Works matching IS 16112776 AND DT 2015 AND VI 57 AND IP 6
Results: 8
Privacy issues in the Domain Name System and techniques for self-defense.
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 388, doi. 10.1515/itit-2015-0038
- By:
- Publication type:
- Article
The PhD program "Fortschrittskolleg Online Participation".
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 384, doi. 10.1515/itit-2015-0033
- By:
- Publication type:
- Article
What is essential data in digital forensic analysis?
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 376, doi. 10.1515/itit-2015-0016
- By:
- Publication type:
- Article
Web tracking: Overview and applicability in digital investigations.
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 366, doi. 10.1515/itit-2015-0015
- By:
- Publication type:
- Article
(Ir-)responsible disclosure of software vulnerabilities and the risk of criminal liability.
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 357, doi. 10.1515/itit-2015-0014
- By:
- Publication type:
- Article
Towards automated preprocessing of bulk data in digital forensic investigations using hash functions.
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 347, doi. 10.1515/itit-2015-0023
- By:
- Publication type:
- Article
Characteristic evidence, counter evidence and reconstruction problems in forensic computing.
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 339, doi. 10.1515/itit-2015-0017
- By:
- Publication type:
- Article
From IT forensics to forensic computing.
- Published in:
- IT: Information Technology, 2015, v. 57, n. 6, p. 337, doi. 10.1515/itit-2015-0039
- By:
- Publication type:
- Article