Search dblp for Publications

export results for "toc:db/journals/jdfsl/jdfsl1.bht:"

 download as .bib file

@article{DBLP:journals/jdfsl/AlbrechtAWF06,
  author       = {Chad Albrecht and
                  Conan C. Albrecht and
                  Jonathan Wareham and
                  Paul B. Fox},
  title        = {The Role of Power and Negotiation in Online Deception},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {29--48},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1012},
  doi          = {10.15394/JDFSL.2006.1012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AlbrechtAWF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BagbyR06,
  author       = {John W. Bagby and
                  John C. Ruhnka},
  title        = {Electronic Data Discovery: Integrating Due Process into Cyber Forensic
                  Practice},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {1},
  pages        = {5--24},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1000},
  doi          = {10.15394/JDFSL.2006.1000},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BagbyR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/BagbyR06a,
  author       = {John W. Bagby and
                  John C. Ruhnka},
  title        = {Development and Delivery of Coursework: The Legal/Regulatory/Policy
                  Environment of Cyberforensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {39--74},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1005},
  doi          = {10.15394/JDFSL.2006.1005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/BagbyR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JansenA06,
  author       = {Wayne A. Jansen and
                  Rick Ayers},
  title        = {Forensic Tools for Mobile Phone Subscriber Identity Modules},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {75--94},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1006},
  doi          = {10.15394/JDFSL.2006.1006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JansenA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/JonesVST06,
  author       = {Andy Jones and
                  Craig Valli and
                  Iain Sutherland and
                  Paula Thomas},
  title        = {The 2006 Analysis of Information Remaining on Disks Offered for Sale
                  on the Second Hand Market},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {23--36},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1008},
  doi          = {10.15394/JDFSL.2006.1008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/JonesVST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kearns06,
  author       = {Grover S. Kearns},
  title        = {A Curriculum for Teaching Information Technology Investigative Techniques
                  for Auditors},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {9--28},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1011},
  doi          = {10.15394/JDFSL.2006.1011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kearns06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Kessler06,
  author       = {Gary C. Kessler},
  title        = {Book Review: Digital Crime and Forensic Science in Cyberspace},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {67--70},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1014},
  doi          = {10.15394/JDFSL.2006.1014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Kessler06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KesslerS06,
  author       = {Gary C. Kessler and
                  Michael E. Schirling},
  title        = {The Design of an Undergraduate Degree Program in Computer {\&}
                  Digital Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {37--50},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1009},
  doi          = {10.15394/JDFSL.2006.1009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KesslerS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MorfittV06,
  author       = {Kim Morfitt and
                  Craig Valli},
  title        = {A Forensic Log File Extraction Tool for {ICQ} Instant Messaging Clients},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {51--64},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1010},
  doi          = {10.15394/JDFSL.2006.1010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MorfittV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RogersGMWD06,
  author       = {Marcus K. Rogers and
                  James Goldman and
                  Richard Mislan and
                  Timothy Wedge and
                  Steve Debrota},
  title        = {Computer Forensics Field Triage Process Model},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {19--38},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1004},
  doi          = {10.15394/JDFSL.2006.1004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RogersGMWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SlayS06,
  author       = {Jill Slay and
                  Fiona Schulz},
  title        = {Development of an Ontology Based Forensic Search Mechanism: Proof
                  of Concept},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {1},
  pages        = {25--44},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1002},
  doi          = {10.15394/JDFSL.2006.1002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SlayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SongLHMCC06,
  author       = {Il{-}Yeol Song and
                  Ki Jung Lee and
                  Xiaohua Hu and
                  John D. Maguire and
                  Namyoun Choi and
                  Peter P. Chen},
  title        = {Designing a Data Warehouse for Cyber Crimes},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {3},
  pages        = {5--22},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1007},
  doi          = {10.15394/JDFSL.2006.1007},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SongLHMCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Stahl06,
  author       = {Bernd Carsten Stahl},
  title        = {Is Forensic Computing a Profession? Revisiting an Old Debate in a
                  New Field},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {4},
  pages        = {49--66},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1043},
  doi          = {10.15394/JDFSL.2006.1043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Stahl06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TanriverdiHMBHH06,
  author       = {H{\"{u}}seyin Tanriverdi and
                  Jonathan Harrison and
                  Ketan S. Mesuria and
                  Joshua Bertsch and
                  Po{-}Ling Hsiao and
                  David Hendrawirawan},
  title        = {AlphaCo: {A} Teaching Case on Information Technology Audit and Security},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {1},
  pages        = {45--68},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1001},
  doi          = {10.15394/JDFSL.2006.1001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TanriverdiHMBHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/WeiserBM06,
  author       = {Mark Weiser and
                  David P. Biros and
                  Greg Mosier},
  title        = {Development of a National Repository of Digital Forensic Intelligence},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {1},
  number       = {2},
  pages        = {5--18},
  year         = {2006},
  url          = {https://doi.org/10.15394/jdfsl.2006.1003},
  doi          = {10.15394/JDFSL.2006.1003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/WeiserBM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics