default search action
Search dblp for Publications
export results for "toc:db/journals/ijde/ijde6.bht:"
@article{DBLP:journals/ijde/BaggiliMR07, author = {Ibrahim M. Baggili and Richard Mislan and Marcus K. Rogers}, title = {Mobile Phone Forensics Tool Testing: {A} Database Driven Approach}, journal = {Int. J. Digit. EVid.}, volume = {6}, number = {2}, year = {2007}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/1C33DF76-D8D3-EFF5-47AE3681FD948D68.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/BaggiliMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/BemH07, author = {Derek Bem and Ewa Huebner}, title = {Computer Forensic Analysis in a Virtual Environment}, journal = {Int. J. Digit. EVid.}, volume = {6}, number = {2}, year = {2007}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/1C349F35-C73B-DB8A-926F9F46623A1842.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/BemH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/DemirJK07, author = {Omer Demir and Ping Ji and Jinwoo Kim}, title = {Session Based Packet Marking and Auditing for Network Forensics}, journal = {Int. J. Digit. EVid.}, volume = {6}, number = {1}, year = {2007}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/B411D502-9B94-5CA2-25AC6D5665C94E85.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/DemirJK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/FrantzeskouSGCH07, author = {Georgia Frantzeskou and Efstathios Stamatatos and Stefanos Gritzalis and Carole E. Chaski and Blake Stephen Howald}, title = {Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile {(SCAP)} Method}, journal = {Int. J. Digit. EVid.}, volume = {6}, number = {1}, year = {2007}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/B41158D1-C829-0387-009D214D2170C321.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/FrantzeskouSGCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/GladyshevE07, author = {Pavel Gladyshev and Andreas Enbacka}, title = {Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the {B} Method}, journal = {Int. J. Digit. EVid.}, volume = {6}, number = {2}, year = {2007}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/1C35450B-E896-6876-9E80DA0F9FEEF98B.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/GladyshevE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/KileySR07, author = {Matthew Kiley and Tim Shinbara and Marcus K. Rogers}, title = {iPOD Forensics Update}, journal = {Int. J. Digit. EVid.}, volume = {6}, number = {1}, year = {2007}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/B40DD0EA-D340-962F-F98B868F3C69129F.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/KileySR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.