The SCEAS System
Navigation Menu

Journals in DBLP

Digital Investigation
2006, volume: 3, number: 2

  1. Eoghan Casey
    The value of behavioral analysis in digital investigations. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:57-58 [Journal]

  2. News. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:59-62 [Journal]

  3. Digital Investigation and the International Federation for Information Processing (IFIP). [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:63-64 [Journal]
  4. David Bradbury
    Peer review. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:65-67 [Journal]
  5. Peter Sommer
    Criminalising hacking tools. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:68-72 [Journal]
  6. G. Fellows
    Newsgroups reborn - The binary posting renaissance. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:73-78 [Journal]
  7. Mike Dickson
    An examination into MSN Messenger 7.5 contact identification. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:79-83 [Journal]
  8. Eoghan Casey
    Applications of Research. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:84- [Journal]
  9. Dario V. Forte
    Advances in Onion Routing: Description and backtracing/investigation problems. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:85-88 [Journal]
  10. Bruce J. Nikkel
    Improving evidence acquisition from live network sources. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:89-96 [Journal]
  11. Marcus K. Rogers
    A two-dimensional circumplex approach to the development of a hacker taxonomy. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:97-102 [Journal]
  12. Henry B. Wolfe
    Book review. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:103-104 [Journal]
  13. Peter Sommer
    File System Forensic Analysis, B. Carrier. Addison Wesley, ISBN 0-321-26817-2. [Citation Graph (0, 0)][DBLP]
    Digital Investigation, 2006, v:3, n:2, pp:103- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002