Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
2014
YesterdayYesterday
2219
This weekThis week
9422
Last WeekLast week
13850
This monthThis month
5917
Last monthLast month
50787
All daysAll days
5832990

Journal of Digital Forensics, Security and Law

Number 4, 2013

  • 7-24
    Analysis of Second Hand Google Mini Search Appliance
    Authors: Stephen Parker Larson
    Number of views: 501
  • 25-48
    The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice
    Authors: Richard Brian Adams, Val Hobbs, Graham Mann
    Number of views: 536
  • 65-68
    Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Authors: Simson Garfinkel
    Number of views: 468

Number 3, 2013

  • 7-20
    Risk Management Of Email And Internet Use In The Workplace
    Authors: John C Ruhnka, Windham E. Loopesko
    Number of views: 486
  • 21-40
    Trends In Android Malware Detection
    Authors: Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
    Number of views: 461
  • 41-70
    Money Laundering Detection Framework to Link the Disparate and Evolving Schemes
    Authors: Murad Mehmet, Miguel Fuentes Buchholtz
    Number of views: 471
  • 71-86
    System-Generated Digital Forensic Evidence in Graphic Design Applications
    Authors: Enos Mabuto, Hein Venter
    Number of views: 461
  • 87-90
    Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E
    Authors: Joshua Bartolomie
    Number of views: 454

Number 2, 2013

  • 7-40
    Automating Vendor Fraud Detection in Enterprise Systems
    Authors: Kishore Singh, Peter Best, Joseph Mula
    Number of views: 491
  • 41-72
    The Digital Forensics and Security Challenge of QR Codes
    Authors: Nik Thompson, Kevin Lee
    Number of views: 434
  • 73-92
    How Often is Employee Anger an Insider Risk II?
    Authors: Eric David Shaw
    Number of views: 465
  • 93-114
    Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2)
    Authors: Damian Schofield, Ken Fowle
    Number of views: 502
  • 115-118
    Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
    Authors: Thomas Nash
    Number of views: 472

Number 1, 2013

  • 7-16
    Science Column: Measuring Inconsistency Methods for Evidentiary Value
    Authors: Fred Cohen
    Number of views: 459
  • 17-38
    A Simple Experiment With Microsoft Office 2010 and Windows 7 Utilizing Digital Forensic Methodology
    Authors: Gregory H. Carlton
    Number of views: 478
  • 39-72
    How Often is Employee Anger an Insider Risk I?
    Authors: Eric David Shaw
    Number of views: 460
  • 73-90
    Visualizing Forensic Data : Evidence Guidelines (Part 1)
    Authors: Damian Schofield
    Number of views: 465


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us