Abstract is missing.
- Digital Forensics and the Big Data Deluge - Some Concerns Based on Ramsey TheoryMartin Olivier 0001. 3-23 [doi]
- Identity and Sufficiency of Digital EvidenceMichael Losavio. 25-36 [doi]
- Interactive Temporal Digital Forensic Event AnalysisNikolai Adderley, Gilbert Peterson. 39-55 [doi]
- Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple DetectorsWeiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang. 57-72 [doi]
- A Novel Approach for Generating Synthetic Datasets for Digital ForensicsThomas Göbel, Thomas Schäfer, Julien Hachenberger, Jan Türr, Harald Baier. 73-93 [doi]
- Detecting Attacks on a Water Treatment System Using Oneclass Support Vector MachinesKen Yau, Kam-Pui Chow, Siu-Ming Yiu. 95-108 [doi]
- A Digital Media Similarity Measure for Triage of Digital Forensic EvidenceMyeong Lim, James Jones. 111-135 [doi]
- Resident Data Pattern Analysis Using Sector Clustering for Storage Drive ForensicsNitesh K. Bharadwaj, Upasna Singh, Gaurav Gupta. 137-157 [doi]
- Forensic Analysis of Advanced Persistent Threat Attacks in Cloud EnvironmentsChangwei Liu, Anoop Singhal, Duminda Wijesekera. 161-180 [doi]
- A Taxonomy of Hypervisor Forensic ToolsAnand Kumar Mishra, Mahesh Chandra Govil, Emmanuel S. Pilli. 181-199 [doi]
- Public Opinion Monitoring for Proactive Crime Detection Using Named Entity RecognitionWencan Wu, Kam-Pui Chow, Yonghao Mai, Jun Zhang. 203-214 [doi]
- Retrieving E-Dating Application Artifacts from iPhone BackupsRanul Deelaka Thantilage, Nhien-An Le-Khac. 215-230 [doi]
- Target Identity Attacks on Facial Recognition SystemsSaheb Chhabra, Naman Banati, Gaurav Gupta, Garima Gupta. 233-252 [doi]
- Electric Network Frequency Based Audio Forensics Using Convolutional Neural NetworksMaoyu Mao, Zhongcheng Xiao, Xiangui Kang, Xiang Li, Liang Xiao 0003. 253-270 [doi]
- Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised LearningYichen Wei, Kam-Pui Chow, Siu-Ming Yiu. 273-290 [doi]
- Detecting Local Machine Data Leakage in Real TimeJingcheng Liu 0003, Yaping Zhang, Yuze Li, Yongheng Jia, Yao Chen, Jin Cao. 291-308 [doi]