Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2017
- Svetlana Afanasieva, Irina Kilina:
Use of House Arrest In The Context of the Respecting the Constitutional Rights of an Individual in Russia. J. Digit. Forensics Secur. Law 12(3): 103-112 (2017) - Nikolay Akatyev, Joshua James:
Legislative Requirements for Cyber Peacekeeping. J. Digit. Forensics Secur. Law 12(3): 23-38 (2017) - Travis Atkison, Nathan Wallace:
A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection. J. Digit. Forensics Secur. Law 12(2): 5-18 (2017) - Diane Barrett:
Applying a Contingency Framework to Digital Forensic Processes in Cloud Based Acquisitions. J. Digit. Forensics Secur. Law 12(2): 75-96 (2017) - Galina Borisevich:
Providing for the Safety of the Participants of the Criminal Court Proceedings - The Subject of Cconcern of Russian Legislator, Government, Scientists and Practicians. J. Digit. Forensics Secur. Law 12(3): 95-102 (2017) - Isabel de la Torre Díez, Begoña García Zapirain, Miguel López Coronado:
Analysis of Security in Big Data Related to Healthcare. J. Digit. Forensics Secur. Law 12(3): 39-46 (2017) - Sengül Dogan:
A Data Hiding Scheme Based on Chaotic Map and Pixel Pairs. J. Digit. Forensics Secur. Law 12(4): 87-100 (2017) - James E. Fowler:
Compression of Virtual-Machine Memory in Dynamic Malware Analysis. J. Digit. Forensics Secur. Law 12(1): 41-46 (2017) - Matthew Horner, Thomas Hyslip:
SQL Injection: The Longest Running Sequel in Programming History. J. Digit. Forensics Secur. Law 12(2): 97-108 (2017) - Konstantinos Karampidis, Giorgos Papadourakis:
File Type Identification - Computational Intelligence for Digital Forensics. J. Digit. Forensics Secur. Law 12(2): 19-32 (2017) - Nickson M. Karie, Simon M. Karume:
Digital Forensic Readiness in Organizations: Issues and Challenges. J. Digit. Forensics Secur. Law 12(4): 43-54 (2017) - Deborah W. Keeling, Michael Losavio:
Public Security & Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security. J. Digit. Forensics Secur. Law 12(3): 47-60 (2017) - Olga Kuznetsova, Natalia Pavlovna Bondarenko:
Private Life Safety Provision in Digital Age. J. Digit. Forensics Secur. Law 12(3): 77-86 (2017) - Michael Losavio, Adel Elmaghraby:
Security and the Transnational Information Polity. J. Digit. Forensics Secur. Law 12(3): 67-76 (2017) - John B. Minor:
Forensic Cell Site Analysis: A Validation & Error Mitigation Methodology. J. Digit. Forensics Secur. Law 12(2): 33-52 (2017) - Jason Moore, Ibrahim M. Baggili, Frank Breitinger:
Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. J. Digit. Forensics Secur. Law 12(1): 15-30 (2017) - Sungmi Park, Yunsik Jang, Joshua James:
Possession of Child Exploitation Material in Computer Temporary Internet Cache. J. Digit. Forensics Secur. Law 12(3): 7-22 (2017) - Kyoung Park, Jung-Min Park, Eun-Jin Kim, Chang Cheon, Joshua James:
Anti-Forensic Trace Detection in Digital Forensic Triage Investigations. J. Digit. Forensics Secur. Law 12(1): 31-40 (2017) - Pavel Pastukhov, Svetlana Polyakova, Evelina Frolovich:
The Use of Information Technologies to Combat Counterfeit Alcohol Products and Ensure the Right to Life in Russia. J. Digit. Forensics Secur. Law 12(3): 87-94 (2017) - Chetan K. R, Shivananda Nirmala:
Multiple Content Adaptive Intelligent Watermarking Schemes for the Protection of Blocks of a Document Image. J. Digit. Forensics Secur. Law 12(4): 5-28 (2017) - Daniel Schatz, Rabih Bashroush, Julie A. Wall:
Towards a More Representative Definition of Cyber Security. J. Digit. Forensics Secur. Law 12(2): 53-74 (2017) - Makhdoom Shah, Shahzad Saleem, Roha Zulqarnain:
Protecting Digital Evidence Integrity and Preserving Chain of Custody. J. Digit. Forensics Secur. Law 12(2): 121-130 (2017) - Johannes Stadlinger, Andreas Dewald:
A Forensic Email Analysis Tool Using Dynamic Visualization. J. Digit. Forensics Secur. Law 12(1): 7-14 (2017) - M. A. K. Sudozai, Nisar Habib, Shahzad Saleem, A. A. Khan:
Signatures of Viber Security Traffic. J. Digit. Forensics Secur. Law 12(2): 109-120 (2017) - Alexander Syatchikhin, Valery Golubtsov, Natalia Syropiatova:
Contractual Responsibility for the Disclosure of Bank Secrets. J. Digit. Forensics Secur. Law 12(3): 61-66 (2017) - Patryk Szewczyk, Rose Macdonald:
Broadband Router Security: History, Challenges and Future Implications. J. Digit. Forensics Secur. Law 12(4): 55-74 (2017) - Ryne Teague, Michael Black:
Evidence Verification Complications with Solid-State Drives. J. Digit. Forensics Secur. Law 12(4): 75-86 (2017) - Joan Through, Gary Cantrell:
Varying Instructional Approaches to Physical Extraction of Mobile Device Memory. J. Digit. Forensics Secur. Law 12(4): 29-42 (2017) - Patrick Tobin, Nhien-An Le-Khac, M. Tahar Kechadi:
Forensic Analysis of Virtual Hard Drives. J. Digit. Forensics Secur. Law 12(1): 47-58 (2017)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-22 16:43 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint