| 0 | -- | 0 | Jan-Hendrik Lang, Thomas Schreck. Leveraging LLMs for Memory Forensics: A Comparative Analysis of Malware Detection |
| 0 | -- | 0 | Thomas Göbel, Harald Baier. From IaC to IoC - Using Infrastructure as Code (IaC) to Generate Synthetic Datasets of Compromised (IoC) Linux Systems for Use in Digital Forensics |
| 0 | -- | 0 | Kerstin Schmid, Konstantin Bayreuther, Felix C. Freiling. Limits to the Forensic Analysis of Container Applications in Cloud Environments |
| 0 | -- | 0 | Céline Vanini, Chris Hargreaves, Frank Breitinger. Evaluating Tamper Resistance of Digital Forensic Artifacts during Event Reconstruction |
| 0 | -- | 0 | Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief. Validating a Set of Candidate Criteria for Evaluating Software Tools and Data Sources for National CSIRTs' Cyber Incident Responses |
| 0 | -- | 0 | Samantha Klier, Harald Baier. Metrics Matter - Source Camera Forensics for Large-Scale Investigations |
| 0 | -- | 0 | Thomas Schreck, Stefan Kiltz. Introduction to the IMF 2025 Special Issue |
| 0 | -- | 0 | Raymond Andre Hagen, Lasse Øverlier, Kirsi Helkala. Human Factors in AI-Driven Cybersecurity: Cognitive Biases and Trust Issues |
| 0 | -- | 0 | Max Landauer, Leonhard Alton, Martina Lindorfer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner. Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity |
| 0 | -- | 0 | Gaëtan Michelet, Hans Henseler, Harm M. A. van Beek, Mark Scanlon, Frank Breitinger. Fine-Tuning Large Language Models for Digital Forensics: Case Study and General Recommendations |
| 0 | -- | 0 | Dennis Tan Jia Jun, Ahmad Sahban Rafsanjani, Saad Aslam, Mehran Behjati. Human Factors in Information Security: A Quantitative Study with Technical Solutions to Prevent Social Engineering Attacks |
| 0 | -- | 0 | Niclas Pohl, Lena L. Voigt, Christopher Hargreaves, Christofer Fein, Felix C. Freiling. DiskForge: Timestomping on Disk Images for Educational Benefit |
| 0 | -- | 0 | Sebastian Hilgert. Old Wine in New Wineskins: How Remnant Data Challenges Forensics and the Law |
| 0 | -- | 0 | Saskia Laura Schröer, Jeremy D. Seideman, Shoufu Luo, Giovanni Apruzzese, Sven Dietrich, Pavel Laskov. Using a Stack to Find an AI Needle: Topic Modeling for Cyber Threat Intelligence |
| 0 | -- | 0 | Yushawu Abubakari, Valeen Oseh-Ovarah. The Gamification of Online Romance Fraud through Offenders' Cards |