Enquêtes numériques

Livres

Advanced Techniques for Improving the Efficacy of Digital Forensics Investigation / Marziale, Lodovico.  New Orleans, LA, USA: Lodovico Marziale.  HV 8073 M37 2009

Analysis Avoidance Techniques of Malicious Software / Brand, Murray.  Mount Lawley, Astrl: Murray Brand.  QA 76.76 .C68 B73 2010

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics / Sammons, John.  Waltham, MD, USA: Synergress.  HV 8079 .C65 S26 2012

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy / Engerpretson, Patrick.  Waltham, MD, USA: Synergress.  QA 76.9 .A25 E44 2011

Blog Fingerprinting: Identifying Anonymous Posts Written by an Author of Interest Using Work and Character Frequency Analysis / Dreier, David J.  Monterey, CA, USA: David J. Dreier.  TK 5105.8884 D74 2009

Chained Exploits: Advanced Hacking Attacks from the Start to Finish / Whitaker, Andrew.  Boston, MA, USA: Addison-Wesley Professional.  QA 76.9 .A25 W45 2009

Computer Forensics and Cyber Crime: An Introduction / Britz, Marjie T. Upper Saddle River, NJ, USA: Pearson Education. QA 76.9 .A25 B77 2013

A Concept Mapping Case Domain Modeling Approach for Digital Forensic Investigations / Tanner, April LaShai.  Miss State, MI, USA: April LaShai Tanner.  HV 8073 T36 2010

Conference on Digital Forensics, Security and Law: Richmond, Virginia, May 25-27, 2011 / Dardick, Glenn S. Maidens, Va, USA: Association of Digital Forensics, Security and Law.  K 2247 D37 2011

Les crimes sur le web 2.0 : une recherche exploratoire / Dupont, Benoît.  Montréal, QC, Cdn : Chaire de recherche du Canada en sécurité, identité et technologie.  HV 6773 D 89 2009

Dark Web: Exploring and Data Mining the Dark Side of the Web / Chen, Hsinchun. New York, NY, USA: Springer.  QA 76.9 .D343 H75 2011

Digital Evidence and Computer Crime / Casey, Eoghan.  Amsterdam, NL: Academic Press.  HV 6773 C26 2011

Digital Evidence in Criminal Law / Scanlan, Daniel M.  Toronto, ON, Cdn: Canada Law Books.  KE 8457 S23 2011

Digital Forensics Explained / Gogolin, Greg. Boca Raton, FL, USA: CRC Press. HV 8079 .C65 G64 2013

Digital Forensics for Handheld Devices / Doherty, Eamon P. Boca Raton, FL, USA: CRC Press. HV 8079 .C65 D64 2012

Dissecting the Droid: Forensic Analysis of Android and Its Malicious Applications / Spreitzenbarth, Michael. Erlangen Ger: Michael Spreitzenbarth. HV 6773 S67 2013

Emerging Digital Forensics Application for Crime Detection Prevention, and Security / Li, Chang-Tsun. Hershey, PA, USA: Information Science Reference.  HV 8073 L53 2013

Guide to Computer Forensics and Investigations / Nelson, Bill.  Boston, MA, USA: Course Technology.  QA 76.9 .A25 N46 2009

Hackers and Hacking: A Reference Handbook / Holt, Thomas J. Santa Barbara, CA, Cdn: ABC CLIO.  HV 6773 H65 2013

Handbook of Digital and Multimedia Forensic Evidence / Barbara, John J.  Totowa, NJ, USA: Human Press.  HV 8079m.C65 B37 2010

Handbook of Digital Forensics and Investigation / Casey, Eoghan.  Burlington, MA, USA: Academic Press.  HV 8079m.C65 C37 2010

The Influence of Written Information Security Policy on Digital Forensic Data Analysis: A Case Study of Law Enforcement and Private Investigative Operations / Toevs, Brian E. Minneapolis, MN, USA: Brian E. Toevs.  HV 8079 .C65 T64 2012

The Internet Police: How Crime Went Online - And the Cops Followed / Anderson, Nate. New York, NY, USA: W. W. Norton & Company. HV 8079 .C65 A64 2013

Introduction to Computer Networks and Cybersecurity / Chwan-Hwa, Wu. Boca Raton, FL, USA: CRC Press. TK 5105.59 W83 2013

iOS Forensic Analysis for iPhone, iPad and touch / Morrissey, Sean.  New York, NY, USA: Apress.  QA 76.76 .A65 M67 2010

Live Memory on Android With Volatility / Macht, Holger. Erlangen, Ger: Holger Macht.  TK 6570 .M6 M33 2013

Machine Learning Forensics for Law Enforcement, Security, and Intelligence / Mena, Jesus.  Boca Raton, FL, USA: CRC Press.

Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides / Malin, Cameron. Waltham, MA, USA: Syngress. QA 76.76 .C68 M35 2012

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. / Shavers, Brett. Waltham, MA, USA: Syngress.  HV 8079 .C65 S53 2013

Policing Digital Crime / Bryant, Robin. Burlington, VT, USA: Ashgate. HV 6773 B79 2014

La preuve électronique au Québec / Phillips, Mark.  Montreal, QC, Cdn: LexisNexis.  KEQ 1126 P45 2010

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations / Judish, Nathan. Washington, DC, USA: U.S. Office of Legal Educations.  KF 9630 J84 2009

Semantic Document Clustering for Crime Investigation / Daghir, Kabi G. Montreal, QC, Cdn: Kabi G. Daghir  QA 76.9 .T48 D34 2011

Seven Deadliest Web Application Attacks / Shema, Mike.  Burlington, MA, USA: Syngress.  TK 5105.59 S54 2010

Social Network Forensics: Evidence Extraction Tool Capabilities / Son, Jun. Auckland, NZ: Jung Son. HM 741 S66 2012

The Spies We Trust: Third Party Service Provides and Law Enforcement Surveillance / Soghoian, Christopher. Bloomington, IN, USA: Christopher Soghoian.  TK 7882 .E2 S64 2012

Technocrime, Policing, and Surveillance / Leman-Langlois, Stéphane. Oxon, GB: Routledge.  HV 6773 L45 2012

Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 / Carvey, Harlan.  Waltham, MA, USA: Syngress.  HF 8079 .C65 C38 2011

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry / Carvey, Harlan.  Burlington, MA,  USA: Syngress.  HF 8079 .C65 C38 2011
 


Articles

Acquiring Forensic Evidence From Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques / Dykstra, Josiah.  Digital Investigation, Vol. 9s, (Aug  2012), p. S90-S98.

Acquisition and Analysis of Volatile Memory From Android Devices / Sylve, Joe.  Digital Investigations, Vol. 8, No. 3-4 (2012), p. 175-184.

Advanced Evidence Collection and Analysis of Web Browser Activity / Oh, Junghoon.  Digital Investigation, Vol. 8s, (Aug 2011), p. S62-S70.

Advanced Framework for Digital Forensic Technologies and Procedures / Trcek, Denis.  Journal of Forensic Sciences, Vol. 55, No. 6 (Nov 2010), p. 1471-1480.

Amazon Cloud Drive Forensic Analysis / Hale, Jason S. Digital Investigation, Vol. 10, No. 3 (2013), p. 259-265.

Analysis of Changes in File time Attributes With File Manipulation / Bang, Jewan.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 135-144.

An Analysis of Digital Forensic Examinations: Mobile Devices Versus Hard Disk Drives Utilising ACPO & NIST Guidelines / Owen, Paul.  Digital Investigations, Vol. 8, No. 2 (2011), p. 135-140.

An Analysis of Ext4 for Digital Forensics / Fairbanks, Kevin D.  Digital Investigation, Vol. 9s, (Aug  2012), p. S118-S130.

Analyzing Internet E-Mail Data-Spoofing / Banday, M. Tariq.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 145-153.

Applicability of Latent Dirichlet Allocation to Multi-Disk Search / Noel, George E. Digital Investigation, Vol. 11, No. 1 (Mar 2014), p. 43-56.

Augmenting Password Recovery With Online Profiling / Al-wehaibi, Khawla.  Digital Investigation, Vol. 8s, (Aug 2011), p. S25-S33.

Author Gender Identification From Text / Cheg, Na.  Digital Investigation, Vol. 8, No, 1 (Jul 2011), p. 78-88.

Automated Computer Forensics Training in a Virtualized Environment / Brueckner, Stephen.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S105-S111.

An Automated Timeline Reconstruction Approach for Digital Forensic Investigations / Hargreaves, Christopher.  Digital Investigation, Vol. 9s, (Aug  2012), p. S69-S79.

Best Practices in Mobile Phone Investigations  / Dixon, Evan.  Evidence Technology Magazine, Vol. 9, No. 5 (Sep-Oct 2011), p. 26-29.

Bin-Carver: Automatic Recovery of Binary Executable Files / Hand, Scott.  Digital Investigation, Vol. 9s, (Aug  2012), p. S108-S117.

Bioterrorism: The Effects of Biology Decontamination on the Recovery of Electronic Evidence / Hiole, Rebecca.  Forensic Science International, Vol. 209, No. 1-3 (Jun 2011), p. 143-148.

Blind Image Steganalysis Based on Wavelet Coefficient Correlation / Zong, Han.  Digital Investigation, Vol. 9, No. 1, (Jun  2012), p. 58-68.

Blind Image Steganalysis of JPEG Images Using Feature Extraction Through the Process of Dilation / Pathak, Pritesh. Digital Investigation, Vol. 11, No. 1 (Mar 2014), p. 67-77.

A Capability Maturity Model for Digital Investigations / Kerrigan, Martin. Digital Investigations, Vol. 10, No. 1 (2013), p. 19-33

Certification, Registration and Assessment of Digital Forensic Experts: The UK Experience / Sommer, Peter.  Digital Investigations, Vol. 8, No. 2 (2011), p. 98-105.

Chip-Off and Stag Analysis For Mobile Device Forensics / Elder, Bob Evidence Technology Magazine, Vol. 10, No. 3 (May-Jun 2012), p. 10-15.

Cloud Data Imager: A Unified Answer to Remote Acquisition of Cloud Storage Areas / Federici, Corrado. Digital Investigation, Vol. 11, No. 1 ( Mar 2014), p. 30-42.

Cloud Forensics Definitions and Critical Criteria for Cloud Forensic Capability: and Overview of Survey Results / Ruan, Keyun. Digital Investigations, Vol. 10, No. 1 (2013), p. 34-43

Collaborative Scheme for VoiP Traceback / Hsum Hsein-Ming.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 185-195.

A Comparison of Forensic Evidence Recovery Techniques for a Windows Mobile Smart Phone / Grispos, George.  Digital Investigation, Vol. 8, No, 1 (Jul 2011), p. 23-36.

Computer Printouts as Legal Evidence / Freeman, Edward H.  Journal of Digital Forensic Practice,  Vol. 3, No. 2-4 (Apr-Dec 2010), p. 98-105.

Contagious Errors: Understanding and Avoiding Issues with Imaging Drives Containing Faulty Sectors / Byers, David.  Digital Investigations, Vol. 5, No. 1-2 (2008), p. 29-33.

Content Triage With Similarity Digests: The M57 Case Study / Roussev, Vassil.  Digital Investigation, Vol. 9s, (Aug  2012), p. S60-S68.

Copy-Move Forgery Detection Using Multiresolution Local Binary Patterns / Davarzani, Reza. Forensic Science International, Vol. 231, No. 1-3, (Sep  2013), p. 61-72.

Correctness, Atomicity, and Integrity: Defining Criteria for Forensically-Sound Memory Acquisition / Vomel, Stefan.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 125-137.

Correctness Proof for Database Reconstruction Algorithm / Fasan, Oluwasola Mary.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 138-150.

Cross-Border Co-Operation and Education in Digital Investigations: A European Perspective / Allegra, Elizabeth.  Digital Investigations, Vol. 8, No. 2 (2011), p. 106-113.

Daily Trends and Origins of Computer-Focused Crimes Against a Large University Computer Network / Maimon, David.  British Journal of Criminology, Vol. 53, No. 2 (Mar 2013), p. 319-343.

Detecting Data Theft Using Stochastic Forensics / Grier, Jonathan.  Digital Investigation, Vol. 8s, (Aug 2011), p. S71-S77.

Detecting File Fragmentation Point Using Sequential Hypothesis Testing / Pal, Anandabrata.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S2-S13.

Detection of Substitution-Based Linguistic Steganography by Relative Frequency Analysis / Chen, Zhili.  Digital Investigation, Vol. 8, No, 1 (Jul 2011), p. 68-77.

Developing a Process Model for the Forensic Extraction of Information From Desktop Search Applications / Pavlic, Timothy.  Journal of Digital Forensics, Security and Law, Vol. 3, No. 1 (2008), p. 35-55. (CJP article, contact library for a copy)

Digital Encryption and the Freedom From Self-Incrimination: Implications for the Future of Canadian Criminal Investigations and Prosecutions / Guarda, N. Dalla. Criminal Law Quarterly, Vol. 61, No. 1 (Jun 2014), p. 119-142.

Digital Evidence / Cameron, Stuart.  FBI Law Enforcement Bulletin, Vol. 80, No. 8 (Aug 2011), p. 14-19

Digital Forensics: An Analytical Crime Scene Procedure Model (ACSPM) / Bulbul, H. I. Forensic Science International, Vol. 233, No. 1-3 (Dec 2013), p. 244-256.

Digital Image Forgery Detection and Estimation by Exploring Basic Image Manipulations / Mahalakshmi, S. Devi.  Digital Investigations, Vol. 8, No. 3-4 (2012), p. 215-225

Distributed Forensics and Incident Response in the Enterprise / Cohen, M.I.  Digital Investigation, Vol. 8s, (Aug 2011), p. S101-S110.

Digital Forensic Investigation of Cloud Storage Services / Chung, Hyunji.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 81-95.

Digital Forensics XML and the DFXML Toolset / Garfinkel, Simpson.  Digital Investigations, Vol. 8, No. 3-4 (2012), p. 161-174

The Dresden Image Database for Benchmarking Digital Image Forensics / Gloe, Thomas.  Journal of Digital Forensic Practice,  Vol. 3, No. 2-4 (Apr-Dec 2010), p. 150-159.

Dropbox Analysis: Data Remnants on User Machines / Quick, Darren.  Digital Investigations, Vol. 10, No. 1 (2013), p. 3-18

Efficient Image Duplicated Region Detection Model Using Sequential Block Clustering / Sekeh, M. A.. Digital Investigations, Vol. 10, No. 1 (2013), p. 73-84

The Effects of Switching the Camera Module From Blackberry Curve 9360 Devices / Gilsof, Floris. Digital Investigations, Vol. 10, No. 1 (2013), p. 56-61

Electronic Records for Evidence and Disclosure and Discovery / Chasse, Ken.  Criminal Law Quarterly, Vol. 57, No. 2-3 (Jun 2011), p. 284-326.

An Empirical Comparison of Data Recovered from Mobile Forensic Toolkits / Glisson, William Bradley. Digital Investigations, Vol. 10, No. 1 (2013), p. 44-55

Empirical Analysis of Solid State Disk Data Retention When Used With Contemporary Operating Systems / King, Christopher.  Digital Investigation, Vol. 8s, (Aug 2011), p. S111-S117.

Engineering an Online Forensic Service / Bhoedjang, R. A. F.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 96-108.

Enhancing the Firewall / Wagley, Jonh.  Security Management, Vol. 54, No. 8 (Aug 2010), p. 74-76, 78, 80.

Les enjeux de la récupération de données / Belleface, Alain.  Cahiers de la sécurité, No. 4 (avril/juin 2008), p. 80-88.

An Evaluation of Forensic Similarity Hashes / Roussev, Vassil.  Digital Investigation, Vol. 8s, (Aug 2011), p. S34-S41.

Extracting the Windows Cupboard From Physical Memory / Okolica, James.  Digital Investigation, Vol. 8s, (Aug 2011), p. S118-S124.

Finding a Pot of Gold at the End of an Internet Rainbow: Further Examination of Fraudulent Email Solicitation / Nhan, Johnny. International Journal of Cyber Criminology, Vol. 3, No. 1 (June 2009), p. 452-475.  (Sage Criminology Collection; contact CPC Library of a copy)

Finding and Identifying Text in 900+ Languages / Brown, Ralf D.  Digital Investigation, Vol. 9s, (Aug  2012), p. S34-S43.

Forensic Acquisition and Analysis of Palm webOS on Mobile Devices / Casey, Eoghan.  Digital Investigation, Vol. 8, No, 1 (Jul 2011), p. 37-47.

Forensic Analysis of Social Networking Applications on Mobile Devices / Mutawa, Noora Al.  Digital Investigation, Vol. 9s, (Aug  2012), p. S23-S33.

Forensic Analysis of the Windows Registry in Memory / Dolan-Gavitt, Brendan.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S26-S32.

Forensics Analysis Techniques for Fragmented Flash Memory Pages in Smartphones / Par, Jungheum.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 108-118.

Forensic Carving of Network Packets and Associated Data Structures / Beverly, Robert.  Digital Investigation, Vol. 8s, (Aug 2011), p. S78-S89.

Forensic Collection of Cloud Storage Data: Does the Act of Collection Result i Changes to the Data or Its Metadata? / Quick, Darren. Digital Investigation, Vol. 10, No. 3 (2013), p. 266-277.

Forensic Data Recovery From the Windows Search Database / Chivers, Howard.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 114-126.

Forensic Investigation of OOXML Format Documents / Fu, Zhangjie.  Digital Investigation, Vol. 8, No, 1 (Jul 2011), p. 48-55.

Forensic Memory Analysis: Files Mapped in Memory / Van Baar, R. B.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S52-S57.

Forensics and Cloud Computing: An Integrated Conceptual Digital Forensic Framework for Cloud Computing / Martini, Ben.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 71-80.

A Framework for Attack Patterns’ Discovery in Honeynet Data / Thonnard, Olivier.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S128-S139.

A General Strategy for Differential Forensic Analysis / Garfinkel, Simson.  Digital Investigation, Vol. 9s, (Aug  2012), p. S50-S59.

The Growing Impact of Full Disk Encryption on Digital Forensics / Casey, Eoghan.  Digital Investigations, Vol. 8, No. 2 (2011), p. 129-134.

High-Speed Search Using Tarari Content Processor in Digital Forensics / Lee, Jooyoung.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S91-S95.

Historic Cell Site Analysis - Overview of Principles and Survey Methodologies / Tart, Mathew.  Digital Investigations, Vol. 8, No. 3-4 (2012), p. 185-193

How to Triage Computer Evidence / Kennedy, David.  Evidence Technology Magazine, Vol. 8, No. 2 (Mar/Apr 2010), p. 10-14.

Identification of Legal Issues for Computer Forensics / Brungs, Angela.  Journal of Digital Forensic Practice,  Vol. 3, No. 2-4 (Apr-Dec 2010), p. 140-149.

Identification of NAND Flash ECC Algorithms in Mobile Devices / Zhang, Li.  Digital Investigation, Vol. 9, No. 1, (Jun  2012), p. 24-48.

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS devices / Zdziarski, Jonathan.  Digital Investigation, Vol. 11, No. 1 ( Mar 2014), p. 3-19.

The Impact of Microsoft Windows Pool Allocation Strategies on Memory Forensics / Schuster, Andreas.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S58-S64.

Impact of Pornography on Forensic Mental Health and Law Enforcement Professionals / Johnson, Scott A. International Journal of Emergency Mental Health, Vol. 11, No. 2 (Spring 2009), p. 93-96.

Impersonator Identification through Dynamic Fingerprinting / Steel, Chad.  Digital Investigations, Vol. 5, No. 1-2 (2008), p. 60-70.

In Harm’s Way: Duty to Care for Child Exploitation and Pornography Investigators / Krause, Meredith.  FBI Law Enforcement Bulletin, Vol. 78, No. 1 (Jan 2009), p. 20-29.

The Increasing Need for Automation and Validation in Digital Forensics / Casey, Eoghan.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 103-104.

Introlib: Efficient and Transparent Library Call Introspection for Malware Forensics / Deng, Zhui.  Digital Investigation, Vol. 9s, (Aug  2012), p. S13-23.

Lessons Learned Writing Digital Forensic Tools and Managing a 30TB Digital Evidence Corpus / Garfinkel, Simon.  Digital Investigation, Vol. 9s, (Aug  2012), p. S80-S89.

A MCEA Based Passive Forensics Scheme for Detecting Frame-Based Video Tampering / Dong, Quong.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 151-159

MEGA: A Tool for Mac OS X Operating System and Application Forensics / Joyce, Robert A.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S83-S90.

The Metadata-Based Method for Recovering File and File Traces From YAFFS2 / Xum Ming. Digital Investigations, Vol. 10, No. 1 (2013), p. 62-72.s

Mining Criminal Networks From Unstructured Text Documents / Al-Zaidy, Rabeah.  Digital Investigations, Vol. 8, No. 3-4 (2012), p. 147-160

myKarve: JPEG Image and Thumbnail Carver / Kamaruddin,, Malik Mohamad.  Journal of Digital Forensic Practice, Vol. 3, No. 2-4 (Apr-Dec 2010), p. 74-97.

A Novel Approach of Mining Write-Prints for Authorship Attribution in e-Mail Forensics / Iqbal, Farkhund.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S42-S51.

Passive Copy Move Image Forgery Detection Using Undecimated Dyadic Wavelet Transform / Muhammad, Ghulam.  Digital Investigation, Vol. 9, No. 1, (Jun  2012), p. 49-57.

Passive Detection of Copy-Move Forgery in Digital Images: State-of-the-Art / Al-Qershi, Osamah M. Forensic Science International, Vol. 231, No. 1-3, (Sep  2013), p. 284-295.

Pinpointing TomTom Location Records: A Forensic Analysis / Nutter, Beverley.  Digital Investigations, Vol. 5, No. 1-2 (2008), p. 10-18.

Predicting the Types of File Fragments / Calhoun, William C.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S14-S20.

Privacy Preserving Network Flow Recording / Shebaro, Bilal.  Digital Investigation, Vol. 8s, (Aug 2011), p. S90--S100.

Private Browsing: A Window of Forensic Opportunity / Chivers, Howard.  Digital Investigation, Vol. 11, No. 1 ( Mar 2014), p. 20-29.

Psychological Influences in e-mail Fraud / Chang, Joshua J.S..  Journal of Financial Crime, Vol. 17, No. 3 (2010), p. 337-350.

PyFlag - An Advanced Network Forensic Framework / Cohen, M. I. Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S112-S120.

Reconstructing Corrupted DEFLATED Files / Brown, Ralf D.  Digital Investigation, Vol. 8s, (Aug 2011), p. S125-S131.

Recovering Deleted Data from the Windows Registry / Morgan, Timothy D.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S33-S41

Recovering Erased Digital Evidence from CD-RW Discs in a Child Exploitation Investigation / Wardwell, James.  Digital Investigations, Vol. 5, No. 1-2 (2008), p. 6-9.

Scientific Underpinnings and Background to Standards and Accreditation in Digital Forensics / Beckett, Jasonr.  Digital Investigations, Vol. 8, No. 2 (2011), p. 114-121.

Search Incident to Arrest in the Age of Personal Electronics / Bulzomi, Michael L.  FBI Law Enforcement Bulletin, Vol. 76, No. 9 (2007), p. 26-32

Selection of Image Features for Steganalysis Based on the Fisher Criterion / Lu, Ji-can. Digital Investigation, Vol. 11, No. 1 ( Mar 2014), p. 57-66.

The Social Network of Hackers / Décary-Hétu, David.  Global Crime, Vol. 13, No. 3 (Aug 2012), p. 160-175.

Standards, Regulation & Quality in Digital Investigations: The State We Are In / Marshall, Angus M.  Digital Investigations, Vol. 8, No. 2 (2011), p. 141-144.

A Statistical Method For Detecting On-Disk Wiped Areas / Savoldi, Antonio.  Digital Investigations, Vol. 8, No. 3-4 (2012), p. 194-214.

Storage and Exchange Formats for Digital Evidence / Flagalien, Anders O. Digital Investigations, Vol. 8, No. 2 (2011), p. 122-128.

A Study of Current Trends in Database Forensics / Suffern, Lawrence.  Journal of Digital Forensic Practice, Vol. 3, No. 2-4 (Apr-Dec 2010), p. 67-73.

A Study on the Forensic Mechanisms of VoiP Attacks: Analysis and Digital Evidence / Yen, Yun-Shen.  Digital Investigation, Vol. 8, No, 1 (Jul 2011), p. 56-67.

A Survey of Main Memory Acquisition and Analysis Techniques for the Windows Operating System / Vomel, Stefan.  Digital Investigation, Vol. 8, No, 1 (Jul 2011), p. 3-22.

Surveying the User Space Through User Allocations / White, Andrew.  Digital Investigation, Vol. 9s, (Aug  2012), p. S3-S12.

A System for the Proactive, Continuous, and Efficient Collection of Digital Forensic Evidence / Shields, Clay.  Digital Investigation, Vol. 8s, (Aug 2011), p. S3-S13.

System Supporting Money Laundering Detection / Drezewski, Rafal.  Digital Investigation, Vol. 9, No. 1, (Jun  2012), p. 8-21.

Les technologies numériques du futur : nouvelles menaces, nouvelles vulnérabilités / Riguidel, Michel.  Cahiers de la sécurité, No. 6 (oct-déc 2008), p. 66-77.

Testing the National Software Reference Library / Rowe, Neil C.  Digital Investigation, Vol. 9s, (Aug  2012), p. S31-S138.

Toward a General Collection Methodology for Android Devices / Vidas, Timothy.  Digital Investigation, Vol. 8s, (Aug 2011), p. S14-S24.

2 Month Delay in Examining Blackberry After Arrest OK: R. V. Giles et al., 2007 BCSC 1147 / Garfinkel, Simpson.  Digital Investigations, Vol. 8, No. 3-4 (2012), p. 161-174.

Universal Serial Bus Based Software Attacks and Protection Solutions / Pham, Dung Vu.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 172-184.

Unsupervised Discovery of Relations for Analysis of Textual Data / Louis, A. L.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 154-171.

The Use of Random Sampling in Investigations Involving Child Abuse Material / Jones, Brian.  Digital Investigation, Vol. 9s, (Aug  2012), p. S99-S107.

Using Digital Lifetime of TCP Buffers in Digitial Forensics: Empirical Study / Al-Saleh, Mohammed I.  Digital Investigation, Vol. 9, No. 2 (Nov 2012), p. 119-124.

Using NLP Techniques for File Fragment Classification / Fitzgerald, Simran.  Digital Investigation, Vol. 9s, (Aug  2012), p. S44-S49.

Using JPEG Quantization Tables to Identify Imagery Processed by Software / Kornblum, Jesse D.  Digital Investigations, DFRWS 2008 Special Edition (Sep 2008), p. S21-S25.

Using Social Networking Sites for Investigations, Part 1 / Dolon-Cotton, Cara.  Law and Order, Vol. 59, No. 8 (Aug 2011), p. 16-17.

Vis: Virtualization Enhanced Live Forensics Acquisition for Native System / Yu, Miao.  Digital Investigation, Vol. 9, No. 1, (Jun  2012), p. 22-33.

Visualization in Testing a Volatile Memory Forensic Tool / Inoue, Najime.  Digital Investigation, Vol. 8s, (Aug 2011), p. S42--S51.

Web 2.0 : deux fois plus d’attaques? / Arpagian, Nicolas.  Revue de la gendarmerie nationale, No. 234 (mars 2010), p. 19-24.

Windows 7 Registry Forensic Evidence Created by Three Popular BitTorrent Clients / Lallie, Harjinder Singh.  Digital Investigations, Vol. 7, No. 3-4 (Apr 2011), p. 127-134.

Windows Vista and Digital Investigations / Hargreaves, Christopher.  Digital Investigations, Vol. 5, No. 1-2 (2008), p. 34-48.