ByIgor MikhaylovDecember 31, 2017Volatility plugin to extract BitLocker Full Volume Encryption KeysSoftware
ByViktor SobieckiOctober 29, 2016UTILIZING MEMORY AND NETWORK FORENSICS FOR SCALABLE THREAT DETECTION AND RESPONSESoftware