Abstract is missing.
- A Digital Body Farm for Collecting Deleted File Decay DataOmoche Cheche Agada, Ibifubara Iganibo, James Jones, Kevin D. Fairbanks. 3-20 [doi]
- Realistic and Configurable Synthesis of Malware Traces in Windows SystemsMartin Lukner, Thomas Göbel, Harald Baier. 21-44 [doi]
- Smartphone Data Distributions and Requirements for Realistic Mobile Device Forensic CorporaPatrik Gonçalves, Andreas Attenberger, Harald Baier. 47-63 [doi]
- Forensic Analysis of the Snapchat iOS App with Spectacles-Synced ArtifactsLogan VanPutte, Gokila Dorai, Andrew Clark IV, Rayna Mock, Josh Brunty. 65-81 [doi]
- Spoofed Fingerprint Image Detection Using Local Phase Patch Segment Extraction and a Lightweight NetworkSani Mohammed Abdullahi, Shuifa Sun, Asad Malik, Otabek Khudayberdiev, Riskhan Basheer. 85-105 [doi]
- A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering ForensicsYuling Luo, Ce Liang, Shunsheng Zhang, Sheng Qin. 107-121 [doi]
- Deepfake Detection Using Multiple Feature FusionYa Zhang, Xin Jin 0005, Qian Jiang, Yunyun Dong, Nan Wu, Shaowen Yao, Wei Zhou 0011. 123-139 [doi]
- Identifying Desired Timestamps in Carved Digital Video Recorder FootageDivam Lehri, Anyesh Roy. 141-152 [doi]
- Identifying the Leak Sources of Hard Copy DocumentsPulkit Garg, Garima Gupta, Ranjan Kumar, Somitra Sanadhya, Gaurav Gupta. 155-167 [doi]
- Community Detection in a Web Discussion Forum During Social Unrest EventsAo Shen, Kam-Pui Chow. 169-185 [doi]
- Analyzing the Error Rates of Bitcoin Clustering HeuristicsYanan Gong, Kam-Pui Chow, Hing-Fung Ting, Siu-Ming Yiu. 187-205 [doi]