| 0 | -- | 0 | Thomas Göbel, Harald Baier, Frank Breitinger. Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable |
| 0 | -- | 0 | Anthony Rose, Scott R. Graham, Jacob J. Krasnov. IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines |
| 0 | -- | 0 | Oleg Boyarchuk, Sebastiano Mariani, Stefano Ortolani, Giovanni Vigna. Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet |
| 0 | -- | 0 | Samantha Klier, Jan Varenkamp, Harald Baier. Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows |
| 0 | -- | 0 | Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. Gotta Catch 'em All: A Multistage Framework for Honeypot Fingerprinting |
| 0 | -- | 0 | Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, Felix C. Freiling. LAVA: Log Authentication and Verification Algorithm |
| 0 | -- | 0 | Kibreab Adane, Berhanu Beyene, Mohammed Abebe Yimer. Single and Hybrid-Ensemble Learning-Based Phishing Website Detection: Examining Impacts of Varied Nature Datasets and Informative Feature Selection Technique |
| 0 | -- | 0 | Florian Bausch, Andreas Dewald. Forensic Examination of Ceph |
| 0 | -- | 0 | Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief. Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions |
| 0 | -- | 0 | P. Mohan Anand, P. V. Sai Charan, Sandeep K. Shukla. HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters |
| 0 | -- | 0 | Andreas Dewald, Thomas Schreck. Introduction to the IMF 2023 Special Issue |
| 0 | -- | 0 | Jan Gruber, Merlin Humml. A Formal Treatment of Expressiveness and Relevanceof Digital Evidence |
| 0 | -- | 0 | Mattia Falduti, Sergio Tessaris. Mapping the Interdisciplinary Research on Non-consensual Pornography: Technical and Quantitative Perspectives |
| 0 | -- | 0 | Marcus Botacin, Uriel Kosayev, Ruimin Sun. Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats |
| 0 | -- | 0 | Andreas Hammer 0003, Mathis Ohlig, Julian Geus, Felix C. Freiling. A Functional Classification of Forensic Access to Storage and its Legal Implications |
| 0 | -- | 0 | Tobias Hilbig, Thomas Geras, Erwin Kupris, Thomas Schreck. security.txt Revisited: Analysis of Prevalence and Conformity in 2022 |