Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jdfsl/jdfsl12.bht:"
@article{DBLP:journals/jdfsl/AfanasievaK17, author = {Svetlana Afanasieva and Irina Kilina}, title = {Use of House Arrest In The Context of the Respecting the Constitutional Rights of an Individual in Russia}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {103--112}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1496}, doi = {10.15394/JDFSL.2017.1496}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AfanasievaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AkatyevJ17, author = {Nikolay Akatyev and Joshua James}, title = {Legislative Requirements for Cyber Peacekeeping}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {23--38}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1447}, doi = {10.15394/JDFSL.2017.1447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AkatyevJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/AtkisonW17, author = {Travis Atkison and Nathan Wallace}, title = {A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {5--18}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1480}, doi = {10.15394/JDFSL.2017.1480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/AtkisonW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Barrett17, author = {Diane Barrett}, title = {Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {75--96}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1473}, doi = {10.15394/JDFSL.2017.1473}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Barrett17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Borisevich17, author = {Galina Borisevich}, title = {Providing for the Safety of the Participants of the Criminal Court Proceedings - The Subject of Cconcern of Russian Legislator, Government, Scientists and Practicians}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {95--102}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1494}, doi = {10.15394/JDFSL.2017.1494}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Borisevich17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/DiezZC17, author = {Isabel de la Torre D{\'{\i}}ez and Bego{\~{n}}a Garc{\'{\i}}a Zapirain and Miguel L{\'{o}}pez Coronado}, title = {Analysis of Security in Big Data Related to Healthcare}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {39--46}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1448}, doi = {10.15394/JDFSL.2017.1448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/DiezZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Dogan17, author = {Seng{\"{u}}l Dogan}, title = {A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {87--100}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1456}, doi = {10.15394/JDFSL.2017.1456}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Dogan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Fowler17, author = {James E. Fowler}, title = {Compression of Virtual-Machine Memory in Dynamic Malware Analysis}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {41--46}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1437}, doi = {10.15394/JDFSL.2017.1437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Fowler17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/HornerH17, author = {Matthew Horner and Thomas Hyslip}, title = {{SQL} Injection: The Longest Running Sequel in Programming History}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {97--108}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1475}, doi = {10.15394/JDFSL.2017.1475}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/HornerH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KarampidisP17, author = {Konstantinos Karampidis and Giorgos Papadourakis}, title = {File Type Identification - Computational Intelligence for Digital Forensics}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {19--32}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1472}, doi = {10.15394/JDFSL.2017.1472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KarampidisP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KarieK17, author = {Nickson M. Karie and Simon M. Karume}, title = {Digital Forensic Readiness in Organizations: Issues and Challenges}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {43--54}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1436}, doi = {10.15394/JDFSL.2017.1436}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KarieK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KeelingL17, author = {Deborah W. Keeling and Michael Losavio}, title = {Public Security {\&} Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {47--60}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1452}, doi = {10.15394/JDFSL.2017.1452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KeelingL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KuznetsovaB17, author = {Olga Kuznetsova and Natalia Pavlovna Bondarenko}, title = {Private Life Safety Provision in Digital Age}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {77--86}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1460}, doi = {10.15394/JDFSL.2017.1460}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KuznetsovaB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/LosavioE17, author = {Michael Losavio and Adel Elmaghraby}, title = {Security and the Transnational Information Polity}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {67--76}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1458}, doi = {10.15394/JDFSL.2017.1458}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/LosavioE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/Minor17, author = {John B. Minor}, title = {Forensic Cell Site Analysis: {A} Validation {\&} Error Mitigation Methodology}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {33--52}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1474}, doi = {10.15394/JDFSL.2017.1474}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/Minor17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/MooreBB17, author = {Jason Moore and Ibrahim M. Baggili and Frank Breitinger}, title = {Find Me If You Can: Mobile {GPS} Mapping Applications Forensic Analysis {\&} {SNAVP} the Open Source, Modular, Extensible Parser}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {15--30}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1414}, doi = {10.15394/JDFSL.2017.1414}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/MooreBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ParkJJ17, author = {Sungmi Park and Yunsik Jang and Joshua James}, title = {Possession of Child Exploitation Material in Computer Temporary Internet Cache}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {7--22}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1446}, doi = {10.15394/JDFSL.2017.1446}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ParkJJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ParkPKCJ17, author = {Kyoung Park and Jung{-}Min Park and Eun{-}Jin Kim and Chang Cheon and Joshua James}, title = {Anti-Forensic Trace Detection in Digital Forensic Triage Investigations}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {31--40}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1421}, doi = {10.15394/JDFSL.2017.1421}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ParkPKCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/PastukhovPF17, author = {Pavel Pastukhov and Svetlana Polyakova and Evelina Frolovich}, title = {The Use of Information Technologies to Combat Counterfeit Alcohol Products and Ensure the Right to Life in Russia}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {87--94}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1461}, doi = {10.15394/JDFSL.2017.1461}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/PastukhovPF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/RN17, author = {Chetan K. R and Shivananda Nirmala}, title = {Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {5--28}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1407}, doi = {10.15394/JDFSL.2017.1407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/RN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SchatzBW17, author = {Daniel Schatz and Rabih Bashroush and Julie A. Wall}, title = {Towards a More Representative Definition of Cyber Security}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {53--74}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1476}, doi = {10.15394/JDFSL.2017.1476}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SchatzBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ShahSZ17, author = {Makhdoom Shah and Shahzad Saleem and Roha Zulqarnain}, title = {Protecting Digital Evidence Integrity and Preserving Chain of Custody}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {121--130}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1478}, doi = {10.15394/JDFSL.2017.1478}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ShahSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/StadlingerD17, author = {Johannes Stadlinger and Andreas Dewald}, title = {A Forensic Email Analysis Tool Using Dynamic Visualization}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {7--14}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1413}, doi = {10.15394/JDFSL.2017.1413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/StadlingerD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SudozaiHSK17, author = {M. A. K. Sudozai and Nisar Habib and Shahzad Saleem and A. A. Khan}, title = {Signatures of Viber Security Traffic}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {2}, pages = {109--120}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1477}, doi = {10.15394/JDFSL.2017.1477}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SudozaiHSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SyatchikhinGS17, author = {Alexander Syatchikhin and Valery Golubtsov and Natalia Syropiatova}, title = {Contractual Responsibility for the Disclosure of Bank Secrets}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {3}, pages = {61--66}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1454}, doi = {10.15394/JDFSL.2017.1454}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SyatchikhinGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SzewczykM17, author = {Patryk Szewczyk and Rose Macdonald}, title = {Broadband Router Security: History, Challenges and Future Implications}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {55--74}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1444}, doi = {10.15394/JDFSL.2017.1444}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SzewczykM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TeagueB17, author = {Ryne Teague and Michael Black}, title = {Evidence Verification Complications with Solid-State Drives}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {75--86}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1445}, doi = {10.15394/JDFSL.2017.1445}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TeagueB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/ThroughC17, author = {Joan Through and Gary Cantrell}, title = {Varying Instructional Approaches to Physical Extraction of Mobile Device Memory}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {4}, pages = {29--42}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1420}, doi = {10.15394/JDFSL.2017.1420}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/ThroughC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/TobinLK17, author = {Patrick Tobin and Nhien{-}An Le{-}Khac and M. Tahar Kechadi}, title = {Forensic Analysis of Virtual Hard Drives}, journal = {J. Digit. Forensics Secur. Law}, volume = {12}, number = {1}, pages = {47--58}, year = {2017}, url = {https://doi.org/10.15394/jdfsl.2017.1438}, doi = {10.15394/JDFSL.2017.1438}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/TobinLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.