Journal: DTRAP

Volume 6, Issue 4

0 -- 0Jan-Hendrik Lang, Thomas Schreck. Leveraging LLMs for Memory Forensics: A Comparative Analysis of Malware Detection
0 -- 0Thomas Göbel, Harald Baier. From IaC to IoC - Using Infrastructure as Code (IaC) to Generate Synthetic Datasets of Compromised (IoC) Linux Systems for Use in Digital Forensics
0 -- 0Kerstin Schmid, Konstantin Bayreuther, Felix C. Freiling. Limits to the Forensic Analysis of Container Applications in Cloud Environments
0 -- 0Céline Vanini, Chris Hargreaves, Frank Breitinger. Evaluating Tamper Resistance of Digital Forensic Artifacts during Event Reconstruction
0 -- 0Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief. Validating a Set of Candidate Criteria for Evaluating Software Tools and Data Sources for National CSIRTs' Cyber Incident Responses
0 -- 0Samantha Klier, Harald Baier. Metrics Matter - Source Camera Forensics for Large-Scale Investigations
0 -- 0Thomas Schreck, Stefan Kiltz. Introduction to the IMF 2025 Special Issue
0 -- 0Raymond Andre Hagen, Lasse Øverlier, Kirsi Helkala. Human Factors in AI-Driven Cybersecurity: Cognitive Biases and Trust Issues
0 -- 0Max Landauer, Leonhard Alton, Martina Lindorfer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner. Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity
0 -- 0Gaëtan Michelet, Hans Henseler, Harm M. A. van Beek, Mark Scanlon, Frank Breitinger. Fine-Tuning Large Language Models for Digital Forensics: Case Study and General Recommendations
0 -- 0Dennis Tan Jia Jun, Ahmad Sahban Rafsanjani, Saad Aslam, Mehran Behjati. Human Factors in Information Security: A Quantitative Study with Technical Solutions to Prevent Social Engineering Attacks
0 -- 0Niclas Pohl, Lena L. Voigt, Christopher Hargreaves, Christofer Fein, Felix C. Freiling. DiskForge: Timestomping on Disk Images for Educational Benefit
0 -- 0Sebastian Hilgert. Old Wine in New Wineskins: How Remnant Data Challenges Forensics and the Law
0 -- 0Saskia Laura Schröer, Jeremy D. Seideman, Shoufu Luo, Giovanni Apruzzese, Sven Dietrich, Pavel Laskov. Using a Stack to Find an AI Needle: Topic Modeling for Cyber Threat Intelligence
0 -- 0Yushawu Abubakari, Valeen Oseh-Ovarah. The Gamification of Online Romance Fraud through Offenders' Cards

Volume 6, Issue 3

0 -- 0David Schwarzbeck, Daniela Novac, Michael Philippsen. Register Expansion, SemaCall, and SideData: Three Low-Overhead Dynamic Watermarks Suitable for Automation in LLVM
0 -- 0Animesh Singh Basnet, Mohamed Chahine Ghanem, Dipo Dunsin, Hamza Kheddar, Wiktor Sowinski-Mydlarz. Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning
0 -- 0Chidera Biringa, Gökhan Kul. Detecting Hard-Coded Credentials in Software Repositories via LLMs
0 -- 0Seth Layton, Thiago De Andrade, Daniel Olszewski, Kevin Warren, Carrie Gates, Kevin R. B. Butler, Patrick Traynor. Every Breath You Don't Take: Deepfake Speech Detection Using Breath
0 -- 0Michele Ianni, Sebastian Schrittwieser. Special Issue on Offensive and Defensive Techniques in the Context of Man-At-The-End (MATE) Attacks
0 -- 0Abdullah Aydeger, Engin Zeydan, Josep Mangues-Bafalluy, Suayb S. Arslan, Yekta Turk. Enhancing Electric Vehicle Security and Privacy through Decentralized Identity Management
0 -- 0Yudha Purwanto, Muhammad Faris Ruriawan, Agus Virgono, Hamzah Fatihulhaq, Muhammad Fauzan Anshori, Gregorius Belva Ivander, Rayyan Ramanda, Lutfiana Erniasari, Muhammad Daffa Satria. Certifichain: Secure QR Codes for Blockchain-Verified Digital Credentials
0 -- 0Jean-Marie Mineau, Jean-François Lalande. Class Loaders in the Middle: Confusing Android Static Analyzers
0 -- 0Kamalakkannan Ravi, Jiann-shiun Yuan. ALERT: Active Learning and Explainable AI for Robust Threat Detection in Telegram

Volume 6, Issue 2

0 -- 0Mahir Mahbub, Mohammed Shafiul Alam Khan, Tasnima Hamid, Md. Shakil Mia. A Novel Vulnerability Exploit Prediction System Using the Relational Vulnerability-Vendor Network
0 -- 0Emily Kesler, Lorie Liebrock. A Transdisciplinary Approach to Cybersecurity: A Framework for Encouraging Transdisciplinary Thinking
0 -- 0Prateema Sharma, Wisam Al-Dayyeni, Tapsi Nagpal, Arun Kumar Rana, Rahul Purohit, Ahmed Elaraby. A Novel Hybrid Algorithm for Fake News Detection
0 -- 0Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das. From ML to LLM: Evaluating the Robustness of Phishing Web Page Detection Models against Adversarial Attacks

Volume 6, Issue 1

1 -- 23Quoc H. Nguyen, Soumyadeep Hore, Ankit Shah 0002, Trung Q. Le, Nathaniel D. Bastian. FedNIDS: A Federated Learning Framework for Packet-Based Network Intrusion Detection System
1 -- 22Justin Novak, Angel Hueca, Christopher Rodman, Samuel J. Perl, Travis D. Breaux, Justin Valdengo. Building a Better SOC: Towards the Ontology for Security Operations Center Assistance and Replication (OSCAR)
1 -- 20Emirhan Böge, Murat Bilgehan Ertan, Halit Alptekin, Orçun Çetin. Unveiling Cyber Threat Actors: A Hybrid Deep Learning Approach for Behavior-Based Attribution
1 -- 3Samuel J. Perl, Jeroen van der Ham-de Vos, Thomas Schreck. Introduction to the Special Issue on Incident Response
1 -- 36Lasse Nitz, Mehdi Akbari Gurabi, Milan Cermák, Martin Zádník, David A. Karpuk, Arthur Drichel, Sebastian Schäfer 0004, Benedikt Holmes, Avikarsha Mandal. On Collaboration and Automation in the Context of Threat Detection and Response with Privacy-Preserving Features
1 -- 11Geir Skjøtskift, Martin Eian, Siri Bromander. Automated ATT&CK Technique Chaining