| Paper | Presentation | Conference | Downloads | Author |
|---|---|---|---|
| Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems | DFRWS EU 2019 | Jusop Choi, Jaegwan Yu, Sangwon Hyun, Hyoungshick Kim | |
| Comprehending the IoT Cyber Threat Landscape: A Data Dimensionality Reduction Technique to Infer and Characterize Internet-scale IoT Probing Campaigns | DFRWS EU 2019 | Morteza Safaei, Elias Bou-Harb (National Cyber Forensics and Training Alliance / Concordia University ), Kavita Varma, Nataliia Neshenko, Dimitris Pados, Kim-Kwang Raymond Choo | |
| WhatsApp Forensics: Advanced Methods of Extraction and Decryption | DFRWS EU 2019 | Tanya Pankova | |
| Using the Object ID index as an investigative approach for NTFS file systems | DFRWS EU 2019 | Rune Nordvik, Fergus Toolan (Norwegian Police University College), Stefan Axelsson (Norwegian University of Science and Technology) | |
| Towards Exact and Inexact Approximate Matching of Executable Binaries | DFRWS EU 2019 | Lorenz Liebler, Harald Baier (University of Applied Sciences, Darmstadt) | |
| The rise of evil HID devices | DFRWS EU 2019 | Franck Bitsch, Arthur Villeneuve | |
| The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? | DFRWS EU 2019 | Jan Peter van Zandwijk, Abdul Boztas | |
| SyncTriage: Using synchronisation artefacts to optimize acquisition order | DFRWS EU 2019 | Christopher Hargreaves, Angus Marshall | |
| Probabilistic Reasoning In Digital Forensics | DFRWS EU 2019 | Pavel Gladyshev, Ph.D. (University College Dublin), Babak Habibnia (University College Dublin) | |
| Overview of Digital Forensics at KRIPOS from Head of the Digital Forensic Section | DFRWS EU 2019 | Steffen Thorkildsen | |
| Malware Reverse Engineering Workshop | DFRWS EU 2019 | Geir Olav Dyrkolbotn (NTNU), Sergii Banin | |
| MalDy: Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analyses Reports | DFRWS EU 2019 | ElMouatez Billah Karbab (Concordia University), Mourad Debbabi (Concordia University) | |
| IoT Forensic Challenges and Opportunities for Digital Traces | DFRWS EU 2019 | Francesco Servida, Eoghan Casey, Ph.D. (University of Lausanne) | |
| Improving file-level fuzzy hashes for malware variant classification | DFRWS EU 2019 | Ian Shiel, Stephen O'Shaughnessy | |
| Forensic Source Identification using JPEG Image Headers: The Case of Smartphones | DFRWS EU 2019 | Patrick Mullan, Christian Riess, Felix Freiling (Friedrich-Alexander-University) | |
| Forensic Acquisition of Modern Evidence | DFRWS EU 2019 | Bradley Schatz, Ph.D. (Schatz Forensic) | |
| Exchange of cyber-investigation information between organizations and across borders using CASE (with Demo) | DFRWS EU 2019 | Vik Harichandran, Mattia Epifani (ITTIG - CNR), Nikolaos Matskanis, Deborah Nichols | |
| Digital traces: a model for influencing parameters | DFRWS EU 2019 | Elénore Ryser (University of Lausanne), David-Olivier Jaquet-Chiffelle (University of Lausanne) | |
| Deleted File Fragment Dating by Analysis of Allocated Neighbors | DFRWS EU 2019 | Ahmed Bahjat and Jim Jones | |
| COST CA17124 Talk, Digital Investigation Journal Update and Lightning Talks | DFRWS EU 2019 | ||
| Clearly Conveying the Science behind Automated Correlation Systems | DFRWS EU 2019 | Timothy Bollé (University of Lausanne), Eoghan Casey, Ph.D. (University of Lausanne) | |
| Chrome Nuts and Bolts: ChromeOS /Chromebook Forensics | DFRWS EU 2019 | Jessica Hyde (George Mason University / Magnet Forensics ), Jad Saliba | |
| Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics | DFRWS EU 2019 | Daniel Uroz, Ricardo Rodriguez | |
| Apple watch forensics: is it ever possible, and what is the profit? | DFRWS EU 2019 | Mattia Epifani (ITTIG - CNR), Vladimir Katalov (ElcomSoft) | |
| Advancing the Exchange of Cyber-Investigation Information between organizations and across borders using CASE | DFRWS EU 2019 | Eoghan Casey, Ph.D. (University of Lausanne), Fabrizio Turchi, Nikolaos Matskanis | |
| A Road Map for Digital Forensic Research | DFRWS USA 2001 | ||
| The Mobile Forensic Platform | DFRWS USA 2002 | Frank Adelstein, Ph.D. (ATC-NY) | |
| First Responders Evidence Disk | DFRWS USA 2002 | Jesse Kornblum (AFOSI) | |
| Analyzing the Difficulties in Backtracking the Onion Router’s Traffic | DFRWS USA 2002 | Dario Forte (Guardia di finanza Milano) | |
| A Lessons Learned Repository for Computer Forensics | DFRWS USA 2002 | Warren Harrison (Portland State University), George Heuston (Hillsboro Police Department), Mark Morrissey (Portland State University), David Aucsmith (Intel Corporation), Sarah Mocas (Portland State University), and Steve Russelle (Portland Police Bureau) | |
| The International Journal of Digital Evidence | DFRWS USA 2002 | Gary Gordon and John Leeson | |
| Testing Disk Imaging Tools | DFRWS USA 2002 | James Lyle (NIST) | |
| Steganalysis with a Computational Immune System | DFRWS USA 2002 | Jacob Jackson, Gregg Gunsch, Roger Claypoole, and Gary Lamont (Air Force Institute of Technology) | |
| Language and Gender Author Cohort Analysis of E-mail for Computer Forensics | DFRWS USA 2002 | Olivier de Vel, Malcolm Corney, Alison Anderson, and George Mohay (Queensland University of Technology) | |
| Defining Digital Forensic Examination and Analysis Tools | DFRWS USA 2002 | Brian Carrier, Ph.D. (@stake) | |
| Confronting Encryption in Computer Investigations | DFRWS USA 2002 | Eoghan Casey, Ph.D. (Yale University) | |
| Can Digital Evidence Endure the Test of Time | DFRWS USA 2002 | Michael Duren and Chet Hosmer (WetStone Technologies, Inc) | |
| Automatic Reassembly of Document Fragments via Data Compression | DFRWS USA 2002 | Kulesh Shanmugasundaram (Polytechnic University) | |
| Audit Data Reduction Using Neural Networks and Support Vector Machines | DFRWS USA 2002 | Srinivas Mukkamala and Andrew Sung (New Mexico Institute of Mining and Technology) | |
| Putting the Horse in Front of the Cart | DFRWS USA 2003 | Peter Stephenson | |
| ForNet – A Distributed Network Forensics System | DFRWS USA 2003 | Kulesh Shanmugasundaram | |
| Forensic Network Analysis Tools – Strengths, Weaknesses, and Future Needs | DFRWS USA 2003 | Eoghan Casey, Ph.D. (University of Lausanne) | |
| File Classification Using Sub-Sequence Kernels | DFRWS USA 2003 | ||
| Discovering Covert Digital Evidence | DFRWS USA 2003 | Chet Hosmer and Christopher Hyde | |
| Detecting Covert Communications on the Internet – Some Challenges and Solutions | DFRWS USA 2003 | R. Chandramouli | |
| Cross-Validation of Filesystem Layers for Computer Forensics | DFRWS USA 2003 | Joe Sremack | |
| Building Theoretical Underpinnings for Digital Forensics Research | DFRWS USA 2003 | Sarah Mocas | |
| An Improved Raw Quick Pairs Blind Steganalysis Method | DFRWS USA 2003 | Benjamin Rodriquez | |
| A Functional Reference Model of Passive Network Origin Identification | DFRWS USA 2003 | Thomas Daniels | |
| Secure Digital Camera | DFRWS USA 2004 | Paul Blythe (SUNY Binghamton) and Jessica Fridrich (SUNY Binghamton) |