Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:journals/jdfp:"
@article{DBLP:journals/jdfp/BogenDVRAC10, author = {Alfred C. Bogen and David A. Dampier and Rayford B. Vaughn and Donna S. Reese and Edward B. Allen and Jeffrey C. Carver}, title = {Structured Forensics Examination Planning with Domain Modeling: {A} Report of Three Experiment Trials}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {23--32}, year = {2010}, url = {https://doi.org/10.1080/15567280903376896}, doi = {10.1080/15567280903376896}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BogenDVRAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BrungsJ10, author = {Angela Brungs and Rodger Jamieson}, title = {Identification of Legal Issues for Computer Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {140--149}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536740}, doi = {10.1080/15567281.2010.536740}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BrungsJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/EtgesS10, author = {Rafael Etges and Emma Sutcliffe}, title = {An Overview of Transnational Organized Cyber Crime}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {106--114}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536731}, doi = {10.1080/15567281.2010.536731}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/EtgesS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Freeman10, author = {Edward H. Freeman}, title = {Computer Printouts as Legal Evidence}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {98--105}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536730}, doi = {10.1080/15567281.2010.536730}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Freeman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Geers10, author = {Kenneth Geers}, title = {The Cyber Threat to National Critical Infrastructures: Beyond Theory}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {124--130}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536735}, doi = {10.1080/15567281.2010.536735}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Geers10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GloeB10, author = {Thomas Gloe and Rainer B{\"{o}}hme}, title = {The Dresden Image Database for Benchmarking Digital Image Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {150--159}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.531500}, doi = {10.1080/15567281.2010.531500}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GloeB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GogolinJ10, author = {Greg Gogolin and James Jones}, title = {Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {131--139}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536737}, doi = {10.1080/15567281.2010.536737}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GogolinJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GuoS10, author = {Yinghua Guo and Jill Slay}, title = {Testing Forensic Copy Function of Computer Forensics Investigation Tools}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {46--61}, year = {2010}, url = {https://doi.org/10.1080/15567280903521392}, doi = {10.1080/15567280903521392}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GuoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kessler10, author = {Gary C. Kessler}, title = {\emph{Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility}. By A. Jones and C. Valli}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {62--63}, year = {2010}, url = {https://doi.org/10.1080/15567280903463801}, doi = {10.1080/15567280903463801}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kessler10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kessler10a, author = {Gary C. Kessler}, title = {\emph{Windows Forensic Analysis {DVD} Toolkit}, 2nd edition. By Harlan Carvey}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {64--66}, year = {2010}, url = {https://doi.org/10.1080/15567280903463819}, doi = {10.1080/15567280903463819}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kessler10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/KesslerH10, author = {Gary C. Kessler and Don A. Haggerty}, title = {An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {11--22}, year = {2010}, url = {https://doi.org/10.1080/15567280903357771}, doi = {10.1080/15567280903357771}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/KesslerH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/LiebrockPH10, author = {Lorie M. Liebrock and Brajendra Panda and Robert L. Hutchinson}, title = {Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {4}, year = {2010}, url = {https://doi.org/10.1080/15567280903177856}, doi = {10.1080/15567280903177856}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/LiebrockPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Matusitz10, author = {Jonathan Matusitz}, title = {Cyberterrorism: Postmodern State of Chaos}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {115--123}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.536733}, doi = {10.1080/15567281.2010.536733}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Matusitz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/MohamadPHD10, author = {Kamaruddin Malik Mohamad and Ahmed Patel and Tutut Herawan and Mustafa Mat Deris}, title = {myKarve: {JPEG} Image and Thumbnail Carver}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {74--97}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.531607}, doi = {10.1080/15567281.2010.531607}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/MohamadPHD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt10, author = {Mark Pollitt}, title = {Forensic Twitter}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {1--3}, year = {2010}, url = {https://doi.org/10.1080/15567280903171024}, doi = {10.1080/15567280903171024}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Riley10, author = {John H. Riley Jr.}, title = {Recycling in Vista{\textregistered}}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {5--10}, year = {2010}, url = {https://doi.org/10.1080/15567280903357763}, doi = {10.1080/15567280903357763}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Riley10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Suffern10, author = {Lawrence Suffern}, title = {A Study of Current Trends in Database Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {2-4}, pages = {67--73}, year = {2010}, url = {https://doi.org/10.1080/15567281.2010.500646}, doi = {10.1080/15567281.2010.500646}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Suffern10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/ZwanC10, author = {Pawel Zwan and Andrzej Czyzewski}, title = {Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger}, journal = {J. Digit. Forensic Pract.}, volume = {3}, number = {1}, pages = {33--45}, year = {2010}, url = {https://doi.org/10.1080/15567280903493881}, doi = {10.1080/15567280903493881}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/ZwanC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BabooB08, author = {S. Santhosh Baboo and P. Vinod Bhattathiripad}, title = {Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {4}, pages = {175--182}, year = {2008}, url = {https://doi.org/10.1080/15567280903140938}, doi = {10.1080/15567280903140938}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BabooB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/DandassNT08, author = {Yoginder S. Dandass and Nathan Joseph Necaise and Sherry Reede Thomas}, title = {An Empirical Analysis of Disk Sector Hashes for Data Carving}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {2}, pages = {95--104}, year = {2008}, url = {https://doi.org/10.1080/15567280802050436}, doi = {10.1080/15567280802050436}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/DandassNT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Desoky08, author = {Abdelrahman Desoky}, title = {Nostega: {A} Novel Noiseless Steganography Paradigm}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {132--139}, year = {2008}, url = {https://doi.org/10.1080/15567280802558818}, doi = {10.1080/15567280802558818}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Desoky08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/DesokyY08, author = {Abdelrahman Desoky and Mohamed F. Younis}, title = {Graphstega: Graph Steganography Methodology}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {1}, pages = {27--36}, year = {2008}, url = {https://doi.org/10.1080/15567280701797087}, doi = {10.1080/15567280701797087}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/DesokyY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Donato08, author = {Lucas Donato}, title = {An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {4}, pages = {183--195}, year = {2008}, url = {https://doi.org/10.1080/15567280903140946}, doi = {10.1080/15567280903140946}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Donato08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Ferguson08, author = {David Glen Ferguson}, title = {Redefining File Slack in Microsoft{\textregistered} {NTFS}}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {140--156}, year = {2008}, url = {https://doi.org/10.1080/15567280802587965}, doi = {10.1080/15567280802587965}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Ferguson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/HejaziDT08, author = {Seyed Mahmood Hejazi and Mourad Debbabi and Chamseddine Talhi}, title = {Automated Windows Memory File Extraction for Cyber Forensics Investigation}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {117--131}, year = {2008}, url = {https://doi.org/10.1080/15567280802552829}, doi = {10.1080/15567280802552829}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/HejaziDT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/HuebnerB08, author = {Ewa Huebner and Derek Bem}, title = {Forensic Extraction of EFS-Encrypted Files in Live System Investigation}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {1}, pages = {1--12}, year = {2008}, url = {https://doi.org/10.1080/15567280701721905}, doi = {10.1080/15567280701721905}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/HuebnerB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Inch08, author = {Scott Inch}, title = {A Simple Image Hiding Technique: What You May Be Missing}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {2}, pages = {83--94}, year = {2008}, url = {https://doi.org/10.1080/15567280802047150}, doi = {10.1080/15567280802047150}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Inch08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kaplan08, author = {Ronald E. Kaplan}, title = {Computer Forensics - What Is It Good For?}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {2}, pages = {57--61}, year = {2008}, url = {https://doi.org/10.1080/15567280801958464}, doi = {10.1080/15567280801958464}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kaplan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kessler08, author = {Gary C. Kessler}, title = {On Teaching {TCP/IP} Protocol Analysis to Computer Forensics Examiners}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {1}, pages = {43--53}, year = {2008}, url = {https://doi.org/10.1080/15567280701805690}, doi = {10.1080/15567280701805690}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kessler08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kornblum08, author = {Jesse D. Kornblum}, title = {Auditing Hash Sets: Lessons Learned from \emph{Jurassic Park}}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {108--112}, year = {2008}, url = {https://doi.org/10.1080/15567280802385477}, doi = {10.1080/15567280802385477}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kornblum08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Liles08, author = {Samuel Liles}, title = {Software Forensics. By Robert Slade}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {159--160}, year = {2008}, url = {https://doi.org/10.1080/15567280802385493}, doi = {10.1080/15567280802385493}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Liles08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Limongelli08, author = {Victor Limongelli}, title = {Digital Evidence: Findings of Reliability, Not Presumptions}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {1}, pages = {13--16}, year = {2008}, url = {https://doi.org/10.1080/15567280701721913}, doi = {10.1080/15567280701721913}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Limongelli08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/LiuAD08, author = {Wayne Liu and Sudhir Aggarwal and Zhenhai Duan}, title = {Incorporating Accountability into Internet E-mail}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {4}, pages = {209--220}, year = {2008}, url = {https://doi.org/10.1080/15567280903140961}, doi = {10.1080/15567280903140961}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/LiuAD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/ManesJBHDH08, author = {Gavin Wylie Manes and James Johnson and Alex Barclay and Michael Harvey and Elizabeth Downing and John Hale}, title = {Issues and Techniques for Redacting {PDF} Files}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {113--116}, year = {2008}, url = {https://doi.org/10.1080/15567280802385485}, doi = {10.1080/15567280802385485}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/ManesJBHDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Matusitz08, author = {Jonathan Matusitz}, title = {Postmodernism and Networks of Cyberterrorists}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {1}, pages = {17--26}, year = {2008}, url = {https://doi.org/10.1080/15567280701723901}, doi = {10.1080/15567280701723901}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Matusitz08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/MatusitzM08, author = {Jonathan Matusitz and Elizabeth Minei}, title = {Cyberterrorism: Its Effects on Health-Related Infrastructures}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {4}, pages = {161--171}, year = {2008}, url = {https://doi.org/10.1080/15567280802678657}, doi = {10.1080/15567280802678657}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/MatusitzM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt08, author = {Mark Pollitt}, title = {Digital Orange Juice}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {1}, pages = {54--56}, year = {2008}, url = {https://doi.org/10.1080/15567280701721921}, doi = {10.1080/15567280701721921}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt08a, author = {Mark Pollitt}, title = {Blue Skies and Storm Clouds}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {2}, pages = {105--106}, year = {2008}, url = {https://doi.org/10.1080/15567280802047168}, doi = {10.1080/15567280802047168}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt08b, author = {Mark Pollitt}, title = {Managing Expectations}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {3}, pages = {157--158}, year = {2008}, url = {https://doi.org/10.1080/15567280802409574}, doi = {10.1080/15567280802409574}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt08c, author = {Mark Pollitt}, title = {The Good, the Bad, the Unaddressed}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {4}, pages = {172--174}, year = {2008}, url = {https://doi.org/10.1080/15567280902882852}, doi = {10.1080/15567280902882852}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/PollittNHDCBMB08, author = {Mark Pollitt and Kara L. Nance and Brian Hay and Ronald C. Dodge and Philip Craiger and Paul Burke and Christopher Marberry and Bryan Brubaker}, title = {Virtualization and Digital Forensics: {A} Research and Education Agenda}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {2}, pages = {62--73}, year = {2008}, url = {https://doi.org/10.1080/15567280802047135}, doi = {10.1080/15567280802047135}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/PollittNHDCBMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Riley08, author = {John H. Riley Jr.}, title = {Windows Directory Entries for 8.3 Names in {VFAT} File Systems}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {1}, pages = {37--42}, year = {2008}, url = {https://doi.org/10.1080/15567280701881915}, doi = {10.1080/15567280701881915}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Riley08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/RileyDV08, author = {Jack Wesley Riley and David A. Dampier and Rayford B. Vaughn}, title = {A Comparison of Forensic Hard Drive Imagers: {A} Time Analysis Comparison Between the {ICS} Image MASSter-Solo {III} and the Logicube Talon}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {2}, pages = {74--82}, year = {2008}, url = {https://doi.org/10.1080/15567280802047143}, doi = {10.1080/15567280802047143}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/RileyDV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/UriasHL08, author = {Vincent Urias and Curtis Hash and Lorie M. Liebrock}, title = {Consideration of Issues for Parallel Digital Forensics of {RAID} Systems}, journal = {J. Digit. Forensic Pract.}, volume = {2}, number = {4}, pages = {196--208}, year = {2008}, url = {https://doi.org/10.1080/15567280903140953}, doi = {10.1080/15567280903140953}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/UriasHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BeebeK06, author = {Nicole Beebe and Gary C. Kessler}, title = {A Review of: "\emph{Real Digital Forensics: Computer Security and Incident Response}. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose"}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {325--326}, year = {2006}, url = {https://doi.org/10.1080/15567280701417967}, doi = {10.1080/15567280701417967}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BeebeK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Bosschert06, author = {Thijs Bosschert}, title = {Battling Anti-Forensics: Beating the {U3} Stick}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {265--273}, year = {2006}, url = {https://doi.org/10.1080/15567280701417975}, doi = {10.1080/15567280701417975}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Bosschert06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BreedenCCSHMSW06, author = {Bob Breeden and Mike Cantey and Brett Cureton and Clifford Stokes and Peter Henry and Judie Mulholland and Wayne Sprague and Jim Watson}, title = {The Phlorida Autopsy Report}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {203--222}, year = {2006}, url = {https://doi.org/10.1080/15567280601142053}, doi = {10.1080/15567280601142053}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BreedenCCSHMSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BrillPW06, author = {Alan E. Brill and Mark Pollitt and Carrie Morgan Whitcomb}, title = {The Evolution of Computer Forensic Best Practices: An Update on Programs and Publications}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {3--11}, year = {2006}, url = {https://doi.org/10.1080/15567280500541488}, doi = {10.1080/15567280500541488}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BrillPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BurkeC06, author = {Paul Burke and Philip Craiger}, title = {Xbox Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {275--282}, year = {2006}, url = {https://doi.org/10.1080/15567280701417991}, doi = {10.1080/15567280701417991}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BurkeC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/BuskirkL06, author = {Eric Van Buskirk and Vincent T. Liu}, title = {Digital Evidence: Challenging the Presumption of Reliability}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {19--26}, year = {2006}, url = {https://doi.org/10.1080/15567280500541421}, doi = {10.1080/15567280500541421}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/BuskirkL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Cain06, author = {Patrick Cain}, title = {Using {XML} to Support Robust Information Sharing: An {IODEF} Automated Approach}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {77--82}, year = {2006}, url = {https://doi.org/10.1080/15567280600995451}, doi = {10.1080/15567280600995451}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Cain06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Cassidy06, author = {Peter Cassidy}, title = {Statement of Support Anti-Phishing Working Group {(APWG)}}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {75--76}, year = {2006}, url = {https://doi.org/10.1080/15567280601047476}, doi = {10.1080/15567280601047476}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Cassidy06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/ChenH06, author = {Thomas Chen and Peter Henry}, title = {A Review of: "\emph{Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft}. By Markus Jakobsson and Steven Myers, Editors"}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {147--149}, year = {2006}, url = {https://doi.org/10.1080/15567280601044580}, doi = {10.1080/15567280601044580}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/ChenH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/CraigerBM06, author = {J. Philip Craiger and Paul Burke and Christopher Marberry}, title = {Open Source Tools for Phishing Investigations}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {223--229}, year = {2006}, url = {https://doi.org/10.1080/15567280601142129}, doi = {10.1080/15567280601142129}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/CraigerBM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Emigh06, author = {Aaron Emigh}, title = {The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {245--260}, year = {2006}, url = {https://doi.org/10.1080/15567280601049985}, doi = {10.1080/15567280601049985}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Emigh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/FuDW06, author = {Anthony Y. Fu and Xiaotie Deng and Liu Wenyin}, title = {{REGAP:} {A} Tool for Unicode-Based Web Identity Fraud Detection}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {83--97}, year = {2006}, url = {https://doi.org/10.1080/15567280600995501}, doi = {10.1080/15567280600995501}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/FuDW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GandhiJR06, author = {Mona Gandhi and Markus Jakobsson and Jacob Ratkiewicz}, title = {Badvertisements: Stealthy Click-Fraud with Unwitting Accessories}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {131--142}, year = {2006}, url = {https://doi.org/10.1080/15567280601015598}, doi = {10.1080/15567280601015598}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GandhiJR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Grant06, author = {Susan Grant}, title = {The National Consumers League's Call for Action}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {99--101}, year = {2006}, url = {https://doi.org/10.1080/15567280600995675}, doi = {10.1080/15567280600995675}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Grant06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Henry06, author = {Peter Henry}, title = {A Review of: "\emph{Phishing Exposed: Uncover Secrets from the Dark Side}. By Lance James \emph{Phishing: Cutting the Identity Theft Line}. By Rachel Lininger and Russell Dean Uines"}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {261--262}, year = {2006}, url = {https://doi.org/10.1080/15567280601047492}, doi = {10.1080/15567280601047492}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Henry06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Hosmer06, author = {Chet Hosmer}, title = {Discovering Hidden Evidence}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {47--56}, year = {2006}, url = {https://doi.org/10.1080/15567280500541447}, doi = {10.1080/15567280500541447}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Hosmer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Insa06, author = {Fredesvinda Insa}, title = {The Admissibility of Electronic Evidence in Court {(A.E.E.C.):} Fighting against High-Tech Crime - Results of a European Study}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {285--289}, year = {2006}, url = {https://doi.org/10.1080/15567280701418049}, doi = {10.1080/15567280701418049}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Insa06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Johnson06, author = {Victor A. Johnson}, title = {Phishing Tripz}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {153--155}, year = {2006}, url = {https://doi.org/10.1080/15567280600995717}, doi = {10.1080/15567280600995717}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Johnson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kenneally06, author = {Erin Kenneally}, title = {Enabling the Enablers: An Identity Fraud Solution for Law Enforcement}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {157--164}, year = {2006}, url = {https://doi.org/10.1080/15567280600995758}, doi = {10.1080/15567280600995758}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kenneally06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Kerivan06, author = {John E. Kerivan}, title = {Heuristic Security-Testing Methods}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {27--36}, year = {2006}, url = {https://doi.org/10.1080/15567280500541439}, doi = {10.1080/15567280500541439}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Kerivan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/KsanderGR06, author = {Scott L. Ksander and William Blair Gillam and Marcus K. Rogers}, title = {Ultrablock Forensic Card Reader}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {69--70}, year = {2006}, url = {https://doi.org/10.1080/15567280500541413}, doi = {10.1080/15567280500541413}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/KsanderGR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/LosavioAR06, author = {Michael Losavio and Julia Adams and Marc Rogers}, title = {Gap Analysis: Judicial Experience and Perception of Electronic Evidence}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {13--17}, year = {2006}, url = {https://doi.org/10.1080/15567280500541462}, doi = {10.1080/15567280500541462}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/LosavioAR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/LosavioWE06, author = {Michael Losavio and Deborah Wilson and Adel Elmaghraby}, title = {Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {291--296}, year = {2006}, url = {https://doi.org/10.1080/15567280701418080}, doi = {10.1080/15567280701418080}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/LosavioWE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/LydaH06, author = {Robert Lyda and James Hamrock}, title = {Exploring Investigative Methods for Identifying and Profiling Serial Bots}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {165--177}, year = {2006}, url = {https://doi.org/10.1080/15567280600995782}, doi = {10.1080/15567280600995782}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/LydaH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/MarberryC06, author = {Christopher Marberry and Philip Craiger}, title = {{CD-R} Acquisition Hashes Affected by Write Options}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {297--307}, year = {2006}, url = {https://doi.org/10.1080/15567280701418098}, doi = {10.1080/15567280701418098}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/MarberryC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/McRaeMV06, author = {Craig M. McRae and Robert Wesley McGrew and Rayford B. Vaughn}, title = {Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {193--199}, year = {2006}, url = {https://doi.org/10.1080/15567280600995857}, doi = {10.1080/15567280600995857}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/McRaeMV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Mulholland06, author = {Judie Mulholland}, title = {Message from the Guest Editor}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {73--74}, year = {2006}, url = {https://doi.org/10.1080/15567280601050173}, doi = {10.1080/15567280601050173}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Mulholland06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Mulholland06a, author = {Judie Mulholland}, title = {Message from the Guest Editor}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {151--152}, year = {2006}, url = {https://doi.org/10.1080/15567280601144430}, doi = {10.1080/15567280601144430}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Mulholland06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Nelson06, author = {Anthony Nelson}, title = {{ISO} 27001 as a Support to Digital Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {43--46}, year = {2006}, url = {https://doi.org/10.1080/15567280500541405}, doi = {10.1080/15567280500541405}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Nelson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Orebaugh06, author = {Angela Orebaugh}, title = {Proactive Forensics}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {37--41}, year = {2006}, url = {https://doi.org/10.1080/15567280600626411}, doi = {10.1080/15567280600626411}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Orebaugh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt06, author = {Mark Pollitt}, title = {Exploration}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {67--68}, year = {2006}, url = {https://doi.org/10.1080/15567280600631940}, doi = {10.1080/15567280600631940}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Pollitt06a, author = {Mark Pollitt}, title = {Byte/Counterbyte}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {283--284}, year = {2006}, url = {https://doi.org/10.1080/15567280701418015}, doi = {10.1080/15567280701418015}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Pollitt06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Quarterman06, author = {John S. Quarterman}, title = {PhishScope: Tracking Phish Server Clusters}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {103--114}, year = {2006}, url = {https://doi.org/10.1080/15567280600995808}, doi = {10.1080/15567280600995808}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Quarterman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Radvanovsky06, author = {Bob Radvanovsky}, title = {Analyzing Spoofed E-mail Headers}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {231--243}, year = {2006}, url = {https://doi.org/10.1080/15567280601142178}, doi = {10.1080/15567280601142178}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Radvanovsky06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Ren06, author = {Wei Ren}, title = {Modeling Network Forensics Behavior}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {57--65}, year = {2006}, url = {https://doi.org/10.1080/15567280600631932}, doi = {10.1080/15567280600631932}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Ren06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Smith06, author = {Aaron Smith}, title = {Describing and Categorizing Disk-Avoiding Anti-Forensics Tools}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {309--313}, year = {2006}, url = {https://doi.org/10.1080/15567280701418155}, doi = {10.1080/15567280701418155}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Smith06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Sprague06, author = {Wayne E. Sprague}, title = {Uncharted Waters: Prosecuting Phishing and Online Fraud Cases}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {143--146}, year = {2006}, url = {https://doi.org/10.1080/15567280601044564}, doi = {10.1080/15567280601044564}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Sprague06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Stephenson06, author = {Peter Stephenson}, title = {Trends}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {1}, pages = {1--2}, year = {2006}, url = {https://doi.org/10.1080/15567280500541496}, doi = {10.1080/15567280500541496}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Stephenson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/TallySCCJOR06, author = {Gregg Tally and David Sames and Thomas Chen and Chris Colleran and David Jevans and Kevin Omiliak and Rod Rasmussen}, title = {The Phisherman Project: Creating a Comprehensive Data Collection to Combat Phishing Attacks}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {115--129}, year = {2006}, url = {https://doi.org/10.1080/15567280601015564}, doi = {10.1080/15567280601015564}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/TallySCCJOR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/TsowJYW06, author = {Alex Tsow and Markus Jakobsson and Liu Yang and Susanne Wetzel}, title = {Warkitting: The Drive-by Subversion of Wireless Home Routers}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {179--192}, year = {2006}, url = {https://doi.org/10.1080/15567280600995832}, doi = {10.1080/15567280600995832}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/TsowJYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/Vidas06, author = {Timothy M. Vidas}, title = {The Acquisition and Analysis of Random Access Memory}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {4}, pages = {315--323}, year = {2006}, url = {https://doi.org/10.1080/15567280701418171}, doi = {10.1080/15567280701418171}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/Vidas06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.