default search action
Digital Investigation, Volume 29
Volume 29, June 2019
- Hudan Studiawan, Ferdous Sohel, Christian Payne:
A survey on forensic investigation of operating system logs. 1-20
- Eoghan Casey:
Maturation of digital forensics. 1-
- Doowon Jeong, Sangjin Lee:
Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts. 21-27 - Xiaolu Zhang, Justin Grannis, Ibrahim M. Baggili, Nicole Lang Beebe:
Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system. 28-42
- Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. 43-54
- Jesús Gregorio, Bernardo Alarcos, Alfredo Gardel Vicente:
Forensic analysis of Nucleus RTOS on MTK smartwatches. 55-66
- Pamela Johnston, Eyad Elyan:
A review of digital video tampering: From simple editing to full synthesis. 67-81
- Angus M. Marshall, Peter Miller:
CaseNote: Mobile phone call data obfuscation & techniques for call correlation. 82-90
- Emmanuel Kiegaing Kouokam, Ahmet Emir Dirik:
PRNU-based source device attribution for YouTube videos. 91-100
- Nina Sunde, Itiel E. Dror:
Cognitive and human factors in digital forensics: Problems, challenges, and the way forward. 101-108
- Peter McLaren, Gordon Russell, William J. Buchanan, Zhiyuan Tan:
Decrypting live SSH traffic in virtual environments. 109-117
- Matt Muir, Petra Leimich, William J. Buchanan:
A Forensic Audit of the Tor Browser Bundle. 118-128
- Chao Jin, Rangding Wang, Diqun Yan:
Source smartphone identification by exploiting encoding characteristics of recorded speech. 129-146 - Humaira Arshad, Aman Jantan, Gan Keng Hoon, Anila Sahar Butt:
A multilayered semantic framework for integrated forensic acquisition on social media. 147-158
- Marco Nicoletti, Massimo Bernaschi:
Forensic analysis of Microsoft Skype for Business. 159-179
- Rupali M. Chopade, Vinod Keshaorao Pachghare:
Ten years of critical review on database forensics research. 180-197
- Thibaut Heckmann, James P. McEvoy, Konstantinos Markantonakis, Raja Naeem Akram, David Naccache:
Removing epoxy underfill between neighbouring components using acid for component chip-off. 198-209 - Thibaut Heckmann, Thomas R. Souvignet, David Naccache:
Decrease of energy deposited during laser decapsulation attacks by dyeing and pigmenting the ECA: Application to the forensic micro-repair of wire bonding. 210-218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.