Abstract is missing.
- Systematic Analysis of Browser History EvidenceTobias Groß, Richard Dirauf, Felix C. Freiling. 1-12 [doi]
- Fingerprinting Edge and Cloud Services in IoTDongInn Kim, Vafa Andalibi, L. Jean Camp. 13-21 [doi]
- Tracing Privilege Misuse Through Behavioral Anomaly Detection in Geometric SpacesPatrick Düssel, Shoufu Luo, Ulrich Flegel, Sven Dietrich, Michael Meier 0001. 22-31 [doi]
- Time and Location Topic Model for analyzing Lihkg forum dataAo Shen, Kam-Pui Chow. 32-37 [doi]
- Knowing your Bitcoin Customer: Money Laundering in the Bitcoin EconomyJesse Crawford, Yong Guan. 38-45 [doi]
- Standard Representation for Digital Forensic ProcessingRadina Stoykova, Katrin Franke. 46-56 [doi]
- Exploring Provenance Needs in Software Reverse EngineeringWayne C. Henry, Gilbert L. Peterson. 57-65 [doi]