The SCEAS System
Navigation Menu

Journals in DBLP

Digital Investigation
2004, volume: 1, number: 1

  1. Eoghan Casey
    The need for knowledge sharing and standardization. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:1-2 [Journal]
  2. Geoff Fellows
    Peer-to-peer networking issues - an overview. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:3-6 [Journal]
  3. Monique Mattei Ferraro, Andrew Russell
    Current issues confronting well-established computer-assisted child exploitation and computer crime task forces. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:7-15 [Journal]
  4. Peter Sommer
    The challenges of large computer evidence cases. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:16-17 [Journal]
  5. Chris Boyd, Pete Forster
    Time and date issues in forensic computing - a case study. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:18-23 [Journal]
  6. Peter Stephenson
    The right tools for the job. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:24-27 [Journal]
  7. Eoghan Casey
    Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:28-43 [Journal]

  8. Events. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:45-0 [Journal]

  9. Research summary. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:47-49 [Journal]
  10. Brian D. Carrier, Joe Grand
    A hardware-based memory acquisition procedure for digital investigations. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:50-60 [Journal]
  11. Sarah Mocas
    Building theoretical underpinnings for digital forensics research. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:61-68 [Journal]
  12. Thomas E. Daniels
    A functional reference model of passive systems for tracing network traffic. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2004, v:1, n:1, pp:69-81 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002