<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://forensicsandsecurity.com/people/akila-wickramasekara/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/mark-scanlon/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/nhien-an-le-khac/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/richard-gomm/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/aikaterini-kanta/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/john-sheppard/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/kanwal-aftab/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/david-lillis/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/saad-khalid-alabdulsalam/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/tharusha-mihiranga/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/felix-anda/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/syed-rizvi/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/xiaoyu-du/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/opeyemi-bamigbade/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/asanka-sayakkara/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2026/03/autodfbench-1.0-a-benchmarking-framework-for-digital-forensic-tool-testing-and-generated-code-evaluation/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2026/03/new-dfrws-eu-2026-publications/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2026/03/objects-as-universal-geolocation-cues-a-computer-vision-approach/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ObjectsAsUniversalGeolocationCues.html</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2026/03/plug-to-place-indoor-multimedia-geolocation-from-electrical-sockets-for-digital-investigation/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2026/03/vaas-vision-attention-anomaly-scoring-for-image-manipulation-detection-in-digital-forensics/</loc>
    <lastmod>2026-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AutoDFBench1.0DigitalForensicToolTesting.html</loc>
    <lastmod>2026-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PlugToPlace-IndoorMultimediaGeolocation.html</loc>
    <lastmod>2026-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/VisionAttentionAnomolyScoringImageManipulationDetection.html</loc>
    <lastmod>2026-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2025/10/towards-a-standardized-methodology-and-dataset-for-evaluating-llm-based-digital-forensic-timeline-analysis/</loc>
    <lastmod>2025-10-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/LLM-based-Digital-Forensic-Timeline-Analysis.html</loc>
    <lastmod>2025-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2025/08/an-ai-based-network-forensic-readiness-framework-for-resource-constrained-environments/</loc>
    <lastmod>2025-08-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/NetworkForensicReadinessResourceContrainedEnvironments.html</loc>
    <lastmod>2025-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2025/07/fine-tuning-large-language-models-for-digital-forensics-case-study-and-general-recommendations/</loc>
    <lastmod>2025-07-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/Fine-Tuning-Large-Language-Models-for-Digital-Forensics.html</loc>
    <lastmod>2025-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2025/04/autodfbench-a-framework-for-ai-generated-digital-forensic-code-and-tool-testing-and-evaluation/</loc>
    <lastmod>2025-04-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AutoDFBenchDigitalForensicCodeTesting.html</loc>
    <lastmod>2025-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2025/04/improving-image-embeddings-with-colour-features-in-indoor-scene-geolocation/</loc>
    <lastmod>2025-04-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ImageEmbeddingsColourFeaturesIndoorGeolocation.html</loc>
    <lastmod>2025-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2025/04/low-overhead-and-non-invasive-electromagnetic-side-channel-monitoring-for-forensic-ready-industrial-control-systems/</loc>
    <lastmod>2025-04-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EM-SCAForensicReadinessICS.html</loc>
    <lastmod>2025-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2025/03/exploring-the-potential-of-large-language-models-for-improving-digital-forensic-investigation-efficiency/</loc>
    <lastmod>2025-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/Survey-Large-Language-Models-Digital-Forensics.html</loc>
    <lastmod>2025-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/11/context-based-password-cracking-dictionary-expansion-using-generative-pre-trained-transformers/</loc>
    <lastmod>2024-11-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ContextPasswordCrackingUsingGPTs.html</loc>
    <lastmod>2024-11-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/11/perceptual-colour-based-geolocation-of-human-trafficking-images-for-digital-forensic-investigation/</loc>
    <lastmod>2024-11-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PerceptualColour-BasedImageGeolocation.html</loc>
    <lastmod>2024-11-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/11/pushing-network-forensic-readiness-to-the-edge-a-resource-constrained-artificial-intelligence-based-methodology/</loc>
    <lastmod>2024-11-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PushingNetworkForensicReadinessToTheEdge.html</loc>
    <lastmod>2024-11-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/06/a-comprehensive-evaluation-on-the-benefits-of-context-based-password-cracking-for-digital-forensics/</loc>
    <lastmod>2024-06-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BenefitsOfContextBasedPasswordCracking.html</loc>
    <lastmod>2024-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/04/a-digital-forensic-methodology-for-encryption-key-recovery-from-black-box-iot-devices/</loc>
    <lastmod>2024-04-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BlackBoxIoTEncryptionKeyRecovery.html</loc>
    <lastmod>2024-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/04/a-framework-for-integrated-digital-forensic-investigation-employing-autogen-ai-agents/</loc>
    <lastmod>2024-04-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/DigitalForensicsAutoGenAI.html</loc>
    <lastmod>2024-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/04/revealing-iot-cryptographic-settings-through-electromagnetic-side-channel-analysis/</loc>
    <lastmod>2024-04-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/IoTCryptoEM-SCA.html</loc>
    <lastmod>2024-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/03/dfrws-eu-10-year-review-and-future-directions-in-digital-forensic-research/</loc>
    <lastmod>2024-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/10YearReviewAndFutureDirectionsDigitalForensic.html</loc>
    <lastmod>2024-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/03/ensuring-cross-device-portability-of-electromagnetic-side-channel-analysis-for-digital-forensics/</loc>
    <lastmod>2024-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/CrossDevicePortabilityEMSCA.html</loc>
    <lastmod>2024-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2024/01/dfpulse-the-2024-digital-forensic-practitioner-survey/</loc>
    <lastmod>2024-01-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/DFPulse2024DigitalForensicPractitionerSurvey.html</loc>
    <lastmod>2024-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2023/10/an-evaluation-of-ai-based-network-intrusion-detection-in-resource-constrained-environments/</loc>
    <lastmod>2023-10-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AIIntrusionDetectionResourceConstrained.html</loc>
    <lastmod>2023-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2023/06/context-based-password-cracking-for-digital-investigation/</loc>
    <lastmod>2023-06-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PhDThesis-ContextBasedPasswordCrackingForDigitalInvestigation.html</loc>
    <lastmod>2023-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2023/03/digital-forensic-investigation-in-the-age-of-chatgpt/</loc>
    <lastmod>2023-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ChatGPT.html</loc>
    <lastmod>2023-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2023/03/harder-better-faster-stronger-optimising-the-performance-of-context-based-password-cracking-dictionaries/</loc>
    <lastmod>2023-03-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/OptimisingPasswordCrackingDictionaries.html</loc>
    <lastmod>2023-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2023/01/chatgpt-for-digital-forensic-investigation-the-good-the-bad-and-the-unknown/</loc>
    <lastmod>2023-01-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ChatGPTforDigitalForensics.html</loc>
    <lastmod>2023-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2022/11/deep-learning-based-network-intrusion-detection-system-for-resource-constrained-environments/</loc>
    <lastmod>2022-11-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/DLNIDS.html</loc>
    <lastmod>2022-11-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2022/10/application-of-artificial-intelligence-to-network-forensics-survey-challenges-and-future-directions/</loc>
    <lastmod>2022-10-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AIforNetworkForensics.html</loc>
    <lastmod>2022-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2022/10/data-exfiltration-through-electromagnetic-covert-channel-of-wired-industrial-control-systems/</loc>
    <lastmod>2022-10-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/DataExfiltrationEM-SCA.html</loc>
    <lastmod>2022-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2022/06/a-novel-dictionary-generation-methodology-for-contextual-based-password-cracking/</loc>
    <lastmod>2022-06-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/MethodologyContextual-BasedPasswordCracking.html</loc>
    <lastmod>2022-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/news/2022/06/security-ethics-and-privacy-issues-in-remote-extended-reality-for-education/</loc>
    <lastmod>2022-06-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/SecurityEthicsXREducation.html</loc>
    <lastmod>2022-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/IoT-DL-EMSCA.html</loc>
    <lastmod>2021-12-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PasswordCrackingWordlistQuality.html</loc>
    <lastmod>2021-12-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PasswordCracking3BillionAccounts.html</loc>
    <lastmod>2021-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PhDThesis-DeepLearningFacialImageCybercrime.html</loc>
    <lastmod>2021-05-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/FileIdentification.html</loc>
    <lastmod>2021-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/TraceGen.html</loc>
    <lastmod>2021-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/Vec2UAge.html</loc>
    <lastmod>2021-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/NetworkForensicAnalytics.html</loc>
    <lastmod>2021-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/SurveyOSINTPasswordCracking.html</loc>
    <lastmod>2020-12-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PhDThesis-MethodologyAutomatedDigitalEvidenceProcessing.html</loc>
    <lastmod>2020-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PhDThesis-ElectromagneticSideChannelAnalysisIoT.html</loc>
    <lastmod>2020-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/Kodi-XBMC-Forensics.html</loc>
    <lastmod>2020-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/SoK-AI-Forensics.html</loc>
    <lastmod>2020-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EvaluatingEMvidence.html</loc>
    <lastmod>2020-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AssessingInfluencingFactorsAgeEstimation.html</loc>
    <lastmod>2020-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ArtefactRelevancy.html</loc>
    <lastmod>2020-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/SmarterPasswordGuessing.html</loc>
    <lastmod>2020-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EMSideChannelFeatureSelection.html</loc>
    <lastmod>2020-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/UnderageFacialAgeEstimation.html</loc>
    <lastmod>2020-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EMvidence.html</loc>
    <lastmod>2020-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BorderlineAdulthoodAgeEstimation.html</loc>
    <lastmod>2019-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AutomatedClassificationArtefacts.html</loc>
    <lastmod>2019-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/SurveyEMSideChannelsForensics.html</loc>
    <lastmod>2019-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/LeveragingEMIoT.html</loc>
    <lastmod>2019-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/FacialAgeEstimationPoster.html</loc>
    <lastmod>2019-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/SpotlightMacForensics.html</loc>
    <lastmod>2019-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/SSDForensics.html</loc>
    <lastmod>2019-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EMAttacksComputerMonitors.html</loc>
    <lastmod>2018-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/IllegalIPTVNetworks.html</loc>
    <lastmod>2018-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ForensicallySoundReconstruction.html</loc>
    <lastmod>2018-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/NetworkIntell.html</loc>
    <lastmod>2018-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/DeepLearningMalware.html</loc>
    <lastmod>2018-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/RadioTraces.html</loc>
    <lastmod>2018-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/TwoWayRadioForensics.html</loc>
    <lastmod>2018-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EMSideChannelsForForensics.html</loc>
    <lastmod>2018-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EvaluatingFacialAgeEstimation.html</loc>
    <lastmod>2018-05-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/HierarchicalBloomFilterTrees.html</loc>
    <lastmod>2018-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/MRSHv2BloomFilterTrees.html</loc>
    <lastmod>2018-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PrivateWebBrowserForensics.html</loc>
    <lastmod>2018-01-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/DataAnalyticsForDigitalForensicsAndCybersecurity.html</loc>
    <lastmod>2017-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/PrivilegedDataWithinDigitalEvidence.html</loc>
    <lastmod>2017-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ProcessModelsDFaaS.html</loc>
    <lastmod>2017-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EpicPrivacyBrowser.html</loc>
    <lastmod>2017-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EtherUnpacker.html</loc>
    <lastmod>2017-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BehavioralServiceGraphsFormal.html</loc>
    <lastmod>2017-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EviPlant.html</loc>
    <lastmod>2017-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BehavioralServiceGraphs.html</loc>
    <lastmod>2016-11-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/TowardsDataDeduplication.html</loc>
    <lastmod>2016-11-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BattlingTheDigitalForensicBacklog.html</loc>
    <lastmod>2016-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BattlingTheBacklogDataDeduplication.html</loc>
    <lastmod>2016-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/IPv6SecurityAndForensics.html</loc>
    <lastmod>2016-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AnalyticalApproachToTheRecoveryOfDataFromCCTVFileSystems.html</loc>
    <lastmod>2016-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/CurrentChallengesAndFutureResearchAreas.html</loc>
    <lastmod>2016-05-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/IncreasingDigitalInvestigatorAvailability.html</loc>
    <lastmod>2016-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/OnTheBenefitsOfInformationRetrievalToDigitalForensics.html</loc>
    <lastmod>2016-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/TieredForensicMethodologyModelForDigitalFieldTriage.html</loc>
    <lastmod>2016-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/GooglePlusCommunities-ActiveLearningJournalAlternative.html</loc>
    <lastmod>2015-12-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ForensicAnalysisAndRemoteEvidenceRecoveryFromSyncthing.html</loc>
    <lastmod>2015-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/NetworkInvestigationMethodologyForBitTorrentSync.html</loc>
    <lastmod>2015-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/ProjectMaelstrom.html</loc>
    <lastmod>2015-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/OverviewOfTheForensicInvestigationOfCloudServices.html</loc>
    <lastmod>2015-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/RemoteEvidenceAcquisition.html</loc>
    <lastmod>2015-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/TowardsTheForensicIdentificationAndInvestigationOfCloudHostedServers.html</loc>
    <lastmod>2015-08-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/HTML5ZeroConfigurationCovertChannels.html</loc>
    <lastmod>2015-05-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AnAnalysisOfBitTorrentCrossSwarmPeerParticipation.html</loc>
    <lastmod>2014-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BitTorrentSyncNetworkInvestigationMethodology.html</loc>
    <lastmod>2014-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/LeveragingDecentralisationToExtendTheDigitalEvidenceAcquisitionWindow.html</loc>
    <lastmod>2014-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/DigitalEvidenceBagSelectionForP2PNetworkInvestigation.html</loc>
    <lastmod>2014-07-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/BitTorrentSyncFirstImpressionsAndDigitalForensicImplications.html</loc>
    <lastmod>2014-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/TheCaseForACollaborativeUniversalP2PBotnetInvestigationFramework.html</loc>
    <lastmod>2014-03-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/StudyOfPeer-to-PeerNetworkBasedCybercrimeInvestigation.html</loc>
    <lastmod>2013-10-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/InvestigatingCybercrimesThatOccurOnDocumentedP2PNetworks2013.html</loc>
    <lastmod>2013-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/UniversalPeerToPeerNetworkInvestigationFramework.html</loc>
    <lastmod>2013-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/P2PBotnetInvestigationAReview.html</loc>
    <lastmod>2012-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/InvestigatingCybercrimesThatOccurOnDocumentedP2PNetworks.html</loc>
    <lastmod>2011-04-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/AWeekInTheLifeOfTheMostPopularBitTorrentSwarms.html</loc>
    <lastmod>2010-06-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/EnablingRemoteEvidenceAcquisition.html</loc>
    <lastmod>2009-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/publications/OnlineAcquisitionOfDigitalForensicEvidence.html</loc>
    <lastmod>2009-09-01T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url><url>
    <loc>https://forensicsandsecurity.com/collaborate/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/people/</loc>
  </url><url>
    <loc>https://forensicsandsecurity.com/projects/</loc>
  </url>
</urlset>
