• Home
  • Search
  • Browse Collections
  • My Account
  • About
  • DC Network Digital Commons Network™
Skip to main content
  • Scholarly Commons Home
  • About
  • FAQ
  • My Account
  •  
  •  

Home > Journals and Magazines > Journals > JDFSL > Vol. 15 (2020)

 

Articles

PDF

A Two-Stage Model for Social Network Investigations in Digital Forensics
Anne David, Sarah Morris, and Gareth Appleby-Thomas

PDF

Cryptography, Passwords, Privacy, and the Fifth Amendment
Gary C. Kessler and Ann M. Phillips

PDF

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools
Ian M. Kennedy, Blaine Price, and Arosha Bandara

PDF

A FORENSIC FIRST LOOK AT A POS DEVICE: SEARCHING FOR PCI DSS DATA STORAGE VIOLATIONS
Stephen Larson, James Jones, and Jim Swauger

PDF

Backup and Recovery Mechanisms of Cassandra Database: A Review
Karina Bohora, Amol Bothe, Damini Sheth, Rupali Chopade, and V. K. Pachghare

PDF

Identification of LSB image Steganography using Cover Image Comparisons
Michael Pelosi and Chuck Easttom

 
 
  • Journal Home
  • About This Journal
  • Aims & Scope
  • Editorial Board
  • Policies
  • LaTeX Template
  • Submission Guidelines
  • Sponsors
  • Indexing/Databases
  • Subscriptions
  • Reviewer Ethical Guidelines
  • Submit Article
  • Most Popular Papers
  • Receive Email Notices or RSS

 

Search

Advanced Search

ISSN: (Print) 1558-7215

ISSN: (Online) 1558-7223

 
 
  • Creative Commons License
    This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
 
Digital Commons

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright