


default search action
Digital Investigation, Volume 28 Supplement
Volume 28 Supplement, April 2019
- Babak Habibnia:
The proceedings of the Sixth Annual DFRWS Europe Conference. S1-S2 - Saed Alrabaee, Mourad Debbabi
, Lingyu Wang:
On the feasibility of binary authorship characterization. S3-S11 - Lorenz Liebler, Harald Baier:
Towards exact and inexact approximate matching of executable binaries. S12-S21 - Francesco Servida, Eoghan Casey:
IoT forensic challenges and opportunities for digital traces. S22-S29 - Rune Nordvik, Fergus Toolan, Stefan Axelsson:
Using the object ID index as an investigative approach for NTFS file systems. S30-S39 - Morteza Safaei Pour
, Elias Bou-Harb, Kavita Varma, Nataliia Neshenko
, Dimitris A. Pados, Kim-Kwang Raymond Choo
:
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns. S40-S49 - Jusop Choi, Jaegwan Yu, Sangwon Hyun, Hyoungshick Kim:
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger. S50-S59 - Ahmed A. Bahjat, Jim Jones:
Deleted file fragment dating by analysis of allocated neighbors. S60-S67 - Patrick Mullan, Christian Riess, Felix C. Freiling:
Forensic source identification using JPEG image headers: The case of smartphones. S68-S76 - ElMouatez Billah Karbab, Mourad Debbabi
:
MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports. S77-S87 - Ian Shiel, Stephen O'Shaughnessy
:
Improving file-level fuzzy hashes for malware variant classification. S88-S94 - Daniel Uroz
, Ricardo J. Rodríguez:
Characteristics and detectability of Windows auto-start extensibility points in memory forensics. S95-S104 - Tajvinder Singh Atwal, Mark Scanlon
, Nhien-An Le-Khac
:
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS. S105-S115 - Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger
:
On efficiency of artifact lookup strategies in digital forensics. S116-S125 - Jan Peter van Zandwijk, Abdul Boztas:
The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? S126-S133 - Christopher James Hargreaves, Angus M. Marshall
:
SyncTriage: Using synchronisation artefacts to optimise acquisition order. S134-S140 - Gabriel Maciá-Fernández, José Antonio Gómez-Hernández, Margarita Robles
, Pedro García-Teodoro:
Blockchain-based forensic system for collection and preservation of network service evidences. S141 - Felix Anda, David Lillis
, Aikaterini Kanta, Brett A. Becker
, Elias Bou-Harb, Nhien-An Le-Khac
, Mark Scanlon:
Improving the accuracy of automated facial age estimation to aid CSEM investigations. S142 - Lu Zhao, Yanrong Kang, Lili Guo, Yuan Long, Guidong Xing, Menghu Bao, Yaoguo Zhang, Siqi Liu, Chunlu Wang:
The Research of Alcohol Drinking State Analyzing Based on Smart Watch Data. S143

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.