default search action
Journal of Digital Forensics, Security and Law, Volume 7
Volume 7, Number 1, 2012
- Fred Cohen:
Column: The Physics of Digital Information-Part 2. 7-14 - Harjinder Singh Lallie, Parmjit Bains:
An Overview of the Jumplist Configuration File in Windows 7. 15-28 - Richard Boddington, Jeremy Ardley, Grant Austin Boxall:
Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery Detection and Validation. 29-54 - Larry Melling, Robert Zeidman:
Comparing Android Applications to Find Copying. 55-70 - Harjinder Singh Lallie:
Challenges in applying the ACPO principles in cloud forensic investigations. 71-86 - Diane Barrett:
Book Review: The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detections. 87-92 - Sellam Ismail:
Technology Corner: Dating of Electronic Hardware for Prior Art Investigations. 93-100
Volume 7, Number 2, 2012
- Kevin D. Fairbanks, Simson L. Garfinkel:
Column: Factors Affecting Data Decay. 7-10 - Neil Fowler Wright:
DNS in Computer Forensics. 11-42 - Jonathan Patterson, Christopher James Hargreaves:
Automated Identification and Reconstruction of YouTube Video Access. 43-60 - Jason Nichols, David P. Biros, Mark Weiser:
Toward Alignment between Communities of Practice and Knowledge-Based Decision Support. 61-74 - Aaron Alva, Barbara Endicott-Popovsky:
Digital Evidence Education in Schools of Law. 75-88 - Fred Cohen:
Identifying and Attributing Similar Traces with Greatest Common Factor Analysis. 89-112 - Gregory H. Carlton, Gary C. Kessler:
Identifying trace evidence in data wiping application software. 113-142 - Nate Keith:
Book Review: System Forensics, Investigation, and Response. 143-148 - Nick V. Flor:
Technology Corner: Automated Data Extraction Using Facebook. 149-164
Volume 7, Number 3, 2012
- Fred Cohen:
Column: The Science of Digital Forensics: Analysis of Digital Traces. 5-12 - Manghui Tu, Dianxiang Xu, Cristian Balan, Kyle Cronin:
On the Development of Digital Forensics Curriculum. 13-32 - John Moran, Douglas Orr:
Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9. 33-54 - David Irwin, Arek Dadej, Jill Slay:
Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech. 55-82 - Thomas Lonardo, Doug White, Alan Rea:
To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. 83-110 - Milton H. Luoma:
Book Review: Dispute Resolution and e-Discovery. 111-114
Volume 7, Number 4, 2012
- Fred Cohen:
Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media. 7-20 - Robert Vose Simpson:
Confronting Potential Injustice with Preemptive Suppression. 21-50 - Patryk Szewczyk:
An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users. 51-72 - Manghui Tu:
Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System. 73-98 - Gary Cantrell, David A. Dampier:
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model. 99-116 - John C. Ebert:
Book Review: Mastering Windows Network Forensics and Investigation, 2/e. 117-124 - Nick V. Flor:
Technology Corner: A Regular Expression Training App. 125-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.