share record
persistent URL:
Samuel Liles : Software Forensics. By Robert Slade. J. Digit. Forensic Pract. 2 (3 ) : 159-160 (2008 )export record
dblp key:
journals/jdfp/Limongelli08 share record
persistent URL:
Victor Limongelli : Digital Evidence: Findings of Reliability, Not Presumptions. J. Digit. Forensic Pract. 2 (1 ) : 13-16 (2008 )share record
persistent URL:
Wayne Liu , Sudhir Aggarwal , Zhenhai Duan : Incorporating Accountability into Internet E-mail. J. Digit. Forensic Pract. 2 (4 ) : 209-220 (2008 )export record
dblp key:
journals/jdfp/ManesJBHDH08 share record
persistent URL:
Gavin Wylie Manes , James Johnson , Alex Barclay , Michael Harvey , Elizabeth Downing , John Hale : Issues and Techniques for Redacting PDF Files. J. Digit. Forensic Pract. 2 (3 ) : 113-116 (2008 )share record
persistent URL:
Jonathan Matusitz : Postmodernism and Networks of Cyberterrorists. J. Digit. Forensic Pract. 2 (1 ) : 17-26 (2008 )export record
dblp key:
journals/jdfp/MatusitzM08 share record
persistent URL:
Jonathan Matusitz , Elizabeth Minei : Cyberterrorism: Its Effects on Health-Related Infrastructures. J. Digit. Forensic Pract. 2 (4 ) : 161-171 (2008 )share record
persistent URL:
Mark Pollitt : Digital Orange Juice. J. Digit. Forensic Pract. 2 (1 ) : 54-56 (2008 )share record
persistent URL:
Mark Pollitt : Blue Skies and Storm Clouds. J. Digit. Forensic Pract. 2 (2 ) : 105-106 (2008 )share record
persistent URL:
Mark Pollitt : Managing Expectations. J. Digit. Forensic Pract. 2 (3 ) : 157-158 (2008 )share record
persistent URL:
Mark Pollitt : The Good, the Bad, the Unaddressed. J. Digit. Forensic Pract. 2 (4 ) : 172-174 (2008 )export record
dblp key:
journals/jdfp/PollittNHDCBMB08 share record
persistent URL:
Mark Pollitt , Kara L. Nance , Brian Hay , Ronald C. Dodge , Philip Craiger , Paul Burke , Christopher Marberry , Bryan Brubaker : Virtualization and Digital Forensics: A Research and Education Agenda. J. Digit. Forensic Pract. 2 (2 ) : 62-73 (2008 )share record
persistent URL:
John H. Riley Jr. : Windows Directory Entries for 8.3 Names in VFAT File Systems. J. Digit. Forensic Pract. 2 (1 ) : 37-42 (2008 )share record
persistent URL:
Jack Wesley Riley , David A. Dampier , Rayford B. Vaughn : A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon. J. Digit. Forensic Pract. 2 (2 ) : 74-82 (2008 )share record
persistent URL:
Vincent Urias , Curtis Hash , Lorie M. Liebrock : Consideration of Issues for Parallel Digital Forensics of RAID Systems. J. Digit. Forensic Pract. 2 (4 ) : 196-208 (2008 )2006 share record
persistent URL:
Nicole Beebe , Gary C. Kessler : A Review of: "Real Digital Forensics: Computer Security and Incident Response . By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose". J. Digit. Forensic Pract. 1 (4 ) : 325-326 (2006 )export record
dblp key:
journals/jdfp/Bosschert06 share record
persistent URL:
Thijs Bosschert : Battling Anti-Forensics: Beating the U3 Stick. J. Digit. Forensic Pract. 1 (4 ) : 265-273 (2006 )export record
dblp key:
journals/jdfp/BreedenCCSHMSW06 share record
persistent URL:
Bob Breeden , Mike Cantey , Brett Cureton , Clifford Stokes , Peter Henry , Judie Mulholland , Wayne Sprague , Jim Watson : The Phlorida Autopsy Report. J. Digit. Forensic Pract. 1 (3 ) : 203-222 (2006 )share record
persistent URL:
Alan E. Brill , Mark Pollitt , Carrie Morgan Whitcomb : The Evolution of Computer Forensic Best Practices: An Update on Programs and Publications. J. Digit. Forensic Pract. 1 (1 ) : 3-11 (2006 )share record
persistent URL:
Paul Burke , Philip Craiger : Xbox Forensics. J. Digit. Forensic Pract. 1 (4 ) : 275-282 (2006 )share record
persistent URL:
Eric Van Buskirk , Vincent T. Liu : Digital Evidence: Challenging the Presumption of Reliability. J. Digit. Forensic Pract. 1 (1 ) : 19-26 (2006 )share record
persistent URL:
Patrick Cain : Using XML to Support Robust Information Sharing: An IODEF Automated Approach. J. Digit. Forensic Pract. 1 (2 ) : 77-82 (2006 )share record
persistent URL:
Peter Cassidy : Statement of Support Anti-Phishing Working Group (APWG). J. Digit. Forensic Pract. 1 (2 ) : 75-76 (2006 )share record
persistent URL:
Thomas Chen , Peter Henry : A Review of: "Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft . By Markus Jakobsson and Steven Myers, Editors". J. Digit. Forensic Pract. 1 (2 ) : 147-149 (2006 )export record
dblp key:
journals/jdfp/CraigerBM06 share record
persistent URL:
J. Philip Craiger , Paul Burke , Christopher Marberry : Open Source Tools for Phishing Investigations. J. Digit. Forensic Pract. 1 (3 ) : 223-229 (2006 )share record
persistent URL:
Aaron Emigh : The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond. J. Digit. Forensic Pract. 1 (3 ) : 245-260 (2006 )share record
persistent URL:
Anthony Y. Fu , Xiaotie Deng , Liu Wenyin : REGAP: A Tool for Unicode-Based Web Identity Fraud Detection. J. Digit. Forensic Pract. 1 (2 ) : 83-97 (2006 )share record
persistent URL:
Mona Gandhi , Markus Jakobsson , Jacob Ratkiewicz : Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. J. Digit. Forensic Pract. 1 (2 ) : 131-142 (2006 )share record
persistent URL:
Susan Grant : The National Consumers League's Call for Action. J. Digit. Forensic Pract. 1 (2 ) : 99-101 (2006 )share record
persistent URL:
Peter Henry : A Review of: "Phishing Exposed: Uncover Secrets from the Dark Side . By Lance James Phishing: Cutting the Identity Theft Line . By Rachel Lininger and Russell Dean Uines". J. Digit. Forensic Pract. 1 (3 ) : 261-262 (2006 )share record
persistent URL:
Chet Hosmer : Discovering Hidden Evidence. J. Digit. Forensic Pract. 1 (1 ) : 47-56 (2006 )