Showing results 1 to 6 of 6
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Analyzing storage media of digital camera Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | 154 | ||
Enchanced monitoring rule through direct node query for Foxy network investigation Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | 24 | ||
Maintaining hard disk integrity with digital legal professional privilege (LPP) data Journal:IEEE Transactions on Information Forensics and Security | 2013 | 76 | ||
Memory acquisition: A 2-Take approach Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | |||
A model for foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | |||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 |