The SCEAS System
Navigation Menu

Journals in DBLP

Digital Investigation
2005, volume: 2, number: 3

  1. Eoghan Casey
    Investigating security breaches. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:169-170 [Journal]

  2. Pressure mounts on US Senate to pass cybercrime treaty. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:171-174 [Journal]
  3. Keith McDonald
    To image a Macintosh. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:175-179 [Journal]
  4. Susan W. Brenner
    Requiring protocols in computer search warrants. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:180-188 [Journal]
  5. Stephen Mason
    Trusted computing and forensic investigations. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:189-192 [Journal]
  6. Bruce J. Nikkel
    Generalizing sources of live network evidence. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:193-200 [Journal]
  7. Harlan Carvey
    The Windows Registry as a forensic resource. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:201-205 [Journal]

  8. The future implications of computer forensics on VOIP. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:206-208 [Journal]
  9. Michael A. Penhallurick
    Methodologies for the use of VMware to boot cloned/mounted subject hard disk images. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:209-222 [Journal]
  10. Philip Turner
    Unification of digital evidence from disparate sources (Digital Evidence Bags). [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2005, v:2, n:3, pp:223-228 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002