Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
684
YesterdayYesterday
2118
This weekThis week
10210
Last WeekLast week
13850
This monthThis month
6705
Last monthLast month
50787
All daysAll days
5833778

Journal of Digital Forensics, Security and Law

Number 4, 2012

  • 7-20
    Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media
    Authors: Fred Cohen
    Number of views: 334
  • 21-50
    Confronting Potential Injustice with Preemptive Suppression
    Authors: Robert Vose Simpson
    Number of views: 308
  • 51-72
    An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users
    Authors: Patryk Szewczyk
    Number of views: 306
  • 73-98
    Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System
    Authors: Manghui Tu
    Number of views: 318
  • 99-116
    Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model
    Authors: Gary D Cantrell, David Dampier
    Number of views: 315
  • 117-124
    Book Review: Mastering Windows Network Forensics and Investigation, 2/e
    Authors: John C. Ebert
    Number of views: 455
  • 125-132
    Technology Corner: A Regular Expression Training App
    Authors: Nick Flor
    Number of views: 321

Number 3, 2012

  • 5-12
    Column: The Science of Digital Forensics: Analysis of Digital Traces
    Authors: Fred Cohen
    Number of views: 300
  • 13-32
    On the Development of Digital Forensics Curriculum
    Authors: Manghui Tu, Dianxiang Xu, Cristian Balan, Kyle Cronin
    Number of views: 340
  • 33-54
    Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9
    Authors: John Moran, Douglas Orr
    Number of views: 325
  • 55-82
    Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
    Authors: David Irwin, Arek Dadej, Jill Slay
    Number of views: 341
  • 83-110
    To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners
    Authors: Thomas Lonardo, Doug White, Alan Rea
    Number of views: 319
  • 111-114
    Book Review: Dispute Resolution and e-Discovery
    Authors: Milton Luoma
    Number of views: 351

Number 2, 2012

  • 7-10
    Column: Factors Affecting Data Decay
    Authors: Kevin Fairbanks, Simson Garfinkel
    Number of views: 318
  • 11-42
    DNS in Computer Forensics
    Authors: Neil Fowler Wright
    Number of views: 397
  • 43-60
    Automated Identification and Reconstruction of YouTube Video Access
    Authors: Jonathan Patterson, Christopher Hargreaves
    Number of views: 347
  • 61-74
    Toward Alignment between Communities of Practice and Knowledge-Based Decision Support
    Authors: Jason Nichols, David Biros, Mark Weiser
    Number of views: 313
  • 75-88
    Digital Evidence Education in Schools of Law
    Authors: Aaron Alva, Barbara Endicott-Popovsky
    Number of views: 329
  • 89-112
    Identifying and Attributing Similar Traces with Greatest Common Factor Analysis
    Authors: Fred Cohen
    Number of views: 321
  • 113-142
    Identifying Trace Evidence in Data Wiping Application Software
    Authors: Gregory H. Carlton, Gary C Kessler
    Number of views: 366
  • 143-148
    Book Review: System Forensics, Investigation, and Response
    Authors: Nate Keith
    Number of views: 331
  • 149-164
    Technology Corner: Automated Data Extraction Using Facebook
    Authors: Nick Flor
    Number of views: 356

Number 1, 2012

  • 7-14
    Column: The Physics of Digital Information-Part 2
    Authors: Fred Cohen
    Number of views: 367
  • 15-28
    An Overview of the Jumplist Configuration File in Windows 7
    Authors: Harjinder Singh Lallie, Parmjit Bains
    Number of views: 361
  • 29-54
    Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery Detection and Validation.
    Authors: Richard Boddington, Jeremy Ardley, Grant Austin Boxall
    Number of views: 327
  • 55-70
    Comparing Android Applications to Find Copying
    Authors: Larry Melling, Bob Zeidman
    Number of views: 303
  • 71-86
    Challenges in Applying the ACPO Principles in Cloud Forensic Investigations
    Authors: Harjinder Singh Lallie
    Number of views: 325
  • 87-92
    Book Review: The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detections
    Authors: Diane Barrett
    Number of views: 329
  • 93-100
    Technology Corner: Dating of Electronic Hardware for Prior Art Investigations
    Authors: Sellam Ismail
    Number of views: 338


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us