no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Case study: Forensic analysis of a Samsung digital video recorder
|
van Dongen, Wouter S. |
|
2008 |
5 |
1-2 |
p. 19-28 10 p. |
article |
2 |
Classification of digital camera-models based on demosaicing artifacts
|
Bayram, Sevinc |
|
2008 |
5 |
1-2 |
p. 49-59 11 p. |
article |
3 |
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors
|
Byers, David |
|
2008 |
5 |
1-2 |
p. 29-33 5 p. |
article |
4 |
Impersonator identification through dynamic fingerprinting
|
Steel, Chad M.S. |
|
2008 |
5 |
1-2 |
p. 60-70 11 p. |
article |
5 |
[No title]
|
Hilley, S. |
|
2008 |
5 |
1-2 |
p. 3-5 3 p. |
article |
6 |
Pinpointing TomTom location records: A forensic analysis
|
Nutter, Beverley |
|
2008 |
5 |
1-2 |
p. 10-18 9 p. |
article |
7 |
Prelim i - Editorial Board
|
|
|
2008 |
5 |
1-2 |
p. i- 1 p. |
article |
8 |
Recovering erased digital evidence from CD-RW discs in a child exploitation investigation
|
Wardwell, James |
|
2008 |
5 |
1-2 |
p. 6-9 4 p. |
article |
9 |
State of the Journal
|
Casey, Eoghan |
|
2008 |
5 |
1-2 |
p. 1-2 2 p. |
article |
10 |
Why computer forensic professionals shouldn't be required to have private investigator licenses
|
Schwerha IV, Joseph J. |
|
2008 |
5 |
1-2 |
p. 71-72 2 p. |
article |
11 |
Windows Vista and digital investigations
|
Hargreaves, Christopher |
|
2008 |
5 |
1-2 |
p. 34-48 15 p. |
article |