Name Size
Parent Directory -
Analyzing Malware.pdf 938K
AndroidREnDefenses201305.pdf 687K
DFRWS_2006_File_Carving_Challenge.pdf 1.1M
HPW2011 - Reversing Android Malware - Mahmud Ab Rahman.pdf 1.7M
IMF2006-PoolAllocations.pdf 260K
Kloet_2007.pdf 626K
LiME_Documentation_1.1.pdf 629K
Linux Format - January 2015.pdf 1.9M
M 2 introduction.pdf 575K
Reverse Engineering Of Malware On Android.pdf 3.5M
Samsung-03_NAND_Basics.pdf 282K
Schuster_Windows Memory Forensics with Volatility.pdf 10M
The Acquisition and Analysis of Random Access Memory.pdf 156K
V07N2-PP05-FORENSIC-INVESTIGATION.pdf 810K
bh-fed-06-burdach-up.pdf 2.5M
buffalo.pdf 480K
cloud computing forensics.pdf 2.9M
dfrws2007_carving_challenge.pdf 3.3M
forensics-waits-live-memory-forensics-doha-feb-08.pdf 1.9M
introduction_to_windows_memory_forensic.pdf 176K
mburdach_physical_memory_forensics_bh06.pdf 451K
p62-dolan-gavitt.pdf 152K
quantitative measures.pdf 185K
readings_cf2.pdf 91K
richard_scalpel.pdf 362K
software_protection_through_anti_debugging.pdf 186K
sotm32.pdf 2.1M
thesis-master-8561493-2013-09-24.pdf 856K
threats in traditional and cloud computing.pdf 327K
wict08_submission_32.pdf 91K