessica Berrios, Elias Mosher, Sankofa Benzo, Cinthya Grajeda, Ibrahim Baggili
:
Factorizing 2FA: Forensic analysis of two-factor authentication applications. 301569 - Frieder Uhlig, Lukas Struppek, Dominik Hintersdorf, Thomas Göbel, Harald Baier, Kristian Kersting:
Combining AI and AM - Improving approximate matching through transformer networks. 301570

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.