Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Alleyn Conway, Joshua I. James, Pavel Gladyshev |
Development and Initial User Evaluation of a Virtual Crime Scene Simulator Including Digital Evidence. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaehyeok Han, Doowon Jeong, Sangjin Lee 0002 |
Analysis of the HIKVISION DVR File System. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Flavio Bertini 0001, Rajesh Sharma 0002, Andrea Ianni, Danilo Montesi |
Smartphone Verification and User Profiles Linking Across Social Networks by Camera Fingerprinting. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joshua I. James, Pavel Gladyshev |
A Survey of International Cooperation in Digital Investigations. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Kumar Singh 0009, Pallav Pant, Ramesh Chandra Tripathi |
Detection of Frame Duplication Type of Forgery in Digital Video Using Sub-block Based Features. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nikolay Akatyev, Joshua I. James |
Cyber Peacekeeping. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vikas Gupta, Frank Breitinger |
How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Petr Matousek, Jan Pluskal, Ondrej Rysavý, Vladimír Veselý, Martin Kmet, Filip Karpísek, Martin Vymlátil |
Advanced Techniques for Reconstruction of Incomplete Network Data. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kathryn C. Seigfried-Spellar, Ben M. Flores, Darrin J. Griffin |
Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kelly A. Cole, Tejashree Datar, Marcus K. Rogers |
Awareness of Scam E-Mails: An Exploratory Research Study - Part 2. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joshua I. James, Frank Breitinger (eds.) |
Digital Forensics and Cyber Crime - 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015, Revised Selected Papers |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Karolina Alvarez, Masooda N. Bashir |
Exploring the Effectiveness of Digital Forensics Tools on the Sony PlayStation Vita. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Conor Quinn, Mark Scanlon, Jason Farina, M. Tahar Kechadi |
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imani Palmer, Elaine Wood, Stefan Nagy, Gabriela García, Masooda N. Bashir, Roy H. Campbell |
Digital Forensics Education: A Multidisciplinary Curriculum Model. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yulong Zhang, Baijian Yang 0001, Marcus K. Rogers, Raymond A. Hansen |
Forensically Sound Retrieval and Recovery of Images from GPU Memory. |
ICDF2C |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pavel Gladyshev, Andrew Marrington, Ibrahim M. Baggili (eds.) |
Digital Forensics and Cyber Crime - Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers |
ICDF2C |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev |
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Neil C. Rowe |
Identifying Forensically Uninteresting Files Using a Large Corpus. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Murdoch Watney |
Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Gupta, Babu M. Mehtre |
Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Marrington, Farkhund Iqbal, Ibrahim M. Baggili |
Computer Profiling for Preliminary Forensic Examination. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lucia De Marco, M. Tahar Kechadi, Filomena Ferrucci |
Cloud Forensic Readiness: Foundations. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Poisel, Marlies Rybnicek, Simon Tjoa |
Taxonomy of Data Fragment Classification Techniques. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Munkhbaatar Doyoddorj, Kyung Hyune Rhee |
Robust Copy-Move Forgery Detection Based on Dual-Transform. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fergal Brennan, Martins Udris, Pavel Gladyshev |
An Automated Link Analysis Solution Applied to Digital Forensic Investigations. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Esti Peshin |
Regulating Social Network Services for Lawful Interception. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Lambertz, Rafael Uetz, Elmar Gerhards-Padilla |
Resurrection: A Carver for Fragmented Files. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Prachi Goel, Babu M. Mehtre |
Forensic Artifacts of the flareGet Download Manager. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frank Breitinger, Huajian Liu, Christian Winter 0001, Harald Baier, Alexey Rybalchenko, Martin Steinebach |
Towards a Process Model for Hash Functions in Digital Forensics. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marcus K. Rogers, Kathryn C. Seigfried-Spellar (eds.) |
Digital Forensics and Cyber Crime - 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Martin Steinebach, Huajian Liu, York Yannikos |
FaceHash: Face Detection and Robust Hashing. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | P. Shabana Subair, C. Balan, S. Dija, K. L. Thomas |
Forensic Decryption of FAT BitLocker Volumes. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Asif Iqbal 0003, Hanan Al Obaidli, Andrew Marrington, Ibrahim M. Baggili |
Amazon Kindle Fire HD Forensics. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyshev |
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations. |
ICDF2C |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pavel Gladyshev, Marcus K. Rogers (eds.) |
Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Al Marzougy, Ibrahim M. Baggili, Andrew Marrington |
BlackBerry PlayBook Backup Forensic Analysis. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kathryn C. Seigfried-Spellar |
Measuring the Preference of Image Content for Self-reported Consumers of Child Pornography. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Keyun Ruan, Joe Carthy |
Cloud Forensic Maturity Model. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Niall McGrath, Pavel Gladyshev |
Investigating File Encrypted Material Using NTFS $logfile. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Keyun Ruan, Joe Carthy |
Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Daan de Graaf, Ahmed F. Shosha, Pavel Gladyshev |
BREDOLAB: Shopping in the Cybercrime Underworld. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
A Review and Comparative Study of Digital Forensic Investigation Models. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matthew F. Tennyson |
On Improving Authorship Attribution of Source Code. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed F. Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu, Pavel Gladyshev |
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim M. Baggili, Afrah BaAbdallah, Deena Al-Safi, Andrew Marrington |
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christer Idland, Thomas Jelle, Stig Fr. Mjølsnes |
Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Frank Breitinger, Harald Baier |
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim M. Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi |
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Oluwasola Mary Adedayo, Martin S. Olivier |
On the Completeness of Reconstructed Data for Database Forensics. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marc Beck, Eric C. Rouchka, Roman V. Yampolskiy |
Finding Data in DNA: Computer Forensic Investigations of Living Organisms. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abdallah A. Mohamed, Roman V. Yampolskiy |
Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lamine M. Aouad, M. Tahar Kechadi, Roberto Di Russo |
ANTS ROAD: A New Tool for SQLite Data Recovery on Android Devices. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Litska Strikwerda |
When Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law? |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Koppen, Gerald Gent, Kevin Bryan, Lisa Cingiser DiPippo, Jillian Kramer, Marquita Moreland, Victor Fay Wolfe |
Identifying Remnants of Evidence in the Cloud. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shahzad Saleem, Oliver Popov, Oheneba Kwame Appiah-Kubi |
Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis. |
ICDF2C |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida |
Rescuing Digital Data from Submerged HDD. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Schaefer, Hans Höfken, Marko Schuba |
Windows Phone 7 from a Digital Forensics' Perspective. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Serguei A. Mokhov, Joey Paquet, Mourad Debbabi |
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christian Moch, Felix C. Freiling |
Evaluating the Forensic Image Generator Generator. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alexander G. Barnett |
The Forensic Value of the Windows 7 Jump List. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mark Lohrum |
Forensic Extractions of Data from the Nokia N900. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | S. Satheesh Kumar, Bibin Thomas, K. L. Thomas |
An Agent Based Tool for Windows Mobile Forensics. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kelly A. Cole, Ramindu L. Silva, Richard P. Mislan |
All Bot Net: A Need for Smartphone P2P Awareness. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed F. Shosha, Joshua James, Pavel Gladyshev |
A Novel Methodology for Malware Intrusion Attack Path Reconstruction. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France |
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Levendoski, Tejashree Datar, Marcus K. Rogers |
Yahoo! Messenger Forensics on Windows Vista and Windows 7. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kathryn C. Seigfried-Spellar, Gary R. Bertoline, Marcus K. Rogers |
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Neil C. Rowe, Simson L. Garfinkel |
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mark Lohrum |
Forensic Extractions of Data from the Nokia N900. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Keane, Stephen O'Shaughnessy |
Tracking User Activity on Personal Computers. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gyu-Sang Cho, Marcus K. Rogers |
Finding Forensic Information on Creating a Folder in $LogFile of NTFS. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Clive Blackwell |
A Forensic Framework for Incident Analysis Applied to the Insider Threat. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eric Katz, Richard Mislan, Marcus K. Rogers, Anthony Smith |
Results of Field Testing Mobile Phone Shielding Devices. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Esti Peshin |
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia A. Murphy |
The Role of Perception in Age Estimation. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Steinebach |
Robust Hashing for Efficient Forensic Analysis of Image Sets. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | James R. Lyle |
A Strategy for Testing Metadata Based Deleted File Recovery Tools. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Frank Breitinger, Harald Baier |
Performance Issues About Context-Triggered Piecewise Hashing. |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim M. Baggili (eds.) |
Digital Forensics and Cyber Crime - Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers |
ICDF2C |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Damir Kahvedzic, M. Tahar Kechadi |
Semantic Modelling of Digital Forensic Evidence. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Joshua James, Pavel Gladyshev, Yuandong Zhu |
Signature Based Detection of User Events for Post-mortem Forensic Analysis. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. Santhosh Baboo, P. Vinod Bhattathiripad |
Software Piracy Forensics: The Need for Further Developing AFC. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel S. Pilli, Ramesh Chandra Joshi, Rajdeep Niyogi |
An IP Traceback Model for Network Forensics. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hamda Bariki, Mariam Hashmi, Ibrahim M. Baggili |
Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Digambar Povar, V. K. Bhadran |
Forensic Data Carving. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sanjay Goel (eds.) |
Digital Forensics and Cyber Crime - First International ICST Conference, ICDF2C 2009, Albany, NY, USA, September 30-October 2, 2009, Revised Selected Papers |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gurvinder Singh, Martin Eian, Svein Yngvar Willassen, Stig Fr. Mjølsnes |
Detecting Intermediary Hosts by TCP Latency Measurements. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pavel Gladyshev, Afrah Almansoori |
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shahzad Saleem, Oliver Popov |
Protecting Digital Evidence Integrity by Using Smart Cards. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Noor Hashim, Iain Sutherland |
An Architecture for the Forensic Analysis of Windows System Artifacts. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Iftekhar Husain, Ibrahim M. Baggili, Ramalingam Sridhar |
A Simple Cost-Effective Framework for iPhone Forensic Analysis. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim M. Baggili, Saad Ali Amin |
Towards More Secure Biometric Readers for Effective Digital Forensic Investigation. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ali Alkaabi, George M. Mohay, Adrian McCullagh, Nicholas Chantler |
Dealing with the Problem of Cybercrime. |
ICDF2C |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Iftekhar Husain, Ramalingam Sridhar |
iForensics: Forensic Analysis of Instant Messaging on Smart Phones. |
ICDF2C |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jong P. Yoon, Zhixiong Chen |
Localization and Detection of Vector Logo Image Plagiarism. |
ICDF2C |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mark Scanlon, Mohand Tahar Kechadi |
Online Acquisition of Digital Forensic Evidence. |
ICDF2C |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frank Y. W. Law, Kam-Pui Chow, Pierre K. Y. Lai, Hayson Tse |
A Host-Based Approach to BotNet Investigation? |
ICDF2C |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Martin Steinebach, Mohamed El Ouariachi, Huajian Liu, Stefan Katzenbeisser 0001 |
On the Reliability of Cell Phone Camera Fingerprint Recognition. |
ICDF2C |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Duane Wilson, Michael K. Lavine |
A Discretionary Access Control Method for Preventing Data Exfiltration (DE) via Removable Devices. |
ICDF2C |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Amin Ibrahim, Miguel Vargas Martin |
Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance. |
ICDF2C |
2009 |
DBLP DOI BibTeX RDF |
|