Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Journal of Entrepreneurship, Business and Economics
International Journal of Social Sciences and Management
Drugs in Context
Revista dos Estudantes de Direito da UnB



Register Journal



Visitors Counter

TodayToday
1746
YesterdayYesterday
1684
This weekThis week
6935
Last WeekLast week
13850
This monthThis month
3430
Last monthLast month
50787
All daysAll days
5830503

Journal of Digital Forensics, Security and Law

Number 4, 2012

  • 7-20
    Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media
    Authors: Fred Cohen
    Number of views: 333
  • 21-50
    Confronting Potential Injustice with Preemptive Suppression
    Authors: Robert Vose Simpson
    Number of views: 307
  • 51-72
    An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users
    Authors: Patryk Szewczyk
    Number of views: 305
  • 73-98
    Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System
    Authors: Manghui Tu
    Number of views: 317
  • 99-116
    Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model
    Authors: Gary D Cantrell, David Dampier
    Number of views: 314
  • 117-124
    Book Review: Mastering Windows Network Forensics and Investigation, 2/e
    Authors: John C. Ebert
    Number of views: 454
  • 125-132
    Technology Corner: A Regular Expression Training App
    Authors: Nick Flor
    Number of views: 320

Number 3, 2012

  • 5-12
    Column: The Science of Digital Forensics: Analysis of Digital Traces
    Authors: Fred Cohen
    Number of views: 299
  • 13-32
    On the Development of Digital Forensics Curriculum
    Authors: Manghui Tu, Dianxiang Xu, Cristian Balan, Kyle Cronin
    Number of views: 339
  • 33-54
    Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9
    Authors: John Moran, Douglas Orr
    Number of views: 324
  • 55-82
    Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech
    Authors: David Irwin, Arek Dadej, Jill Slay
    Number of views: 338
  • 83-110
    To License or Not to License Updated: An Examination of State Statutes Regarding Private Investigators and Digital Examiners
    Authors: Thomas Lonardo, Doug White, Alan Rea
    Number of views: 318
  • 111-114
    Book Review: Dispute Resolution and e-Discovery
    Authors: Milton Luoma
    Number of views: 350

Number 2, 2012

  • 7-10
    Column: Factors Affecting Data Decay
    Authors: Kevin Fairbanks, Simson Garfinkel
    Number of views: 317
  • 11-42
    DNS in Computer Forensics
    Authors: Neil Fowler Wright
    Number of views: 396
  • 43-60
    Automated Identification and Reconstruction of YouTube Video Access
    Authors: Jonathan Patterson, Christopher Hargreaves
    Number of views: 346
  • 61-74
    Toward Alignment between Communities of Practice and Knowledge-Based Decision Support
    Authors: Jason Nichols, David Biros, Mark Weiser
    Number of views: 312
  • 75-88
    Digital Evidence Education in Schools of Law
    Authors: Aaron Alva, Barbara Endicott-Popovsky
    Number of views: 328
  • 89-112
    Identifying and Attributing Similar Traces with Greatest Common Factor Analysis
    Authors: Fred Cohen
    Number of views: 320
  • 113-142
    Identifying Trace Evidence in Data Wiping Application Software
    Authors: Gregory H. Carlton, Gary C Kessler
    Number of views: 365
  • 143-148
    Book Review: System Forensics, Investigation, and Response
    Authors: Nate Keith
    Number of views: 330
  • 149-164
    Technology Corner: Automated Data Extraction Using Facebook
    Authors: Nick Flor
    Number of views: 353

Number 1, 2012

  • 7-14
    Column: The Physics of Digital Information-Part 2
    Authors: Fred Cohen
    Number of views: 366
  • 15-28
    An Overview of the Jumplist Configuration File in Windows 7
    Authors: Harjinder Singh Lallie, Parmjit Bains
    Number of views: 360
  • 29-54
    Pandora's Email Box? An Exploratory Study of Web-Based Email Forgery Detection and Validation.
    Authors: Richard Boddington, Jeremy Ardley, Grant Austin Boxall
    Number of views: 326
  • 55-70
    Comparing Android Applications to Find Copying
    Authors: Larry Melling, Bob Zeidman
    Number of views: 302
  • 71-86
    Challenges in Applying the ACPO Principles in Cloud Forensic Investigations
    Authors: Harjinder Singh Lallie
    Number of views: 324
  • 87-92
    Book Review: The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detections
    Authors: Diane Barrett
    Number of views: 328
  • 93-100
    Technology Corner: Dating of Electronic Hardware for Prior Art Investigations
    Authors: Sellam Ismail
    Number of views: 337

Number 4, 2011

  • 7-10
    Column: File Cabinet Forensics
    Authors: Simson Garfinkel
    Number of views: 279
  • 11-18
    Working Inside The Box: An Example Of Google Desktop Search in a Forensic Examination
    Authors: Timothy James LaTulippe
    Number of views: 313
  • 19-34
    Legal Issues Regarding Digital Forensic Examiners Third Party Consent to Search
    Authors: Thomas Lonardo, Tricia Martland, Doug White, Alan Rea
    Number of views: 343
  • 35-62
    Investigating Modern Communication Technologies: The effect of Internet-based Communication Technologies on the Investigation Process
    Authors: Matthew Phillip Simon
    Number of views: 318
  • 63-66
    Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Authors: Schulte Christopher
    Number of views: 327
  • 67-74
    Technology Corner: Virtual Crime Scene Reconstruction: The Basics of 3D Modeling
    Authors: Nick Flor
    Number of views: 317


 В начало  Предыдущая страница  1 2 3 4 5 6  Следующая страница  В конец
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us