Sign in
J. Digit. Forensic Pract.
2006
2007
2009
2010
2006
2010
Keyphrases
Publications
volume 3, number 1, 2010
Mark Pollitt
Forensic Twitter.
J. Digit. Forensic Pract.
3 (1) (2010)
Gary C. Kessler
, 2nd edition. By Harlan Carvey.
J. Digit. Forensic Pract.
3 (1) (2010)
Yinghua Guo
,
Jill Slay
Testing Forensic Copy Function of Computer Forensics Investigation Tools.
J. Digit. Forensic Pract.
3 (1) (2010)
Pawel Zwan
,
Andrzej Czyzewski
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger.
J. Digit. Forensic Pract.
3 (1) (2010)
Lorie M. Liebrock
,
Brajendra Panda
,
Robert L. Hutchinson
Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing.
J. Digit. Forensic Pract.
3 (1) (2010)
Gary C. Kessler
. By A. Jones and C. Valli.
J. Digit. Forensic Pract.
3 (1) (2010)
Gary C. Kessler
,
Don A. Haggerty
An Online Graduate Program in Digital Investigation Management: Pedagogy and Overview.
J. Digit. Forensic Pract.
3 (1) (2010)
John H. Riley Jr.
Recycling in Vista®.
J. Digit. Forensic Pract.
3 (1) (2010)
Alfred C. Bogen
,
David A. Dampier
,
Rayford B. Vaughn
,
Donna S. Reese
,
Edward B. Allen
,
Jeffrey C. Carver
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials.
J. Digit. Forensic Pract.
3 (1) (2010)
volume 3, number 2-4, 2010
Lawrence Suffern
A Study of Current Trends in Database Forensics.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Greg Gogolin
,
James Jones
Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Thomas Gloe
,
Rainer Böhme
The Dresden Image Database for Benchmarking Digital Image Forensics.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Jonathan Matusitz
Cyberterrorism: Postmodern State of Chaos.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Angela Brungs
,
Rodger Jamieson
Identification of Legal Issues for Computer Forensics.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Edward H. Freeman
Computer Printouts as Legal Evidence.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Kenneth Geers
The Cyber Threat to National Critical Infrastructures: Beyond Theory.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Kamaruddin Malik Mohamad
,
Ahmed Patel
,
Tutut Herawan
,
Mustafa Mat Deris
myKarve: JPEG Image and Thumbnail Carver.
J. Digit. Forensic Pract.
3 (2-4) (2010)
Rafael Etges
,
Emma Sutcliffe
An Overview of Transnational Organized Cyber Crime.
J. Digit. Forensic Pract.
3 (2-4) (2010)
volume 2, number 1, 2008
Abdelrahman Desoky
,
Mohamed F. Younis
Graphstega: Graph Steganography Methodology.
J. Digit. Forensic Pract.
2 (1) (2008)
Victor Limongelli
Digital Evidence: Findings of Reliability, Not Presumptions.
J. Digit. Forensic Pract.
2 (1) (2008)
Jonathan Matusitz
Postmodernism and Networks of Cyberterrorists.
J. Digit. Forensic Pract.
2 (1) (2008)
John H. Riley Jr.
Windows Directory Entries for 8.3 Names in VFAT File Systems.
J. Digit. Forensic Pract.
2 (1) (2008)
Ewa Huebner
,
Derek Bem
Forensic Extraction of EFS-Encrypted Files in Live System Investigation.
J. Digit. Forensic Pract.
2 (1) (2008)
Mark Pollitt
Digital Orange Juice.
J. Digit. Forensic Pract.
2 (1) (2008)
Gary C. Kessler
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners.
J. Digit. Forensic Pract.
2 (1) (2008)
volume 2, number 2, 2008
Scott Inch
A Simple Image Hiding Technique: What You May Be Missing.
J. Digit. Forensic Pract.
2 (2) (2008)
Jack Wesley Riley
,
David A. Dampier
,
Rayford B. Vaughn
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon.
J. Digit. Forensic Pract.
2 (2) (2008)
Ronald E. Kaplan
Computer Forensics - What Is It Good For?
J. Digit. Forensic Pract.
2 (2) (2008)
Mark Pollitt
Blue Skies and Storm Clouds.
J. Digit. Forensic Pract.
2 (2) (2008)
Mark Pollitt
,
Kara L. Nance
,
Brian Hay
,
Ronald C. Dodge
,
Philip Craiger
,
Paul Burke
,
Christopher Marberry
,
Bryan Brubaker
Virtualization and Digital Forensics: A Research and Education Agenda.
J. Digit. Forensic Pract.
2 (2) (2008)
Yoginder S. Dandass
,
Nathan Joseph Necaise
,
Sherry Reede Thomas
An Empirical Analysis of Disk Sector Hashes for Data Carving.
J. Digit. Forensic Pract.
2 (2) (2008)
volume 2, number 3, 2008
Gavin Wylie Manes
,
James Johnson
,
Alex Barclay
,
Michael Harvey
,
Elizabeth Downing
,
John Hale
Issues and Techniques for Redacting PDF Files.
J. Digit. Forensic Pract.
2 (3) (2008)
Seyed Mahmood Hejazi
,
Mourad Debbabi
,
Chamseddine Talhi
Automated Windows Memory File Extraction for Cyber Forensics Investigation.
J. Digit. Forensic Pract.
2 (3) (2008)
Jesse D. Kornblum
.
J. Digit. Forensic Pract.
2 (3) (2008)
Abdelrahman Desoky
Nostega: A Novel Noiseless Steganography Paradigm.
J. Digit. Forensic Pract.
2 (3) (2008)
David Glen Ferguson
Redefining File Slack in Microsoft® NTFS.
J. Digit. Forensic Pract.
2 (3) (2008)
Samuel Liles
Software Forensics. By Robert Slade.
J. Digit. Forensic Pract.
2 (3) (2008)
Mark Pollitt
Managing Expectations.
J. Digit. Forensic Pract.
2 (3) (2008)
volume 2, number 4, 2008
Lucas Donato
An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations.
J. Digit. Forensic Pract.
2 (4) (2008)
Vincent Urias
,
Curtis Hash
,
Lorie M. Liebrock
Consideration of Issues for Parallel Digital Forensics of RAID Systems.
J. Digit. Forensic Pract.
2 (4) (2008)
Wayne Liu
,
Sudhir Aggarwal
,
Zhenhai Duan
Incorporating Accountability into Internet E-mail.
J. Digit. Forensic Pract.
2 (4) (2008)
Mark Pollitt
The Good, the Bad, the Unaddressed.
J. Digit. Forensic Pract.
2 (4) (2008)
S. Santhosh Baboo
,
P. Vinod Bhattathiripad
Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques.
J. Digit. Forensic Pract.
2 (4) (2008)
Jonathan Matusitz
,
Elizabeth Minei
Cyberterrorism: Its Effects on Health-Related Infrastructures.
J. Digit. Forensic Pract.
2 (4) (2008)
volume 1, number 4, 2006
Fredesvinda Insa
The Admissibility of Electronic Evidence in Court (A.E.E.C.): Fighting against High-Tech Crime - Results of a European Study.
J. Digit. Forensic Pract.
1 (4) (2006)
Aaron Smith
Describing and Categorizing Disk-Avoiding Anti-Forensics Tools.
J. Digit. Forensic Pract.
1 (4) (2006)
Christopher Marberry
,
Philip Craiger
CD-R Acquisition Hashes Affected by Write Options.
J. Digit. Forensic Pract.
1 (4) (2006)
Paul Burke
,
Philip Craiger
Xbox Forensics.
J. Digit. Forensic Pract.
1 (4) (2006)
Michael Losavio
,
Deborah Wilson
,
Adel Elmaghraby
Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices.
J. Digit. Forensic Pract.
1 (4) (2006)
Nicole Beebe
,
Gary C. Kessler
. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose".
J. Digit. Forensic Pract.
1 (4) (2006)