default search action
Digital Forensics 2013: Orlando, FL, USA
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 410, Springer 2013, ISBN 978-3-642-41147-2
Themes and Issues
- Mark Pollitt:
History, Historiography and the Hermeneutics of the Hard Drive. 3-17 - Wynand van Staden:
Protecting Third Party Privacy in Digital Forensic Investigations. 19-31 - Martin S. Olivier, Stefan Gruner:
On the Scientific Maturity of Digital Forensics Research. 33-49
Forensic Models
- Antonio Pooe, Les Labuschagne:
Cognitive Approaches for Digital Forensic Readiness Planning. 53-66 - Aleksandar Valjarevic, Hein S. Venter:
A Harmonized Process Model for Digital Forensic Investigation Readiness. 67-82 - Gary Cantrell, David A. Dampier:
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model. 83-98
Forensic Techniques
- Frank Breitinger, Kaloyan Petrov:
Reducing the Time Required for Hashing Operations. 101-117 - York Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi:
Hash-Based File Content Identification Using Distributed Systems. 119-134 - Stephen Esposito, Gilbert L. Peterson:
Creating Super Timelines in Windows Investigations. 135-144 - Gregory Bosman, Stefan Gruner:
Log File Analysis with Context-Free Grammars. 145-152 - Clive Blackwell, Shareeful Islam, Benjamin Aziz:
Using a Goal-Driven Approach in the Investigation of a Questioned Contract. 153-167
Filesystem Forensics
- Stefan Axelsson, Kamran Ali Bajwa, Mandhapati Venkata Srikanth:
File Fragment Analysis Using Normalized Compression Distance. 171-182 - Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
Quantifying Windows File Slack Size and Stability. 183-193 - York Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter:
Automating Video File Carving and Content Identification. 195-212 - Aswami Ariffin, Jill Slay, Kim-Kwang Raymond Choo:
Data Recovery from Proprietary Formatted Cctv Hard Disks. 213-223
Network Forensics
- Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Creating Integrated Evidence Graphs for Network Forensics. 227-241 - Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan:
A Generic Bayesian Belief Model for Similar Cyber Crimes. 243-255 - Pierre K. Y. Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien P. S. Chan:
An Empirical Study Profiling Internet Pirates. 257-272 - Anyi Liu, Jim X. Chen, Harry Wechsler:
Real-Time Covert Timing Channel Detection in Networked Virtual Environments. 273-288
Cloud Forensics
- Stephen O'Shaughnessy, Anthony Keane:
Impact of Cloud Computing on Digital Forensic Investigations. 291-303 - Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III, Vassil Roussev:
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments. 305-328
Forensic Tools
- Joe Buchanan-Wollaston, Tim Storer, William Bradley Glisson:
Comparison of the Data Recovery Function of Forensic Tools. 331-347 - Omar Choudary, Felix Gröbert, Joachim Metz:
Security Analysis and Decryption of Filevault 2. 349-363
Advanced Forensic Techniques
- Ankit Sarkar, Robin Verma, Gaurav Gupta:
Detecting Counterfeit Currency and Identifying Its Source. 367-384 - Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt:
Towards Active Linguistic Authentication. 385-398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.