default search action
Journal of Digital Forensics, Security and Law, Volume 11
Volume 11, Number 1, 2016
- William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In-The-Wild Residual Data Research and Privacy. 7-36 - Yi-Ching Liao, Hanno Langweg:
Evidential Reasoning for Forensic Readiness. 37-52 - Eric Olson, Narasimha K. Shashidhar:
Low Budget Forensic Drive Imaging Using ARM Based Single Board Computers. 53-76 - Teri A. Flory:
Digital Forensics In Law Enforcement: A Needs Based Analysis of Indiana Agencies. 77-98
Volume 11, Number 2, 2016
- Samer Al-khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim M. Baggili, Frank Breitinger:
Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. 7-20 - Monika Singh, Donghoon Chang, Somitra Kumar Sanadhya:
Security Analysis of mvHash-B Similarity Hashing. 21-34 - Murat Gunestas, Zeki Bilgin:
Log Analysis Using Temporal Logic and Reconstruction Approach: Web Server Case. 35-58 - Vikram S. Harichandran, Frank Breitinger, Ibrahim M. Baggili:
Bytewise Approximate Matching: The Good, The Bad, and The Unknown. 59-78 - Petr Matousek, Radek Hranicky, Martin Holkovic, Ondrej Rysavý:
On Efficiency of Distributed Password Recovery. 79-96 - Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee:
Towards Syntactic Approximate Matching - A Pre-Processing Experiment. 97-110 - Thibault Julliand, Hugues Talbot, Vincent Nozick:
Countering Noise-based Splicing Detection Using Noise Density Transfer. 111-122 - Kibin Lee, Joshua I. James, Tekachew Gobena Ejeta, Hyoung Joong Kim:
Electronic Voting Service Using Block-Chain. 123-136 - Hussam Jasim Mohammed, Nathan Luke Clarke, Fudong Li:
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data. 137-152 - Neil C. Rowe, Riqui Schwamm, Michael McCarrin, Ralucca Gera:
Making Sense of Email Addresses on Drives. 153-174 - Marcus Thompson, Raymond Hansen:
Verification of Recovered Digital Evidence on the Amazon Kindle. 175-192
Volume 11, Number 3, 2016
- Lauren A. Zezulka, Kathryn C. Seigfried-Spellar:
Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem. 7-26 - Hyunin Baek, Michael Losavio, George Higgins:
The Impact of Low Self-Control on Online Harassment: Interaction with Opportunity. 27-42 - Brian H. Spitzberg, Jean Mark Gawron:
A Research Agenda for Online Linguistic Surveillance of Threatening Messages. 43-78 - Thomas Lonardo, Tricia Martland, Doug White:
A Legal Examination of Revenge Pornography and Cyber-Harassment. 79-106
Volume 11, Number 4, 2016
- Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah:
Bloom Filters Optimized Wu-Manber for Intrusion Detection. 5-22 - Thomas Anthony Martin, Andy Jones, Mohammed Alzaabi:
The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE. 23-36 - Bhupendra Singh, Upasna Singh:
Leveraging the Windows Amcache.hve File in Forensic Investigations. 37-54 - Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan Aygun:
A Survey of Social Network Forensics. 55-128 - Gary C. Kessler:
The Impact of MD5 File Hash Collisions On Digital Forensic Imaging. 129-138 - Gary C. Kessler:
The Impact of SHA-1 File Hash Collisions On Digital Forensic Imaging: A Follow-up Experiment. 139-148 - Saad Fehis, Omar Nouali, Mohand Tahar Kechadi:
A New Distributed Chinese Wall Security Policy Model. 149-168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.