Abstract is missing.
- Establishing Findings in Digital Forensic Examinations: A Case Study MethodOluwasayo Oyelami, Martin Olivier. 3-21 [doi]
- A Model for Digital Evidence Admissibility AssessmentAlbert Antwi-Boasiako, Hein S. Venter. 23-38 [doi]
- Evaluating the Authenticity of Smartphone EvidenceHeloise Pieterse, Martin Olivier, Renier van Heerden. 41-61 [doi]
- Forensic Evaluation of an Amazon Fire TV StickLogan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland. 63-79 [doi]
- Detecting Anomalous Programmable Logic Controller Events Using Machine LearningKen Yau, Kam-Pui Chow. 81-94 [doi]
- A Forensic Methodology for Software-Defined Network SwitchesTommy Chin, Kaiqi Xiong. 97-110 [doi]
- Identifying Evidence for Cloud Forensic AnalysisChangwei Liu, Anoop Singhal, Duminda Wijesekera. 111-130 [doi]
- Digital Forensic Implications of Collusion Attacks on the Lightning NetworkDmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski. 133-147 [doi]
- Insider Threat Detection Using Time-Series-Based Raw Disk Forensic AnalysisNicole Beebe, Lishu Liu, Zi Ye. 149-167 [doi]
- Anti-Forensic Threat ModelingBruno W. P. Hoelz, Marcelo Maues. 169-183 [doi]
- A Behavior-Based Approach for Malware DetectionRayan Mosli, Rui Li, Bo Yuan, Yin Pan. 187-201 [doi]
- Categorizing Mobile Device Malware Based on System Side-EffectsZachary Grimmett, Jason Staggs, Sujeet Shenoi. 203-219 [doi]
- Semantic Video Carving Using Perceptual Hashing and Optical FlowJun-bin Fang, Sijin Li, Guikai Xi, Zoe L. Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li. 223-244 [doi]
- Detecting Fraudulent Bank ChecksSaheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta. 245-266 [doi]
- Automated Collection and Correlation of File Provenance InformationRyan Good, Gilbert Peterson. 269-284 [doi]
- Using Personal Information in Targeted Grammar-Based Probabilistic Password AttacksShiva Houshmand, Sudhir Aggarwal. 285-303 [doi]