The SCEAS System
Navigation Menu

Journals in DBLP

Digital Investigation
2009, volume: 5, number: 3-4


  1. "Dawn raids" bring a new form in incident response. [Citation Graph (, )][DBLP]


  2. Implementing BitLocker Drive Encryption for forensic analysis. [Citation Graph (, )][DBLP]


  3. Analysis of CCTV digital video recorder hard disk storage system. [Citation Graph (, )][DBLP]


  4. Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records. [Citation Graph (, )][DBLP]


  5. Data concealment and detection in Microsoft Office 2007 files. [Citation Graph (, )][DBLP]


  6. On metadata context in Database Forensics. [Citation Graph (, )][DBLP]


  7. Towards an integrated e-mail forensic analysis framework. [Citation Graph (, )][DBLP]


  8. Source attribution for network address translated forensic captures. [Citation Graph (, )][DBLP]


  9. Meetings between experts: A route to simpler, fairer trials? [Citation Graph (, )][DBLP]


  10. Steve Anson and Steve Bunting, Mastering Windows network forensics and investigations , Sybex (an imprint of Wiley Publishing Inc.), US and Canada (2007) ISBN 978-0-4700-9762-5 530 pp. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002