-
1
-
-
33748525161
-
Concepts and possibilities in forensic intelligence
-
Bell, C., Concepts and possibilities in forensic intelligence. Forensic Sci. Int. 162:1 (2006), 38–43.
-
(2006)
Forensic Sci. Int.
, vol.162
, Issue.1
, pp. 38-43
-
-
Bell, C.1
-
2
-
-
84924153501
-
Privacy protection in pervasive systems: state of the art and technical challenges
-
Bettini, C., Riboni, D., Privacy protection in pervasive systems: state of the art and technical challenges. Pervasive Mob. Comput. 17 (2015), 159–174.
-
(2015)
Pervasive Mob. Comput.
, vol.17
, pp. 159-174
-
-
Bettini, C.1
Riboni, D.2
-
3
-
-
85017998799
-
Jury presented with electronic evidence in Tsarnaev trial
-
2015 24 March 2015 [cited 2015 4 July]; Available from:.
-
Burke, A., Corpuz, M., Gans, F., 2015. Jury presented with electronic evidence in Tsarnaev trial. 2015 24 March 2015 [cited 2015 4 July]; Available from: 〈http://dailyfreepress.com/2015/03/24/jury-presented-with-electronic-evidence-in-tsarnaev-trial/〉.
-
(2015)
-
-
Burke, A.1
Corpuz, M.2
Gans, F.3
-
4
-
-
77957695303
-
-
Organised crime groups in cyberspace: a typology. Trends Organ. Crime, 11(3): 270–295.
-
Choo, K.-K.R., Organised crime groups in cyberspace: a typology. Trends Organ. Crime, 11(3): 270–295.
-
-
-
Choo, K.-K.R.1
-
5
-
-
77957285596
-
Online child grooming: A literature review on the misuse of social networking sites for grooming children for sexual offences
-
Research and public policy No 103, A.I.o. Criminology, Editor: Canberra, ACT.
-
Choo, K.-K.R., 2009. Online child grooming: A literature review on the misuse of social networking sites for grooming children for sexual offences. Research and public policy No 103, A.I.o. Criminology, Editor: Canberra, ACT.
-
(2009)
-
-
Choo, K.-K.R.1
-
6
-
-
80255136670
-
Looking ahead in pervasive computing: challenges and opportunities in the era of cyber–physical convergence
-
Conti, M., et al. Looking ahead in pervasive computing: challenges and opportunities in the era of cyber–physical convergence. Pervasive Mob. Comput. 8:1 (2012), 2–21.
-
(2012)
Pervasive Mob. Comput.
, vol.8
, Issue.1
, pp. 2-21
-
-
Conti, M.1
-
7
-
-
85018018303
-
The MI5 spy in your mobile: How 7/7 London attack triggered new data-fed war on terror which led to capture of 21/7 bomb plotters which made ISIS vanish into encrypted web but makes your calls transparent to GCHQ spooks in 'Doughnut'
-
Daily Mail Australia 2015 14 June 2015; Available from:.
-
Corera, G., 2015. The MI5 spy in your mobile: How 7/7 London attack triggered new data-fed war on terror which led to capture of 21/7 bomb plotters which made ISIS vanish into encrypted web but makes your calls transparent to GCHQ spooks in 'Doughnut'. Daily Mail Australia 2015 14 June 2015; Available from: 〈http://www.dailymail.co.uk/news/article-3122808/How-7-7-London-attack-triggered-new-data-fed-war-terror-led-capture-21-7-bomb-plotters-ISIS-vanish-encrypted-web-makes-calls-transparent-GCHQ-spooks-Doughnut.html〉.
-
(2015)
-
-
Corera, G.1
-
8
-
-
84979621663
-
A resource oriented integration architecture for the Internet of things: a business process perspective
-
Dar, K., et al. A resource oriented integration architecture for the Internet of things: a business process perspective. Pervasive Mob. Comput., 2014.
-
(2014)
Pervasive Mob. Comput.
-
-
Dar, K.1
-
9
-
-
85018016981
-
-
FBI_RCFL, 2003–2013. FBI Regional Computer Forensic Laboratory Annual Reports. 2003–2013; Available from:.
-
FBI_RCFL, 2003–2013. FBI Regional Computer Forensic Laboratory Annual Reports. 2003–2013; Available from: 〈http://www.rcfl.gov/downloads〉.
-
-
-
-
10
-
-
68649110054
-
Bringing science to digital forensics with standardized forensic corpora
-
Garfinkel, S., et al. Bringing science to digital forensics with standardized forensic corpora. Digit. Investig. 6 (2009), S2–S11.
-
(2009)
Digit. Investig.
, vol.6
, pp. S2-S11
-
-
Garfinkel, S.1
-
11
-
-
80051672577
-
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
-
Grispos, G., Storer, T., Glisson, W.B., A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digit. Investig. 8:1 (2011), 23–36.
-
(2011)
Digit. Investig.
, vol.8
, Issue.1
, pp. 23-36
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
12
-
-
85018003693
-
A Lessons Learned Repository for Computer Forensics
-
Computer Science Faculty Publications and Presentations
-
Harrison, W., et al. A Lessons Learned Repository for Computer Forensics. 2002, Computer Science Faculty Publications and Presentations.
-
(2002)
-
-
Harrison, W.1
-
13
-
-
85017999614
-
-
IDC, 2014. Worldwide Smartphone Shipments Top One Billion Units for the First Time. [cited 201417 August]; Available from:.
-
IDC, 2014. Worldwide Smartphone Shipments Top One Billion Units for the First Time. [cited 201417 August]; Available from: 〈http://www.idc.com/getdoc.jsp?ContainerId=prUS24645514〉.
-
-
-
-
14
-
-
85018012513
-
-
ITU, 2010. The World in 2010, ICT Facts and Figures; Available from:.
-
ITU, 2010. The World in 2010, ICT Facts and Figures; Available from: 〈http://www.itu.int/ITU-D/ict/material/FactsFigures2010.pdf〉.
-
-
-
-
15
-
-
85018033720
-
-
ITU, 2014. The World in 2014, ICT Facts and Figures. [cited 2014 17 August]; Available from:.
-
ITU, 2014. The World in 2014, ICT Facts and Figures. [cited 2014 17 August]; Available from: 〈http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e.pdf〉.
-
-
-
-
16
-
-
48749111433
-
-
NIST Special Publication
-
Jansen, W., Ayers, R., Guidelines on Cell Phone Forensics, 800, 2007, NIST Special Publication, 101.
-
(2007)
Guidelines on Cell Phone Forensics
, vol.800
, pp. 101
-
-
Jansen, W.1
Ayers, R.2
-
17
-
-
85018014406
-
-
Lexar, 2016. Press releases|Lexar. [cited 2016 20 April]; SD Card Release Dates]. Available from:.
-
Lexar, 2016. Press releases|Lexar. [cited 2016 20 April]; SD Card Release Dates]. Available from: 〈http://www.lexar.com/about/newsroom/press-releases〉.
-
-
-
-
18
-
-
2942693105
-
A Typology of Child Cybersexploitation and Online Grooming Practices
-
University of Central Lancashire Preston
-
O'Connell, R., A Typology of Child Cybersexploitation and Online Grooming Practices. 2003, University of Central Lancashire, Preston.
-
(2003)
-
-
O'Connell, R.1
-
19
-
-
85018023440
-
-
OpenSignal, 2014. Android Fragmentation Report August 2014. 2014 [cited 2014 23 August]; Available from:.
-
OpenSignal, 2014. Android Fragmentation Report August 2014. 2014 [cited 2014 23 August]; Available from: 〈http://opensignal.com/reports/2014/android-fragmentation/〉.
-
-
-
-
20
-
-
85018016535
-
-
Oxygen, 2015. Demo Backups. 2015 [cited 2015 15 June]; Available from:.
-
Oxygen, 2015. Demo Backups. 2015 [cited 2015 15 June]; Available from: 〈http://www.oxygen-forensic.com/en/download/devicebackups〉.
-
-
-
-
21
-
-
84884589497
-
Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?
-
Quick, D., Choo, K.-K.R., Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?. Digit. Investig. 10:3 (2013), 266–277.
-
(2013)
Digit. Investig.
, vol.10
, Issue.3
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
22
-
-
84877809583
-
Dropbox analysis: data remnants on user machines
-
Quick, D., Choo, K.-K.R., Dropbox analysis: data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
23
-
-
84875147433
-
Digital droplets: microsoft SkyDrive forensic data remnants
-
Quick, D., Choo, K.-K.R., Digital droplets: microsoft SkyDrive forensic data remnants. Future Gener. Comput. Syst. 29:6 (2013), 1378–1394.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
24
-
-
84877809583
-
Dropbox analysis: data remnants on user machines
-
Quick, D., Choo, K.-K.R., Dropbox analysis: data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
25
-
-
84916888408
-
Impacts of increasing volume of digital forensic data: a survey and future research challenges
-
Quick, D., Choo, K.-K.R., Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digit. Investig. 11:4 (2014), 273–294.
-
(2014)
Digit. Investig.
, vol.11
, Issue.4
, pp. 273-294
-
-
Quick, D.1
Choo, K.-K.R.2
-
26
-
-
84896319180
-
Google drive: forensic analysis of data remnants
-
Quick, D., Choo, K.-K.R., Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40 (2014), 179–193.
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
27
-
-
84907215855
-
data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive
-
Quick, D., Choo, K.-K.R., data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive. Trends Issues Crime. Crim. Justice 480 (2014), 1–11.
-
(2014)
Trends Issues Crime. Crim. Justice
, vol.480
, pp. 1-11
-
-
Quick, D.1
Choo, K.-K.R.2
-
28
-
-
84961817119
-
Big forensic data reduction: digital forensic images and electronic evidence
-
Quick, D., Choo, K.-K.R., Big forensic data reduction: digital forensic images and electronic evidence. Clust. Comput. 19:2 (2016), 723–740.
-
(2016)
Clust. Comput.
, vol.19
, Issue.2
, pp. 723-740
-
-
Quick, D.1
Choo, K.-K.R.2
-
29
-
-
84995755337
-
Big Forensic Data Management in Heterogeneous Distributed Systems: Quick Analysis of Multimedia Forensic Data
-
Software: Practice & Experience. (In press) 〈〉
-
Quick, D., Choo, K.-K.R., 2016. Big Forensic Data Management in Heterogeneous Distributed Systems: Quick Analysis of Multimedia Forensic Data. Software: Practice & Experience. (In press) 〈 http://dx.doi.org/10.1002/spe.2429〉.
-
(2016)
-
-
Quick, D.1
Choo, K.-K.R.2
-
30
-
-
84902429611
-
Cloud Storage Forensics
-
Syngress: An Imprint of Elsevier
-
Quick, D., Martini, B., Choo, K.-K.R., Cloud Storage Forensics. 2013, Syngress: An Imprint of Elsevier.
-
(2013)
-
-
Quick, D.1
Martini, B.2
Choo, K.-K.R.3
-
31
-
-
0042839764
-
Case based reasoning in criminal intelligence using forensic case data
-
Ribaux, O., Margot, P., Case based reasoning in criminal intelligence using forensic case data. Sci. Justice 43:3 (2003), 135–143.
-
(2003)
Sci. Justice
, vol.43
, Issue.3
, pp. 135-143
-
-
Ribaux, O.1
Margot, P.2
-
32
-
-
30344488429
-
The contribution of forensic science to crime analysis and investigation: forensic intelligence
-
Ribaux, O., Walsh, S., Margot, P., The contribution of forensic science to crime analysis and investigation: forensic intelligence. Forensic Sci. Int. 156:2–3 (2006), 171–181.
-
(2006)
Forensic Sci. Int.
, vol.156
, Issue.2-3
, pp. 171-181
-
-
Ribaux, O.1
Walsh, S.2
Margot, P.3
-
33
-
-
0038205937
-
The role of criminal profiling in the computer forensics process
-
Rogers, M., The role of criminal profiling in the computer forensics process. Comput. Secur. 22:4 (2003), 292–298.
-
(2003)
Comput. Secur.
, vol.22
, Issue.4
, pp. 292-298
-
-
Rogers, M.1
-
34
-
-
85018011310
-
-
SanDisk, 2016. Press Releases. 2016 [cited 2016 20 April]; SD Card Release Information]. Available from:.
-
SanDisk, 2016. Press Releases. 2016 [cited 2016 20 April]; SD Card Release Information]. Available from: 〈https://www.sandisk.com.au/about/media-center/press-releases〉.
-
-
-
-
35
-
-
85018006388
-
-
Statista, 2016. Number of apps available in leading app stores 2015. 2016 [cited 2016 20 April]; Available from:.
-
Statista, 2016. Number of apps available in leading app stores 2015. 2016 [cited 2016 20 April]; Available from: 〈http://www.statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores/〉.
-
-
-
-
36
-
-
85018033330
-
-
Statista, 2016. Most popular global mobile messenger apps as of April 2016, based on number of monthly active users (in millions). 2016 [cited 2016 20 April]; Available from:
-
Statista, 2016. Most popular global mobile messenger apps as of April 2016, based on number of monthly active users (in millions). 2016 [cited 2016 20 April]; Available from: 〈http://www.statista.com/statistics/258749/most-popular-global-mobile-messenger-apps/〉.
-
-
-
-
37
-
-
84883277322
-
Mobile device forensics: A snapshot, Trends Issues Crime
-
Tassone, C., Martini, C., Choo K.-K., R., Slay, J., Mobile device forensics: A snapshot, Trends Issues Crime. Mobile device forensics: A snapshot, Trends Issues CrimeCrim. Justice 460 (2013), 1–7.
-
(2013)
Mobile device forensics: A snapshot, Trends Issues CrimeCrim. Justice
, vol.460
, pp. 1-7
-
-
Tassone, C.1
Martini, C.2
Choo K.-K., R.3
Slay, J.4
-
38
-
-
85017999116
-
-
The_Australian, 2015. Alleged Anzac Day plotters were groomed from frontline, The Australian 2015; Available from:.
-
The_Australian, 2015. Alleged Anzac Day plotters were groomed from frontline, The Australian 2015; Available from: 〈http://www.theaustralian.com.au/in-depth/terror/alleged-anzac-day-plotters-were-groomed-from-frontline/story-fnpdbcmu-1227311119275〉.
-
-
-
-
39
-
-
85018023357
-
-
The_Guardian, 2015. French terrorism attack: suspect took selfie with severed head, Associated Press 2015 28 June 2015; Available from:.
-
The_Guardian, 2015. French terrorism attack: suspect took selfie with severed head, Associated Press 2015 28 June 2015; Available from: 〈http://www.theguardian.com/world/2015/jun/28/french-terrorism-suspect-took-selfie-with-slain-victim〉.
-
-
-
-
40
-
-
70349690747
-
The Anatomy of Electronic Evidence; Quantitative Analysis of Police E-Crime Data, in ARES '09
-
International Conference on Availability, Reliability and Security, 2009. p. 143-149.
-
Turnbull, B., Taylor, R., Blundell, B., 2009. The Anatomy of Electronic Evidence; Quantitative Analysis of Police E-Crime Data, in ARES '09. International Conference on Availability, Reliability and Security, 2009. p. 143-149.
-
(2009)
-
-
Turnbull, B.1
Taylor, R.2
Blundell, B.3
-
41
-
-
24344485557
-
Unification of digital evidence from disparate sources (Digital Evidence Bags)
-
Turner, P., Unification of digital evidence from disparate sources (Digital Evidence Bags). Digit. Investig. 2:3 (2005), 223–228.
-
(2005)
Digit. Investig.
, vol.2
, Issue.3
, pp. 223-228
-
-
Turner, P.1
-
42
-
-
84886701939
-
United Nations Office on Drugs and Crime - Criminal Intelligence Manual for Analysts
-
United Nations, New York Vienna, Austria
-
UNODC, United Nations Office on Drugs and Crime - Criminal Intelligence Manual for Analysts. 2011, United Nations, New York, Vienna, Austria.
-
(2011)
-
-
Unodc1
-
43
-
-
84895873649
-
On the added value of forensic science and grand innovation challenges for the forensic community
-
van Asten, A.C., On the added value of forensic science and grand innovation challenges for the forensic community. Sci. Justice 54:2 (2014), 170–179.
-
(2014)
Sci. Justice
, vol.54
, Issue.2
, pp. 170-179
-
-
van Asten, A.C.1
-
44
-
-
0036826199
-
The collation of forensic DNA case data into a multi-dimensional intelligence database
-
Walsh, S., et al. The collation of forensic DNA case data into a multi-dimensional intelligence database. Sci. Justice 42:4 (2002), 205–214.
-
(2002)
Sci. Justice
, vol.42
, Issue.4
, pp. 205-214
-
-
Walsh, S.1
-
45
-
-
84920020532
-
Development of a national repository of digital forensic intelligence
-
in Proceedings of the Conference on Digital Forensics, Security and Law. Association of Digital Forensics, Security and Law.
-
Weiser, M., Biros, D.P., Mosier, G., 2006. Development of a national repository of digital forensic intelligence. in Proceedings of the Conference on Digital Forensics, Security and Law. Association of Digital Forensics, Security and Law.
-
(2006)
-
-
Weiser, M.1
Biros, D.P.2
Mosier, G.3
-
46
-
-
84920058366
-
Forensic Examination in a Terabyte World, in Techno Security's Guide to E-Discovery and Digital Forensics
-
Elsevier
-
Wiles, J., et al. Forensic Examination in a Terabyte World, in Techno Security's Guide to E-Discovery and Digital Forensics. 2007, Elsevier, 129–146.
-
(2007)
, pp. 129-146
-
-
Wiles, J.1
-
47
-
-
85018010426
-
-
WMNAGreenwood, 2015. Drug dealer nabbed after posing with wad of cash. 2015 07 June 2015 [cited 2015 4 July]; Available from:.
-
WMNAGreenwood, 2015. Drug dealer nabbed after posing with wad of cash. 2015 07 June 2015 [cited 2015 4 July]; Available from: 〈http://www.westernmorningnews.co.uk/Drug-dealer-nabbed-posing-wad-cash/story-26651154-detail/story.html〉.
-
-
-
-
48
-
-
84856115129
-
Situation identification techniques in pervasive computing: a review
-
Ye, J., Dobson, S., McKeever, S., Situation identification techniques in pervasive computing: a review. Pervasive Mob. Comput. 8:1 (2012), 36–66.
-
(2012)
Pervasive Mob. Comput.
, vol.8
, Issue.1
, pp. 36-66
-
-
Ye, J.1
Dobson, S.2
McKeever, S.3
|