| Paper | Presentation | Conference | Downloads | Author |
|---|---|---|---|
| Selective Deletion of Non-Relevant Data | DFRWS EU 2017 | Christian Zoubek, Konstantin Sack | |
| EviPlant: An Efficient Digital Forensic Challenge Creation, Manipulation and Distribution Solution | DFRWS EU 2017 | Mark Scanlon, Ph.D. (University College Dublin), Xiaoyu Du, and David Lillis (University College Dublin) | |
| Network Forensic Investigation in OpenFlow Networks with ForCon | DFRWS EU 2017 | Daniel Spiekermann, Jorg Keller, Tobias Eggendorfer | |
| A Scalable Authorship Verification Method for Different Languages, Genres and Topics | DFRWS EU 2016 | Oren Halvani, Christian Winter, Anika Pflug | |
| Automatic Profile Generation For Live Linux Memory Analysis | DFRWS EU 2016 | Michael Cohen (Google), Arkadiusz Socala | |
| Conclusions Scales or Likelihood Ratios in Digital Forensic Science | DFRWS EU 2016 | Eoghan Casey - Moderator, Zeo Geradts, Alex Biedermann, Franco Taroni | |
| Digital Evidence, ‘Absence’ of Data and Ambiguous Patterns of Reasoning | DFRWS EU 2016 | Alex Biedermann, Jo√´lle Vuille | |
| Discovering Windows Phone 8 Artifacts and Secrets | DFRWS EU 2016 | Mattia Epifani (ITTIG - CNR), Francesco Picasso (Reality Net), Marco Scarito | |
| Facilitating Forensic Examinations of Multi-User Computer Environments through Session-to-Session Analysis of Internet History | DFRWS EU 2016 | David Gresty, Diane Gan, George Loukas, Constantinos Ierotheou | |
| Forensic Analysis of Cloud-Native Artifacts | DFRWS EU 2016 | Vassil Roussev, Ph.D. (University of New Orleans), Shane McCulley | |
| Forensic Investigation of Cyberstalking Cases using Behavioural Evidence Analysis | DFRWS EU 2016 | Noora Al Mutawa, Joanne Bryce, Virginia Franqueira, Andrew Marrington (Zayed University) | |
| Generic RAID Reassembly using Block-Level Entropy | DFRWS EU 2016 | Christian Zoubek, Sabine Seufert, Andreas Dewald | |
| Internet Forums: A Source of Intelligence to Monitor the Online Diffusion of Doping Products | DFRWS EU 2016 | Thomas Pineau, Adrien Schopfer, Lionel Grossrieder, Pierre Esseiva, Quentin Rossy | |
| Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory | DFRWS EU 2016 | Johannes Bauer, Michael Gruhn (Friedrich-Alexander-Universität Erlangen-Nürnberg), Felix Freiling (Friedrich-Alexander-University) | |
| Life on Clouds, A Forensics Overview | DFRWS EU 2016 | Marco Scarito, Mattia Epifani (ITTIG - CNR), Francesco Picasso (Reality Net) | |
| Study and Analysis of Orweb Anonymizer on Android Devices | DFRWS EU 2016 | Claudia Meda (REALITY NET System Solutions Snc), Mattia Epifani (ITTIG - CNR) | |
| Studying the Structure and Organisation of Illicit Drug Trafficking on Darknet Markets Through the Analysis of Digital, Chemical and Physical Traces | DFRWS EU 2016 | Damien Rhumorbarbe, Ludovic Staehli, Julian Broseus, Quentin Rossy, Pierre Esseiva | |
| The Digital Evidence Dashboard Project | DFRWS EU 2016 | Hans Henseler, Ph.D. (University of Applied Sciences Leiden), Adrie Stander (University of Cape Town) | |
| Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists | DFRWS EU 2016 | Ben Hitchcock, Nhien An Le Khac (University College Dublin), Mark Scanlon, Ph.D. (University College Dublin) | |
| TLSkex: Harnessing Virtual Machine Introspection for Decrypting TLS Communication | DFRWS EU 2016 | Benjamin Taubmann, Christoph Freidrich, Dominik Dusold, Hans Reiser | |
| Evaluating Atomicity and Integrity of Correct Memory Acquisition Methods | DFRWS EU 2016 | Michael Gruhn (Friedrich-Alexander-Universität Erlangen-Nürnberg) and Felix Freiling (Friedrich-Alexander-University) | |
| A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis | DFRWS EU 2016 | Shahzad Saleem, Oliver Popov (Stockholm University), and Ibrahim Baggili (University of New Haven) | |
| Microsoft Exchange Forensics: Looking Beyond User Data | DFRWS EU 2016 | Owen O'Connor | |
| Pool Tag: Quick Scanning for Windows Memory Analysis | DFRWS EU 2016 | Joe Sylve, Ph.D. (BlackBag Technologies), Vico Marziale, Ph.D. (BlackBag Technologies), and Golden Richard III, Ph.D. (Louisiana State University) | |
| Virtual Currencies | DFRWS EU 2016 | André Fischer, Jakob Hasse, and Thomas Gloe (dence) | |
| A Theoretic Framework For Evaluating Similarity Digesting Tools | DFRWS EU 2015 | Liwei Ren (TrendMicro) | |
| Digital Forensics – Behind the Scenes | DFRWS EU 2015 | David-Olivier Jaquet-Chiffelle (University of Lausanne) | |
| Fast and Generic Malware Triage Using openioc_scan Volatility Plugin | DFRWS EU 2015 | Takahiro Haruyama (Internet Initiative Japan Inc.) | |
| How I Forced An Android Vulnerability Into Bypassing Mdm Restrictions + Diy – Android Malware Analysis | DFRWS EU 2015 | Zubair Ashraf (IBM) | |
| How To Search Extracted Data | DFRWS EU 2015 | Javier Collado (NowSecure, Inc) |