Search dblp for Publications

export results for "toc:db/journals/jdfsl/jdfsl12.bht:"

 download as .bib file

@article{DBLP:journals/jdfsl/AfanasievaK17,
  author       = {Svetlana Afanasieva and
                  Irina Kilina},
  title        = {Use of House Arrest In The Context of the Respecting the Constitutional
                  Rights of an Individual in Russia},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {103--112},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1496},
  doi          = {10.15394/JDFSL.2017.1496},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AfanasievaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AkatyevJ17,
  author       = {Nikolay Akatyev and
                  Joshua James},
  title        = {Legislative Requirements for Cyber Peacekeeping},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {23--38},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1447},
  doi          = {10.15394/JDFSL.2017.1447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AkatyevJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/AtkisonW17,
  author       = {Travis Atkison and
                  Nathan Wallace},
  title        = {A Power Grid Incident Identification Based on Physically Derived Cyber-Event
                  Detection},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {5--18},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1480},
  doi          = {10.15394/JDFSL.2017.1480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/AtkisonW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Barrett17,
  author       = {Diane Barrett},
  title        = {Applying a Contingency Framework to Digital Forensic Processes in
                  Cloud Based Acquisitions},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {75--96},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1473},
  doi          = {10.15394/JDFSL.2017.1473},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Barrett17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Borisevich17,
  author       = {Galina Borisevich},
  title        = {Providing for the Safety of the Participants of the Criminal Court
                  Proceedings - The Subject of Cconcern of Russian Legislator, Government,
                  Scientists and Practicians},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {95--102},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1494},
  doi          = {10.15394/JDFSL.2017.1494},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Borisevich17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/DiezZC17,
  author       = {Isabel de la Torre D{\'{\i}}ez and
                  Bego{\~{n}}a Garc{\'{\i}}a Zapirain and
                  Miguel L{\'{o}}pez Coronado},
  title        = {Analysis of Security in Big Data Related to Healthcare},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {39--46},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1448},
  doi          = {10.15394/JDFSL.2017.1448},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/DiezZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Dogan17,
  author       = {Seng{\"{u}}l Dogan},
  title        = {A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {87--100},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1456},
  doi          = {10.15394/JDFSL.2017.1456},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Dogan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Fowler17,
  author       = {James E. Fowler},
  title        = {Compression of Virtual-Machine Memory in Dynamic Malware Analysis},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {41--46},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1437},
  doi          = {10.15394/JDFSL.2017.1437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Fowler17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/HornerH17,
  author       = {Matthew Horner and
                  Thomas Hyslip},
  title        = {{SQL} Injection: The Longest Running Sequel in Programming History},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {97--108},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1475},
  doi          = {10.15394/JDFSL.2017.1475},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/HornerH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KarampidisP17,
  author       = {Konstantinos Karampidis and
                  Giorgos Papadourakis},
  title        = {File Type Identification - Computational Intelligence for Digital
                  Forensics},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {19--32},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1472},
  doi          = {10.15394/JDFSL.2017.1472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KarampidisP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KarieK17,
  author       = {Nickson M. Karie and
                  Simon M. Karume},
  title        = {Digital Forensic Readiness in Organizations: Issues and Challenges},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {43--54},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1436},
  doi          = {10.15394/JDFSL.2017.1436},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KarieK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KeelingL17,
  author       = {Deborah W. Keeling and
                  Michael Losavio},
  title        = {Public Security {\&} Digital Forensics in the United States: The
                  Continued Need for Expanded Digital Systems for Security},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {47--60},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1452},
  doi          = {10.15394/JDFSL.2017.1452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KeelingL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KuznetsovaB17,
  author       = {Olga Kuznetsova and
                  Natalia Pavlovna Bondarenko},
  title        = {Private Life Safety Provision in Digital Age},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {77--86},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1460},
  doi          = {10.15394/JDFSL.2017.1460},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KuznetsovaB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/LosavioE17,
  author       = {Michael Losavio and
                  Adel Elmaghraby},
  title        = {Security and the Transnational Information Polity},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {67--76},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1458},
  doi          = {10.15394/JDFSL.2017.1458},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/LosavioE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/Minor17,
  author       = {John B. Minor},
  title        = {Forensic Cell Site Analysis: {A} Validation {\&} Error Mitigation
                  Methodology},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {33--52},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1474},
  doi          = {10.15394/JDFSL.2017.1474},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/Minor17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/MooreBB17,
  author       = {Jason Moore and
                  Ibrahim M. Baggili and
                  Frank Breitinger},
  title        = {Find Me If You Can: Mobile {GPS} Mapping Applications Forensic Analysis
                  {\&} {SNAVP} the Open Source, Modular, Extensible Parser},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {15--30},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1414},
  doi          = {10.15394/JDFSL.2017.1414},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/MooreBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ParkJJ17,
  author       = {Sungmi Park and
                  Yunsik Jang and
                  Joshua James},
  title        = {Possession of Child Exploitation Material in Computer Temporary Internet
                  Cache},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {7--22},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1446},
  doi          = {10.15394/JDFSL.2017.1446},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ParkJJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ParkPKCJ17,
  author       = {Kyoung Park and
                  Jung{-}Min Park and
                  Eun{-}Jin Kim and
                  Chang Cheon and
                  Joshua James},
  title        = {Anti-Forensic Trace Detection in Digital Forensic Triage Investigations},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {31--40},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1421},
  doi          = {10.15394/JDFSL.2017.1421},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ParkPKCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/PastukhovPF17,
  author       = {Pavel Pastukhov and
                  Svetlana Polyakova and
                  Evelina Frolovich},
  title        = {The Use of Information Technologies to Combat Counterfeit Alcohol
                  Products and Ensure the Right to Life in Russia},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {87--94},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1461},
  doi          = {10.15394/JDFSL.2017.1461},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/PastukhovPF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/RN17,
  author       = {Chetan K. R and
                  Shivananda Nirmala},
  title        = {Multiple Content Adaptive Intelligent Watermarking Schemes for the
                  Protection of Blocks of a Document Image},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {5--28},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1407},
  doi          = {10.15394/JDFSL.2017.1407},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/RN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SchatzBW17,
  author       = {Daniel Schatz and
                  Rabih Bashroush and
                  Julie A. Wall},
  title        = {Towards a More Representative Definition of Cyber Security},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {53--74},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1476},
  doi          = {10.15394/JDFSL.2017.1476},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SchatzBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ShahSZ17,
  author       = {Makhdoom Shah and
                  Shahzad Saleem and
                  Roha Zulqarnain},
  title        = {Protecting Digital Evidence Integrity and Preserving Chain of Custody},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {121--130},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1478},
  doi          = {10.15394/JDFSL.2017.1478},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ShahSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/StadlingerD17,
  author       = {Johannes Stadlinger and
                  Andreas Dewald},
  title        = {A Forensic Email Analysis Tool Using Dynamic Visualization},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {7--14},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1413},
  doi          = {10.15394/JDFSL.2017.1413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/StadlingerD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SudozaiHSK17,
  author       = {M. A. K. Sudozai and
                  Nisar Habib and
                  Shahzad Saleem and
                  A. A. Khan},
  title        = {Signatures of Viber Security Traffic},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {2},
  pages        = {109--120},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1477},
  doi          = {10.15394/JDFSL.2017.1477},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SudozaiHSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SyatchikhinGS17,
  author       = {Alexander Syatchikhin and
                  Valery Golubtsov and
                  Natalia Syropiatova},
  title        = {Contractual Responsibility for the Disclosure of Bank Secrets},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {3},
  pages        = {61--66},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1454},
  doi          = {10.15394/JDFSL.2017.1454},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SyatchikhinGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SzewczykM17,
  author       = {Patryk Szewczyk and
                  Rose Macdonald},
  title        = {Broadband Router Security: History, Challenges and Future Implications},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {55--74},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1444},
  doi          = {10.15394/JDFSL.2017.1444},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SzewczykM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TeagueB17,
  author       = {Ryne Teague and
                  Michael Black},
  title        = {Evidence Verification Complications with Solid-State Drives},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {75--86},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1445},
  doi          = {10.15394/JDFSL.2017.1445},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TeagueB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/ThroughC17,
  author       = {Joan Through and
                  Gary Cantrell},
  title        = {Varying Instructional Approaches to Physical Extraction of Mobile
                  Device Memory},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {4},
  pages        = {29--42},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1420},
  doi          = {10.15394/JDFSL.2017.1420},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/ThroughC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/TobinLK17,
  author       = {Patrick Tobin and
                  Nhien{-}An Le{-}Khac and
                  M. Tahar Kechadi},
  title        = {Forensic Analysis of Virtual Hard Drives},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {12},
  number       = {1},
  pages        = {47--58},
  year         = {2017},
  url          = {https://doi.org/10.15394/jdfsl.2017.1438},
  doi          = {10.15394/JDFSL.2017.1438},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/TobinLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics