Digital Investigation

Title Publication Date Language Citations
Network and device forensic analysis of Android social-messaging applications2015/08/01English35
An in-depth analysis of Android malware using hybrid techniques2018/03/01English34
Leveraging CybOX™ to standardize representation and exchange of digital forensic information2015/03/01English34
Forensic analysis of video file formats2014/05/01English33
An analysis of Ext4 for digital forensics2012/08/01English33
Forensic analysis of the Windows registry in memory2008/09/01English33
BodySnatcher: Towards reliable volatile memory acquisition by software2007/09/01English33
Live memory forensics of mobile phones2010/08/01English33
Passive forensics in image and video using noise features: A review2016/12/01English32
Predicting the types of file fragments2008/09/01English31
Digital forensics XML and the DFXML toolset2012/02/01English31
A MCEA based passive forensics scheme for detecting frame-based video tampering2012/11/01English31
Formalising investigative decision making in digital forensics: Proposing the Digital Evidence Reporting and Decision Support (DERDS) framework2019/03/01English31
Improving the reliability of chip-off forensic analysis of NAND flash memory devices2017/03/01English30
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information2015/09/01English30
Source video camera identification for multiply compressed videos originating from YouTube2009/09/01English30
Time and date issues in forensic computing—a case study2004/02/01English30
BiSAL – A bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security2015/09/01English30
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy2016/08/01English30
Anti-forensic resilient memory acquisition2013/08/01English30
Automated mapping of large binary objects using primitive fragment type classification2010/08/01English30
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code2015/03/01English29
The VAD tree: A process-eye view of physical memory2007/09/01English29
Digital Forensic Practices and Methodologies for AI Speaker Ecosystems2019/07/01English29
Forensic imaging of embedded systems using JTAG (boundary-scan)2006/03/01English29
A critical review of 7 years of Mobile Device Forensics2013/12/01English28
Selection of image features for steganalysis based on the Fisher criterion2014/03/01English28
Forensic analysis of WeChat on Android smartphones2017/06/01English28
A two-dimensional circumplex approach to the development of a hacker taxonomy2006/06/01English28
The Windows Registry as a forensic resource2005/09/01English28