Search dblp for Publications

export results for "toc:db/journals/di/di31.bht:"

 download as .bib file

@article{DBLP:journals/di/Casey19b,
  author       = {Eoghan Casey},
  title        = {Trust in digital evidence},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200898},
  doi          = {10.1016/J.FSIDI.2019.200898},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Casey19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/CaseyNH19,
  author       = {Eoghan Casey and
                  Alex J. Nelson and
                  Jessica Hyde},
  title        = {Standardization of file recovery classification and authentication},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.06.004},
  doi          = {10.1016/J.DIIN.2019.06.004},
  timestamp    = {Sun, 22 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/CaseyNH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Horsman19b,
  author       = {Graeme Horsman},
  title        = {Reconstructing cached video stream content: - Part 2},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200893},
  doi          = {10.1016/J.FSIDI.2019.200893},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Horsman19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HurPKPLK19,
  author       = {Uk Hur and
                  Myungseo Park and
                  Giyoon Kim and
                  Younjai Park and
                  Insoo Lee and
                  Jongsung Kim},
  title        = {Data acquisition methods using backup data decryption of Sony smartphones},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200890},
  doi          = {10.1016/J.FSIDI.2019.200890},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HurPKPLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/MargagliottiBR19,
  author       = {Giulia Margagliotti and
                  Timothy Boll{\'{e}} and
                  Quentin Rossy},
  title        = {Worldwide analysis of crimes by the traces of their online media coverage:
                  The case of jewellery store robberies},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200889},
  doi          = {10.1016/J.FSIDI.2019.200889},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/MargagliottiBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ThreadgallH19,
  author       = {Ruth Threadgall and
                  Graeme Horsman},
  title        = {An examination of gaming platform policies for law enforcement support},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200887},
  doi          = {10.1016/J.FSIDI.2019.200887},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ThreadgallH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/VeselyZ19,
  author       = {Vladim{\'{\i}}r Vesel{\'{y}} and
                  Martin Z{\'{a}}dn{\'{\i}}k},
  title        = {How to detect cryptocurrency miners? By traffic forensics!},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.08.002},
  doi          = {10.1016/J.DIIN.2019.08.002},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/VeselyZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WuLX19,
  author       = {Yan Wu and
                  Anthony Luo and
                  Dianxiang Xu},
  title        = {Identifying suspicious addresses in Bitcoin thefts},
  journal      = {Digit. Investig.},
  volume       = {31},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.fsidi.2019.200895},
  doi          = {10.1016/J.FSIDI.2019.200895},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/WuLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics