Showing results 1 to 5 of 5
Title | Author(s) | Issue Date | |
---|---|---|---|
Analyzing storage media of digital camera Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
Enchanced monitoring rule through direct node query for Foxy network investigation Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | ||
Memory acquisition: A 2-Take approach Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
A model for foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | ||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 |