Abstract is missing.
- Forensic Analysis of the iOS Apple Pay Mobile Payment SystemTrevor Nicholson, Darren R. Hayes, Nhien-An Le-Khac. 3-19 [doi]
- Forensic Analysis of Android Cryptocurrency Wallet ApplicationsChen Shi, Yong Guan. 21-36 [doi]
- An Anti-Fuzzing Approach for Android AppsChris Chao-Chun Cheng, Li Lin 0004, Chen Shi, Yong Guan. 37-53 [doi]
- Nintendo 3DS Forensic Examination ToolsKonstantinos Xynos, Huw Read, Iain Sutherland, Matthew Bovee, Trang Do. 55-70 [doi]
- Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot EcosystemArmin Ziaie Tabari, GuoJun Liu, Xinming Ou, Anoop Singhal. 73-90 [doi]
- Towards Direct-Control Data Acquisition by Nano-Probing Non-Volatile Memory CellsShawn McKay, Nathan Hutchins, Steven Baskerville, Sujeet Shenoi. 91-122 [doi]
- Using Perceptual Hashing for Targeted Content ScanningLeon Twenning, Harald Baier, Thomas Göbel. 125-142 [doi]
- Analysis of Document Security FeaturesPulkit Garg, Saheb Chhabra, Garima Gupta, Vishal Srivastava, Gaurav Gupta. 143-159 [doi]
- Deepfake Detection Using Multiple Facial FeaturesXinzhe Wang, Duohe Ma, Liming Wang, Zhitong Lu, Zhenchao Zhang, Junye Jiang. 161-175 [doi]
- Identifying Superspreaders by Ranking System Object Instance GraphsRajani Suryavanshi, Xiaoyan Sun 0003, Jun Dai. 179-201 [doi]
- A Dynamic Malicious Document Detection Method Based on Multi-Memory FeaturesYuanyuan Wang, Gengwang Li, Min Yu 0001, Kam-Pui Chow, Jianguo Jiang, Xiang Meng, Weiqing Huang. 203-218 [doi]
- Traceable Transformer-Based Anomaly Detection for a Water Treatment SystemShenzhi Qin, Yubo Lang, Kam-Pui Chow. 219-234 [doi]
- Evolution of Global Digital Forensics Laws and Emergent ChallengesKaushik Thinnaneri Ganesan. 237-248 [doi]
- A Blockchain Model for Sharing Information in Criminal Justice SystemsPardon Ramazhamba, Hein S. Venter. 249-266 [doi]