Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
ScienceDirect Publication: Forensic Science International: Digital Investigation
rss.sciencedirect.com
Extending taxonomies for P2P crypto forum classification in the dark web: An iterative methodological approach
sciencedirect.com
·
1w
Towards controlled and forensic-ready experimentation in digital forensics: Methodological challenges, principles, and a research agenda
sciencedirect.com
·
2w
Forensic qualification of fault-assisted access restoration on CMD42-locked eMMC: A case study
sciencedirect.com
·
3w
Cybercrime investigations in practice: Insights from the LockerGoga ransomware attack on Norsk Hydro
sciencedirect.com
·
3w
·
Hacker News
DarkCatalog: A vision-first, parser-independent framework for forensic harvesting of TOR hidden services
sciencedirect.com
·
3w
Forensic analysis of remote call service artifacts for detecting voice phishing via samsung call & message continuity (CMC)
sciencedirect.com
·
3w
Forensic visibility gaps in fileless malware incidents: An empirical analysis of artefact survival rates across 49 confirmed intrusions
sciencedirect.com
·
4w
Enhancing smart home forensics: An emulation-based approach utilizing vendor privileged android backup data
sciencedirect.com
·
4w
Forensically-integrated machine learning model for multi-class email threat detection using a high-fidelity synthetic dataset
sciencedirect.com
·
5w
Editorial Board
sciencedirect.com
·
5w
A forensic analysis framework for IoMT network traffic using temporal reconstruction and artefact profiling
sciencedirect.com
·
5w
A novel ontology for cyber-attack attribution and investigation
sciencedirect.com
·
5w
Hybrid DN-MobileNet: A study on an effective framework for source camera identification from videos
sciencedirect.com
·
5w
Correlation analysis of pilots and drones using DJI cloud forensic data
sciencedirect.com
·
5w
A case study on the use of Amazon visual ID facial recognition metadata in investigation
sciencedirect.com
·
5w
Case note: Digital forensic challenges through synthetic CSAM in video games
sciencedirect.com
·
5w
Unveiling the mysteries of the dark web: A comprehensive graph-based multi-view analysis
sciencedirect.com
·
5w
On the classification of questioned PDF documents — Attributing PDF documents to the tools that created them
sciencedirect.com
·
5w
AI-based automated SQL query generation for SQLite databases in Mobile forensics
sciencedirect.com
·
8w
A hybrid neural-symbolic approach for the longitudinal profiling of coercive control in digital investigations
sciencedirect.com
·
12w
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help