Welcome to JDFSL’s second issue for 2015! First, I would like to thank our editorial board, reviewers, and the JDFSL team for bringing this issue to life. In this issue, we continue our multidisciplinary tradition. The first paper, Two challenges of stealthy hypervisors detection: time cheating and data fluctuations, showcases an important contribution to the computing discipline. The use of virtualization has dramatically increased given our strong reliance on cloud services both private and public. Even though hypervisors enhance security, they can also be exploited by malware. Therefore, this paper is of importance given that it introduces a novel method for detecting stealthy hypervisors.
"From the Editor-in-Chief,"
Journal of Digital Forensics, Security and Law: Vol. 10
, Article 1.
Available at: http://commons.erau.edu/jdfsl/vol10/iss2/1