Evaluating the Authenticity of Smartphone Evidence. | 2 | 0.39 | 2017 |
Establishing Findings in Digital Forensic Examinations: A Case Study Method. | 0 | 0.34 | 2017 |
On the Morality of Teaching Students IT Crime Skills: Extended Abstract. | 0 | 0.34 | 2016 |
Determining Trigger Involvement During Forensic Attribution in Databases. | 0 | 0.34 | 2015 |
Schema Reconstruction in Database Forensics. | 0 | 0.34 | 2014 |
Database application schema forensics. | 1 | 0.75 | 2014 |
Smartphones as Distributed Witnesses for Digital Forensics. | 3 | 0.44 | 2014 |
Security steps for smartphone users. | 0 | 0.34 | 2013 |
Finding File Fragments in the Cloud. | 0 | 0.34 | 2012 |
Using Internal Depth to Aid Stereoscopic Image Splicing Detection. | 1 | 0.38 | 2012 |
On Dimensions of Reconstruction in Database Forensics. | 5 | 0.57 | 2012 |
Arguments and Methods for Database Data Model Forensics. | 2 | 0.47 | 2012 |
Isolating Instances in Cloud Forensics. | 3 | 0.41 | 2012 |
Improving system availability with near-miss analysis. | 0 | 0.34 | 2012 |
Android Botnets On The Rise: Trends And Characteristics | 24 | 1.42 | 2012 |
On the Completeness of Reconstructed Data for Database Forensics. | 5 | 0.54 | 2012 |
Correctness proof for database reconstruction algorithm. | 4 | 0.52 | 2012 |
Gamifying authentication | 0 | 0.34 | 2012 |
Reconstruction in Database Forensics. | 6 | 0.62 | 2012 |
On Compound Purposes and Compound Reasons for Enabling Privacy. | 2 | 0.44 | 2011 |
Using e-coins to ensure fair sharing of donor funds amongst HIV healthcare facilities. | 0 | 0.34 | 2011 |
Network Forensics in a Clean-Slate Internet Architecture. | 0 | 0.34 | 2011 |
Isolating a cloud instance for a digital forensic investigation. | 21 | 1.26 | 2011 |
Assembling Metadata for Database Forensics. | 1 | 0.37 | 2011 |
An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool. | 2 | 0.47 | 2011 |
Detecting non-stereoscopic to stereoscopic image splicing with the use of disparity maps | 1 | 0.37 | 2011 |
Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. | 0 | 0.34 | 2011 |
Steganographic Techniques for Hiding Data in SWF Files. | 0 | 0.34 | 2011 |
On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation | 4 | 0.39 | 2010 |
A Generalized model for understanding and education of Information and Computer Security. | 0 | 0.34 | 2010 |
The Design of a Logical Traffic Isolation Forensic Model. | 0 | 0.34 | 2009 |
On metadata context in Database Forensics | 35 | 2.90 | 2009 |
Processing Algorithms for Components within a Forensic Evidence Management System. | 0 | 0.34 | 2009 |
XBRL-Trail --- A model for introducing digital forensic readiness to XBRL. | 0 | 0.34 | 2009 |
Considerations Towards a Cyber Crime Profiling System | 3 | 0.53 | 2008 |
Application of Message Digests for the Verification of Logical Forensic Data | 0 | 0.34 | 2008 |
Bridging the gap between anonymous e-mail and anonymous web browsing | 1 | 0.37 | 2008 |
An Evidence Acquisition Tool for Live Systems | 1 | 0.40 | 2008 |
On the probability of a false positive match for digital camera identification based on sensor dirt location. | 0 | 0.34 | 2008 |
Using Sensor Dirt for Toolmark Analysis of Digital Photographs | 0 | 0.34 | 2008 |
A comparison of simulated traffic conditioner performance | 0 | 0.34 | 2008 |
The Use of File Timestamps in Digital Forensics | 2 | 0.58 | 2008 |
UML Modelling of Digital Forensic Process Models (DFPMs) | 3 | 0.57 | 2008 |
Applying The Biba Integrity Model to Evidence Management | 2 | 0.47 | 2007 |
Patlet for Digital Forensics First Responders | 1 | 0.46 | 2007 |
Using purpose lattices to facilitate customisation of privacy agreements | 9 | 0.66 | 2007 |
Analysis of Web Proxy Logs | 2 | 0.45 | 2006 |
Information leakage in ubiquitous Voice-over-IP communications | 2 | 0.50 | 2006 |
On bidder zones, cell phones and ballot stuffing | 2 | 0.38 | 2006 |
Framework for a Digital Forensic Investigation | 19 | 1.75 | 2006 |