Abstract is missing.
- On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory CarvingLorenz Liebler, Harald Baier. 3-22 [doi]
- fishy - A Framework for Implementing Filesystem-Based Data Hiding TechniquesThomas Göbel, Harald Baier. 23-42 [doi]
- If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-ConceptTrevor Haigh, Frank Breitinger, Ibrahim M. Baggili. 45-65 [doi]
- AndroParse - An Android Feature Extraction Framework and DatasetRobert Schmicker, Frank Breitinger, Ibrahim M. Baggili. 66-88 [doi]
- Digital Forensic Readiness Framework for Ransomware InvestigationAvinash Singh, Adeyemi R. Ikuesan, Hein S. Venter. 91-105 [doi]
- Forensics Analysis of an On-line Game over Steam PlatformRaquel Tabuyo-Benito, Hayretdin Bahsi, Pedro Peris-Lopez. 106-127 [doi]
- A Digital Forensic Investigation and Verification Model for Industrial EspionageJieun Dokko, Michael Shin. 128-146 [doi]
- Solid State Drive Forensics: Where Do We Stand?John Vieyra, Mark Scanlon, Nhien-An Le-Khac. 149-164 [doi]
- Associating Drives Based on Their Artifact and Metadata DistributionsNeil C. Rowe. 165-182 [doi]
- Digital Forensics Event Graph ReconstructionDaniel J. Schelkoph, Gilbert L. Peterson, James S. Okolica. 185-203 [doi]
- Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing AttacksJaryn Shen, Kim-Kwang Raymond Choo, Qingkai Zeng. 204-221 [doi]
- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network BehaviorHassan Hadi Latheeth AL-Maksousy, Michele C. Weigle. 225-234 [doi]