Works matching IS 15587215 AND DT 2014 AND VI 9 AND IP 2
Results: 19
Announcements and Upcoming Events.
- Published in:
- 2014
- Publication type:
- Proceeding
"TIME FOR SOME TRAFFIC PROBLEMS": ENHANCING E-DISCOVERY AND BIG DATA PROCESSING TOOLS WITH LINGUISTIC METHODS FOR DECEPTION DETECTION.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 167
- By:
- Publication type:
- Article
EFFECTS OF THE FACTORY RESET ON MOBILE DEVICES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 205
- By:
- Publication type:
- Article
EVIDENTIARY POWER AND PROPRIETY OF DIGITAL IDENTIFIERS AND THE IMPACT ON PRIVACY RIGHTS IN THE UNITED STATES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 197
- By:
- Publication type:
- Article
RELATING ADMISSIBILITY STANDARDS FOR DIGITAL EVIDENCE TO ATTACK SCENARIO RECONSTRUCTION.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 181
- By:
- Publication type:
- Article
LEVERAGING DECENTRALIZATION TO EXTEND THE DIGITAL EVIDENCE ACQUISITION WINDOW: CASE STUDY ON BITTORRENT SYNC.
- Published in:
- 2014
- By:
- Publication type:
- Case Study
TESTING FRAMEWORK FOR MOBILE DEVICE FORENSICS TOOLS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 221
- By:
- Publication type:
- Article
EXPLORING FORENSIC IMPLICATIONS OF THE FUSION DRIVE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 145
- By:
- Publication type:
- Article
AUDIT: AUTOMATED DISK INVESTIGATION TOOLKIT.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 129
- By:
- Publication type:
- Article
DEVELOPING A CONCEPTUAL FRAMEWORK FOR MODELING DEVIANT CYBER FLASH MOB: A SOCIO-COMPUTATIONAL APPROACH LEVERAGING HYPERGRAPH CONSTRUCTS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 113
- By:
- Publication type:
- Article
FAST RTP DETECTION AND CODECS CLASSIFICATION IN INTERNET TRAFFIC.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 101
- By:
- Publication type:
- Article
AN EFFICIENT SIMILARITY DIGESTS DATABASE LOOKUP – A LOGARITHMIC DIVIDE & CONQUER APPROACH.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 155
- By:
- Publication type:
- Article
FORENSICS OF SOFTWARE COPYRIGHT INFRINGEMENT CRIMES: THE MODERN POSAR TEST JUXTAPOSED WITH THE DATED AFC TEST.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 73
- By:
- Publication type:
- Article
MULTI-STAKEHOLDER CASE PRIORITIZATION IN DIGITAL INVESTIGATIONS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 59
- By:
- Publication type:
- Article
ACCURATE MODELING OF THE SIEMENS S7 SCADA PROTOCOL FOR INTRUSION DETECTION AND DIGITAL FORENSICS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 37
- By:
- Publication type:
- Article
FILE DETECTION ON NETWORK TRAFFIC USING APPROXIMATE MATCHING.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 23
- By:
- Publication type:
- Article
ON IDENTITIES IN MODERN NETWORKS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 9
- By:
- Publication type:
- Article
FROM THE EDITOR-IN-CHIEF.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 7
- By:
- Publication type:
- Article
UNDERSTANDING COMPUTER FORENSICS REQUIREMENTS IN CHINA VIA THE "PANDA BURNING INCENSE" VIRUS CASE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 51
- By:
- Publication type:
- Article