


default search action
Digital Forensics 2013: Orlando, FL, USA
- Gilbert L. Peterson

, Sujeet Shenoi:
Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 410, Springer 2013, ISBN 978-3-642-41147-2
Themes and Issues
- Mark Pollitt:

History, Historiography and the Hermeneutics of the Hard Drive. 3-17 - Wynand van Staden

:
Protecting Third Party Privacy in Digital Forensic Investigations. 19-31 - Martin S. Olivier

, Stefan Gruner:
On the Scientific Maturity of Digital Forensics Research. 33-49
Forensic Models
- Antonio Pooe, Les Labuschagne

:
Cognitive Approaches for Digital Forensic Readiness Planning. 53-66 - Aleksandar Valjarevic, Hein S. Venter

:
A Harmonized Process Model for Digital Forensic Investigation Readiness. 67-82 - Gary Cantrell, David A. Dampier:

Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model. 83-98
Forensic Techniques
- Frank Breitinger

, Kaloyan Petrov
:
Reducing the Time Required for Hashing Operations. 101-117 - York Yannikos

, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi
:
Hash-Based File Content Identification Using Distributed Systems. 119-134 - Stephen Esposito, Gilbert L. Peterson

:
Creating Super Timelines in Windows Investigations. 135-144 - Gregory Bosman, Stefan Gruner:

Log File Analysis with Context-Free Grammars. 145-152 - Clive Blackwell, Shareeful Islam, Benjamin Aziz

:
Using a Goal-Driven Approach in the Investigation of a Questioned Contract. 153-167
Filesystem Forensics
- Stefan Axelsson, Kamran Ali Bajwa, Mandhapati Venkata Srikanth:

File Fragment Analysis Using Normalized Compression Distance. 171-182 - Martin Mulazzani, Sebastian Neuner, Peter Kieseberg

, Markus Huber
, Sebastian Schrittwieser, Edgar R. Weippl:
Quantifying Windows File Slack Size and Stability. 183-193 - York Yannikos

, Nadeem Ashraf, Martin Steinebach, Christian Winter:
Automating Video File Carving and Content Identification. 195-212 - Aswami Ariffin, Jill Slay

, Kim-Kwang Raymond Choo
:
Data Recovery from Proprietary Formatted Cctv Hard Disks. 213-223
Network Forensics
- Changwei Liu, Anoop Singhal, Duminda Wijesekera:

Creating Integrated Evidence Graphs for Network Forensics. 227-241 - Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan:

A Generic Bayesian Belief Model for Similar Cyber Crimes. 243-255 - Pierre K. Y. Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien P. S. Chan:

An Empirical Study Profiling Internet Pirates. 257-272 - Anyi Liu, Jim X. Chen, Harry Wechsler:

Real-Time Covert Timing Channel Detection in Networked Virtual Environments. 273-288
Cloud Forensics
- Stephen O'Shaughnessy

, Anthony Keane:
Impact of Cloud Computing on Digital Forensic Investigations. 291-303 - Irfan Ahmed

, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III
, Vassil Roussev:
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments. 305-328
Forensic Tools
- Joe Buchanan-Wollaston, Tim Storer, William Bradley Glisson

:
Comparison of the Data Recovery Function of Forensic Tools. 331-347 - Omar Choudary

, Felix Gröbert, Joachim Metz:
Security Analysis and Decryption of Filevault 2. 349-363
Advanced Forensic Techniques
- Ankit Sarkar, Robin Verma, Gaurav Gupta:

Detecting Counterfeit Currency and Identifying Its Source. 367-384 - Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt:

Towards Active Linguistic Authentication. 385-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














