- Pu Ren, Wuyang Shui, Mingquan Zhou, Jin Liu and Wenshuo Zhao. Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation
- Jia Xiaoqi, Zhou Guangzhe, Huang Qingjia, Zhang Weijuan and Tian Donghai. FindEvasion: An Effective Environment-sensitive Malware Detection System for the Cloud
- David Lillis, Frank Breitinger and Mark Scanlon. Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
- John MacRae and Viriginia Franqueira. On Locky, Al Capone and Brexit
- Martin Vondráček, Jan Pluskal and Ondřej Ryšavý: Automation of MitM Attack on Wi-Fi Networks
- Charles Leopard, Neil Rowe and Michael McCarrin. Memory Forensics and the Macintosh OS X Operating System
- Lorenz Liebler and Harald Baier. Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics
- Kun Yang. A Behavior-based Method for Distinction of Flooding DDoS and Flash Crowds
- Thomas Edward Allen Barton and M A Hannan Bin Azhar. Open Source Forensics for a Multi-platform Drone System
- Asif Iqbal, Mathias Ekstedt and Hanan Alobaidli. Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector
- Ernsberger Dominik, Ikuesan Richard Adeyemi, Venter S. Hein and Alf Zugenmaier. A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness
- Jianguo Jiang, Jiuming Chen, K-K R Choo, Kunying Liu, Chao Liu and Min Yu. A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph
- Neil Rowe. Finding and Rating Personal Names on Drives for Forensic Needs
- Irvin Homem. Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets
- Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker and Edgar Weippl. Real-time Forensics through Endpoint Visibility
- Konstantia Barmpatsalou, Tiago Cruz, Edmundo Monteiro and Paulo Simoes. Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence
- Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger and Ibrahim Baggili. Why Are Developers Still Using Default Passwords?
- Ming Xu, Jinkai Sun, Ning Zheng, Tong Qiao, Yiming Wu, Kai Shi, Haidong Ge and Tao Yang. A novel File Carving Algorithm for EVTX Logs
- Wu Xin, Qingni Shen, Yahui Yang and Zhonghai Wu. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle