default search action
Journal of Digital Forensics, Security and Law, Volume 9
Volume 9, Number 1, 2014
- Chad M. S. Steel:
Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints. 7-18 - Michael Raymond Bartolacci, Larry J. LeBlanc, Ashley L. Podhradsky:
Personal Denial Of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime. 19-36 - Wei Gao, Thomas H. Morris:
On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems. 37-56 - Marcus K. Rogers, Kathryn C. Seigfried-Spellar:
Using Internet Artifacts to Profile a Child Pornography Suspect. 57-66 - Rasib Khan, Mainul Mizan, Ragib Hasan, Alan P. Sprague:
Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering. 67-82 - Stephen Larson:
Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. 83-85
Volume 9, Number 2, 2014
- Ibrahim M. Baggili:
From the Editor-in-Chief. 7-8 - Libor Polcak, Radek Hranicky, Tomás Martínek:
On Identities in Modern Networks. 9-22 - Frank Breitinger, Ibrahim M. Baggili:
File Detection On Network Traffic Using Approximate Matching. 23-36 - Amit Kleinmann, Avishai Wool:
Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic. 37-50 - Kam-Pui Chow, Frank Y. W. Law, Y. H. Mai:
Understanding Computer Forensics Requirements in China Via The "Panda Burning Incense" Virus Case. 51-58 - Joshua I. James:
Multi-Stakeholder Case Prioritization in Digital Investigations. 59-72 - Vinod Polpaya Bhattathiripad:
Forensics of Software Copyright Infringement Crimes: The Modern POSAR Test Juxtaposed With the Dated AFC Test. 73-84 - Mark Scanlon, Jason Farina, Nhien-An Le-Khac, M. Tahar Kechadi:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync. 85-100 - Petr Matousek, Ondrej Rysavý, Martin Kmet:
Fast RTP Detection and Codecs Classification in Internet Traffic. 101-112 - Samer Al-khateeb, Nitin Agarwal:
Developing a Conceptual Framwork for Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs. 113-128 - Umit Karabiyik, Sudhir Aggarwal:
Audit: Automated Disk Investigation Toolkit. 129-144 - Shruti Gupta, Marcus Rogers:
Exploring Forensic Implications of the Fusion Drive. 145-154 - Frank Breitinger, Christian Rathgeb, Harald Baier:
An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach. 155-166 - Erin Smith Crabb:
"Time for Some Traffic Problems": Enhancing E-Discovery and Big Data Processing Tools with Linguistic Methods for Deception Detection. 167-180 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction. 181-196 - Michael Losavio, Deborah W. Keeling:
Evidentiary Power and Propriety of Digital Identifiers and the Impact on Privacy Rights in the United States. 197-204 - Riqui Schwamm, Neil C. Rowe:
Effects of the Factory Reset on Mobile Devices. 205-220 - Maxwell Anobah, Shahzad Saleem, Oliver Popov:
Testing Framework for Mobile Device Forensics Tools. 221-234
Volume 9, Number 3, 2014
- Ibrahim M. Baggili:
From the Editor-in-Chief. 5 - Jennifer Moore, Jonathan Langton, Joseph Pochron:
The Cost of Privacy: Riley v. California's Impact on Cell Phone Searches. 7-18 - Shahzad Saleem, Ibrahim M. Baggili, Oliver Popov:
Quantifying Relevance of Mobile Digital Evidence As They Relate to Case Types: A Survey and a Guide for Best Practices. 19-50 - Gary C. Kessler, Gregory H. Carlton:
An Analysis of Forensic Imaging in the Absence of Write-Blockers. 51-58 - Linda K. Lau:
Book Review: The X-Ways Forensics Practitioner's Guide. 59-61
Volume 9, Number 4, 2014
- Ibrahim M. Baggili:
From the Editor-in-Chief. 5-6 - Sameera Abdulrahman Almulla, Youssef Iraqi, Andrew Jones:
A State-of-the-Art Review of Cloud Forensics. 7-28 - Jasmine Eggestein, Kenneth J. Knapp:
Fighting Child Pornography: A Review of Legal and Technological Developments. 29-48 - Chad M. S. Steel:
Technical Soddi Defenses: The Trojan Horse Defense Revisited. 49-62 - Pedro Luís Próspero Sanchez:
Book Review: Judiciary-Friendly Forensics of Software Copyright Infringement (Vinod Polpaya Bhattathiripad). 63-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.