


default search action
ICDF2C 2011: Dublin, Ireland
- Pavel Gladyshev, Marcus K. Rogers:

Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 88, Springer 2012, ISBN 978-3-642-35514-1
Cybercrime Investigations
- Cynthia A. Murphy:

The Role of Perception in Age Estimation. 1-16 - Kathryn C. Seigfried-Spellar

, Gary R. Bertoline, Marcus K. Rogers
:
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers. 17-32 - Esti Peshin:

Law Enforcement 2.0: Regulating the Lawful Interception of Social Media. 33-35
Mobile Device Forensics
- Kelly A. Cole, Ramindu L. Silva, Richard P. Mislan:

All Bot Net: A Need for Smartphone P2P Awareness. 36-46 - Eric Katz, Richard Mislan, Marcus K. Rogers

, Anthony Smith:
Results of Field Testing Mobile Phone Shielding Devices. 47-61 - Thomas Schaefer, Hans Höfken, Marko Schuba:

Windows Phone 7 from a Digital Forensics' Perspective. 62-76 - S. Satheesh Kumar, Bibin Thomas, K. L. Thomas:

An Agent Based Tool for Windows Mobile Forensics. 77-88 - Mark Lohrum:

Forensic Extractions of Data from the Nokia N900. 89-103
New Developments in Digital Forensics
- James R. Lyle:

A Strategy for Testing Metadata Based Deleted File Recovery Tools. 104-114 - Neil C. Rowe, Simson L. Garfinkel

:
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus. 115-130 - Ahmed F. Shosha, Joshua James

, Pavel Gladyshev
:
A Novel Methodology for Malware Intrusion Attack Path Reconstruction. 131-140 - Frank Breitinger

, Harald Baier:
Performance Issues About Context-Triggered Piecewise Hashing. 141-155
Short Papers
- Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison

, Abbie Barbir, Robert B. France:
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. 156-171 - Matthew Levendoski, Tejashree Datar, Marcus K. Rogers

:
Yahoo! Messenger Forensics on Windows Vista and Windows 7. 172-179 - Martin Steinebach:

Robust Hashing for Efficient Forensic Analysis of Image Sets. 180-187 - Anthony Keane, Stephen O'Shaughnessy

:
Tracking User Activity on Personal Computers. 188-196
Digital Forensics Techniques
- Alexander G. Barnett:

The Forensic Value of the Windows 7 Jump List. 197-210 - Gyu-Sang Cho, Marcus K. Rogers

:
Finding Forensic Information on Creating a Folder in $LogFile of NTFS. 211-225 - Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida:

Rescuing Digital Data from Submerged HDD. 226-237
Digital Forensics Education
- Christian Moch, Felix C. Freiling:

Evaluating the Forensic Image Generator Generator. 238-252
Internet and Network Investigations
- Mark Lohrum:

Forensic Extractions of Data from the Nokia N900. 253-267
Formal Methods of Digital Forensics
- Clive Blackwell:

A Forensic Framework for Incident Analysis Applied to the Insider Threat. 268-281 - Serguei A. Mokhov

, Joey Paquet, Mourad Debbabi
:
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid. 282-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














