default search action
Antonio Savoldi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j5]Antonio Savoldi, Mario Piccinelli, Paolo Gubian:
A statistical method for detecting on-disk wiped areas. Digit. Investig. 8(3-4): 194-214 (2012) - [j4]Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee:
On-the-spot digital investigation by means of LDFS: Live Data Forensic System. Math. Comput. Model. 55(1-2): 223-240 (2012) - 2010
- [j3]Seokhee Lee, Antonio Savoldi, Kyoung Soo Lim, Jong Hyuk Park, Sangjin Lee:
A proposal for automating investigations in live forensics. Comput. Stand. Interfaces 32(5-6): 246-255 (2010) - [c19]Antonio Savoldi, Paolo Gubian, Isao Echizen:
Uncertainty in Live Forensics. IFIP Int. Conf. Digital Forensics 2010: 171-184 - [p1]Antonio Savoldi, Paolo Gubian:
Embedded Forensics. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 396-423
2000 – 2009
- 2009
- [j2]Antonio Savoldi, Paolo Gubian:
Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems. Int. J. Digit. Crime Forensics 1(3): 42-61 (2009) - [c18]Antonio Savoldi, Paolo Gubian, Isao Echizen:
A Comparison between Windows Mobile and Symbian S60 Embedded Forensics. IIH-MSP 2009: 546-550 - [c17]Antonio Savoldi, Paolo Gubian, Isao Echizen:
How to Deal with Blurriness in Live Forensics: A Case of Study. NCM 2009: 1865-1871 - 2008
- [c16]Antonio Savoldi, Paolo Gubian:
Data Recovery from Windows CE Based Handheld Devices. IFIP Int. Conf. Digital Forensics 2008: 219-230 - [c15]Antonio Savoldi, Paolo Gubian:
Symbian Forensics: An Overview. IIH-MSP 2008: 529-533 - [c14]Lei Pan, Antonio Savoldi, Paolo Gubian, Lynn Margaret Batten:
Measure of Integrity Leakage in Live Forensic Context. IIH-MSP 2008: 534-537 - [c13]Keun-Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung-Soo Lim, Seokhee Lee, Sangjin Lee:
Methodologies for Detecting Covert Database. IIH-MSP 2008: 538-541 - [c12]Sunmi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, Sangjin Lee:
Design and Implementation of a Tool for System Restore Point Analysis. IIH-MSP 2008: 542-546 - [c11]Yeog Kim, Antonio Savoldi, Hyewon Lee, Sunmi Yun, Sangjin Lee, Jongin Lim:
Design and Implementation of a Tool to Detect Accounting Frauds. IIH-MSP 2008: 547-552 - [c10]Bora Park, Antonio Savoldi, Paolo Gubian, Jungheum Park, Seokhee Lee, Sangjin Lee:
Recovery of Damaged Compressed Files for Digital Forensic Purposes. MUE 2008: 365-372 - [c9]Antonio Savoldi, Paolo Gubian:
Logical and physical data collection of Windows CE based portable devices. SAC 2008: 1448-1449 - [c8]Antonio Savoldi, Paolo Gubian:
Towards the Virtual Memory Space Reconstruction for Windows Live Forensic Purposes. SADFE 2008: 15-22 - 2007
- [c7]Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Windows Pagefile Collection and Analysis for a Live Forensics Context. FGCN (2) 2007: 97-101 - [c6]Antonio Savoldi, Paolo Gubian:
Blind Multi-Class Steganalysis System Using Wavelet Statistics. IIH-MSP 2007: 93-96 - [c5]Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Password Recovery Using an Evidence Collection Tool and Countermeasures. IIH-MSP 2007: 97-102 - [c4]Antonio Savoldi, Paolo Gubian:
SIM and USIM filesystem: a forensics perspective. SAC 2007: 181-187 - [c3]Antonio Savoldi, Paolo Gubian:
Data Hiding in SIM/USIM Cards: A Steganographic Approach. SADFE 2007: 86-100 - 2006
- [j1]Fabio Casadei, Antonio Savoldi, Paolo Gubian:
Forensics and SIM Cards: An Overview. Int. J. Digit. EVid. 5(1) (2006) - [c2]Antonio Savoldi, Paolo Gubian:
A Methodology to Improve the Detection Accuracy in Digital Steganalysis. IIH-MSP 2006: 373-376 - 2005
- [c1]Fabio Casadei, Antonio Savoldi, Paolo Gubian:
SIMbrush: an Open Source Tool for GSM and UMTS Forensics Analysis. SADFE 2005: 105-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint