-
1
Column: Every Last Byte
Published 2011-06-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
2
Science Column: Reconstruction: The Experimental Side of Digital Forensics
Published 2013-12-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
3
Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory
Published 2013-12-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
4
Fighting Child Pornography: A Review of Legal and Technological Developments
Published 2014-12-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
5
Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics
Published 2006-06-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
6
Book Review: The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detections
Published 2012-03-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
7
Testing Framework for Mobile Device Forensics Tools
Published 2014-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
8
The Common Body of Knowledge: A Framework to Promote Relevant Information Security Research
Published 2007-03-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
9
Column: The Consortium of Digital Forensics Specialists (CDFS)
Published 2011-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
10
Book Review: Dispute Resolution and e-Discovery
Published 2012-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
11
Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System
Published 2012-12-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
12
Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Published 2011-12-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
13
An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach
Published 2014-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
14
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence
Published 2007-03-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
15
File Detection On Network Traffic Using Approximate Matching
Published 2014-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
16
Column: File Cabinet Forensics
Published 2011-12-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
17
Telecommunications Liberalisation in Africa: Proposed Regulatory Model for the SADC Region
Published 2009-12-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
18
Book Review: The X-Ways Forensics Practitioner's Guide
Published 2014-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
19
Trends In Android Malware Detection
Published 2013-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article -
20
The Cost of Privacy: Riley v. California's Impact on Cell Phone Searches
Published 2014-09-01“…Journal of Digital Forensics, Security and Law…”
Get full text
Article