default search action
Digital Forensics 2012: Pretoria, South Africa
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics VIII - 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers. IFIP Advances in Information and Communication Technology 383, Springer 2012, ISBN 978-3-642-33961-5
Themes and Issues
- Nicolai Kuntze, Carsten Rudolph, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen, Thomas Kemmerich:
On the Creation of Reliable Digital Evidence. 3-17 - Vassil Roussev:
Managing Terabyte-Scale Investigations with Similarity Digests. 19-34 - Grant Osborne, Hannah Thinyane, Jill Slay:
Visualizing Information in Digital Forensics. 35-47
Forensic Techniques
- Alex J. Nelson:
XML Conversion of the Windows Registry for Forensic Processing and Distribution. 51-65 - Luigi Sportiello, Stefano Zanero:
Context-Based File Block Classification. 67-82 - Marcelo Ruback, Bruno W. P. Hoelz, Célia Ghedini Ralha:
A New Approach for Creating Forensic Hashsets. 83-97 - Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan:
Reasoning about Evidence using Bayesian Networks. 99-113 - Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Data Visualization for Social Network Forensics. 115-126
Mobile Phone Forensics
- Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. 129-142 - Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling:
Comparing Sources of Location Data from Android Smartphones. 143-157 - Lamine M. Aouad, M. Tahar Kechadi, Justin Trentesaux, Nhien-An Le-Khac:
An Open Framework for Smartphone Evidence Acquisition. 159-166
Cloud Forensics
- Dirk Ras, Martin S. Olivier:
Finding File Fragments in the Cloud. 169-185 - Waldo Delport, Martin S. Olivier:
Isolating Instances in Cloud Forensics. 187-200 - Keyun Ruan, Joshua James, Joe Carthy, M. Tahar Kechadi:
Key Terms for Service Level Agreements to Support Cloud Forensics. 201-212
Network Forensics
- Teja Myneedu, Yong Guan:
Evidence Collection in Peer-to-Peer Network Investigations. 215-230 - Ricci S. C. Ieong, Kam-Pui Chow, Pierre K. Y. Lai:
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations. 231-245 - Himal Lalla, Stephen Flowerday, Tendai Sanyamahwe, Paul Tarwireyi:
A Log File Digital Forensic Model. 247-259 - Franscois Van Staden, Hein S. Venter:
Implementing Forensic Readiness Using Performance Monitoring Tools. 261-270
Advanced Forensic Techniques
- Oluwasola Mary Fasan, Martin S. Olivier:
Reconstruction in Database Forensics. 273-287 - Heloise Pieterse, Martin S. Olivier:
Data Hiding Techniques for Database Environments. 289-301 - Saif M. Al-Kuwari, Stephen D. Wolthusen:
Forensic Tracking and Mobility Prediction in Vehicular Networks. 303-317 - Mark-Anthony Fouche, Martin S. Olivier:
Using Internal Depth to Aid Stereoscopic Image Splicing Detection. 319-333
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.