Found: 7
Select item for more details and to access through your institution.
BLOOM FILTERS OPTIMIZED WU-MANBER FOR INTRUSION DETECTION.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 4, p. 5, doi. 10.15394/jdfsl.2016.1427
- By:
- Publication type:
- Article
THE 2016 ANALYSIS OF INFORMATION REMAINING ON COMPUTER HARD DISKS OFFERED FOR SALE ON THE SECOND HAND MARKET IN THE UAE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 4, p. 23, doi. 10.15394/jdfsl.2016.1428
- By:
- Publication type:
- Article
LEVERAGING THE WINDOWS AMCACHE.HVE FILE IN FORENSIC INVESTIGATIONS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 4, p. 37, doi. 10.15394/jdfsl.2016.1429
- By:
- Publication type:
- Article
A SURVEY OF SOCIAL NETWORK FORENSICS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 4, p. 55, doi. 10.15394/jdfsl.2016.1430
- By:
- Publication type:
- Article
THE IMPACT OF MD5 FILE HASH COLLISIONS ON DIGITAL FORENSIC IMAGING.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 4, p. 129, doi. 10.15394/jdfsl.2016.1431
- By:
- Publication type:
- Article
THE IMPACT OF SHA-1 FILE HASH COLLISIONS ON DIGITAL FORENSIC IMAGING: A FOLLOW-UP EXPERIMENT.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 4, p. 139, doi. 10.15394/jdfsl.2016.1433
- By:
- Publication type:
- Article
A NEW DISTRIBUTED CHINESE WALL SECURITY POLICY MODEL.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 4, p. 149, doi. 10.15394/jdfsl.2016.1434
- By:
- Publication type:
- Article