Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

INMATEH - Agricultural Engineering
Animal Research International
Revista Ensayos Pedagógicos
Cell Journal (Yakhteh)



Register Journal



Visitors Counter

TodayToday
380
YesterdayYesterday
1996
This weekThis week
7216
Last WeekLast week
9202
This monthThis month
28108
Last monthLast month
43360
All daysAll days
5804394

Journal of Digital Forensics, Security and Law

Number 1, 2014

  • 7-18
    Idiographic Digital Profiling: Behavioral Analysis Based on Digital Footprints
    Authors: Chad Steel
    Number of views: 478
  • 19-36
    Personal Denial Of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime
    Authors: Michael Raymond Bartolacci, Larry J LeBlanc, Ashley Podhradsky
    Number of views: 432
  • 37-56
    On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems
    Authors: Wei Gao, Thomas H Morris
    Number of views: 506
  • 57-66
    Using Internet Artifacts To Profile A Child Pornography Suspect
    Authors: Marcus K. Rogers, Kathryn C. Seigfried-Spellar
    Number of views: 456
  • 67-82
    Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering
    Authors: Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague
    Number of views: 438
  • 83-85
    Book Review: The Basics Of Digital Forensics: The Primer For Getting Started In Digital Forensics
    Authors: Stephen Larson
    Number of views: 484

Number 4, 2013

  • 7-24
    Analysis of Second Hand Google Mini Search Appliance
    Authors: Stephen Parker Larson
    Number of views: 496
  • 25-48
    The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice
    Authors: Richard Brian Adams, Val Hobbs, Graham Mann
    Number of views: 530
  • 65-68
    Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Authors: Simson Garfinkel
    Number of views: 463

Number 3, 2013

  • 7-20
    Risk Management Of Email And Internet Use In The Workplace
    Authors: John C Ruhnka, Windham E. Loopesko
    Number of views: 480
  • 21-40
    Trends In Android Malware Detection
    Authors: Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
    Number of views: 454
  • 41-70
    Money Laundering Detection Framework to Link the Disparate and Evolving Schemes
    Authors: Murad Mehmet, Miguel Fuentes Buchholtz
    Number of views: 462
  • 71-86
    System-Generated Digital Forensic Evidence in Graphic Design Applications
    Authors: Enos Mabuto, Hein Venter
    Number of views: 457
  • 87-90
    Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E
    Authors: Joshua Bartolomie
    Number of views: 447

Number 2, 2013

  • 7-40
    Automating Vendor Fraud Detection in Enterprise Systems
    Authors: Kishore Singh, Peter Best, Joseph Mula
    Number of views: 486
  • 41-72
    The Digital Forensics and Security Challenge of QR Codes
    Authors: Nik Thompson, Kevin Lee
    Number of views: 430
  • 73-92
    How Often is Employee Anger an Insider Risk II?
    Authors: Eric David Shaw
    Number of views: 459
  • 93-114
    Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2)
    Authors: Damian Schofield, Ken Fowle
    Number of views: 496
  • 115-118
    Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
    Authors: Thomas Nash
    Number of views: 469

Number 1, 2013

  • 7-16
    Science Column: Measuring Inconsistency Methods for Evidentiary Value
    Authors: Fred Cohen
    Number of views: 455
  • 17-38
    A Simple Experiment With Microsoft Office 2010 and Windows 7 Utilizing Digital Forensic Methodology
    Authors: Gregory H. Carlton
    Number of views: 475
  • 39-72
    How Often is Employee Anger an Insider Risk I?
    Authors: Eric David Shaw
    Number of views: 456
  • 73-90
    Visualizing Forensic Data : Evidence Guidelines (Part 1)
    Authors: Damian Schofield
    Number of views: 458


1 2 3 4 5  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us