Abstract is missing.
- On Reliability of JA3 Hashes for Fingerprinting Mobile ApplicationsPetr Matousek, Ivana Burgetova, Ondrej Rysavý, Malombe Victor. 1-22 [doi]
- Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic InvestigationsMarcel Busch, Florian Nicolai, Fabian Fleischer, Christian Rückert, Christoph Safferling, Felix C. Freiling. 23-43 [doi]
- Evidence Gathering in IoT Criminal InvestigationFrançois Bouchaud, Thomas Vantroys, Gilles Grimaud. 44-61 [doi]
- Effective Medical Image Copy-Move Forgery Localization Based on Texture DescriptorJiaqi Shi, Gang Wang, Ming Su, Xiaoguang Liu. 62-77 [doi]
- A Partial Approach to Intrusion DetectionJohn Sheppard 0002. 78-97 [doi]
- Efficient Fingerprint Matching for Forensic Event ReconstructionTobias Latzo. 98-120 [doi]
- Modelling GOP Structure Effects on ENF-Based Video ForensicsPasquale Ferrara, Gerard Draper-Gil, Ignacio Sanchez, Henrik Junklewitz, Laurent Beslay. 121-138 [doi]
- Android Dumpsys Analysis to Indicate Driver DistractionLukas Bortnik, Arturs Lavrenovs. 139-163 [doi]
- Adapting to Local Conditions: Similarities and Differences in Anonymous Online Market Between Chinese and English Speaking CommunitiesGengqian Zhou, Jianwei Zhuge. 164-181 [doi]
- Remote Air-Gap Live ForensicsTom Van der Mussele, Babak Habibnia, Pavel Gladyshev. 182-203 [doi]
- A Digital Forensic Approach for Optimizing the Investigation of Hit-and-Run AccidentsMarian Waltereit, Maximilian Uphoff, Peter Zdankin, Viktor Matkovic, Torben Weis. 204-223 [doi]
- An Intelligence Criminal Tracker for Industrial Espionage - Applying Digital Data Acquired Onsite to Target CriminalsJieun Dokko, Michael Shin, Soo-young Park. 224-230 [doi]
- Retracing the Flow of the Stream: Investigating Kodi Streaming ServicesSamuel Todd Bromley, John Sheppard 0002, Mark Scanlon, Nhien-An Le-Khac. 231-236 [doi]
- Cybersecurity Methodology for Specialized Behavior AnalysisEdgar Padilla, Jaime C. Acosta, Christopher D. Kiekintveld. 237-243 [doi]
- Neural Representation Learning Based Binary Code Authorship AttributionZhongmin Wang, Zhen Feng, Zhenzhou Tian. 244-249 [doi]