The SCEAS System
Navigation Menu

Journals in DBLP

Digital Investigation
2007, volume: 4, number: 3-4

  1. Attacks against forensic analysis. [Citation Graph (, )][DBLP]

  2. News. [Citation Graph (, )][DBLP]

  3. News. [Citation Graph (, )][DBLP]

  4. RIPA part III - The intricacies of decryption. [Citation Graph (, )][DBLP]

  5. NTFS volume mounts, directory junctions and $Reparse. [Citation Graph (, )][DBLP]

  6. Advanced carving techniques. [Citation Graph (, )][DBLP]

  7. Persistent systems techniques in forensic acquisition of memory. [Citation Graph (, )][DBLP]

  8. Forensic artefacts left by Pidgin Messenger 2.0. [Citation Graph (, )][DBLP]

  9. A framework for post-event timeline reconstruction using neural networks. [Citation Graph (, )][DBLP]

  10. Using Author Topic to detect insider threats from email traffic. [Citation Graph (, )][DBLP]

  11. Corrigendum to "Forensic analysis of System Restore points in Microsoft Windows XP" [Digit Investig 3 (3) (2006) 151-158]. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002