Works matching IS 15587215 AND DT 2015 AND VI 10 AND IP 4
Results: 11
PROJECT MAELSTROM: FORENSIC ANALYSIS OF THE BITTORRENT-POWERED BROWSER.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 115
- By:
- Publication type:
- Article
THE USE OF ONTOLOGIES IN FORENSIC ANALYSIS OF SMARTPHONE CONTENT.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 105
- By:
- Publication type:
- Article
OPEN FORENSIC DEVICES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 97
- By:
- Publication type:
- Article
EXPLORING THE USE OF PLC DEBUGGING TOOLS FOR DIGITAL FORENSIC INVESTIGATIONS ON SCADA SYSTEMS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 79
- By:
- Publication type:
- Article
FORENSIC ACQUISITION OF IMVU: A CASE STUDY.
- Published in:
- 2015
- By:
- Publication type:
- Case Study
PLC FORENSICS BASED ON CONTROL PROGRAM LOGIC CHANGE DETECTION WORKS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 59
- By:
- Publication type:
- Article
CYBER BLACK BOX/EVENT DATA RECORDER: LEGAL AND ETHICAL PERSPECTIVES AND CHALLENGES WITH DIGITAL FORENSICS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 43
- By:
- Publication type:
- Article
DATA EXTRACTION ON MTK-BASED ANDROID MOBILE PHONE FORENSICS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 31
- By:
- Publication type:
- Article
TRACKING AND TAXONOMY OF CYBERLOCKER LINK SHARERS BASED ON BEHAVIOR ANALYSIS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 17
- By:
- Publication type:
- Article
FACTORS INFLUENCING DIGITAL FORENSIC INVESTIGATIONS: EMPIRICAL EVALUATION OF 12 YEARS OF DUBAI POLICE CASES.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 7
- By:
- Publication type:
- Article
FROM THE EDITOR-IN-CHIEF.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 4, p. 5
- By:
- Publication type:
- Article