![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Digital Investigation, Volume 4
Volume 4, Number 1, March 2007
- Eoghan Casey
:
Digital evidence maps - A sign of the times. 1-2 - Andy Spruill, Chris Pavan:
Tackling the U3 trend with computer forensics. 7-12 - Sarah Hilley:
Anti-forensics with a small army of exploits. 13-15 - Claire LaVelle, Almudena Konrad:
FriendlyRoboCopy: A GUI to RoboCopy for computer forensic investigators. 16-23 - Jesse D. Kornblum:
Using every part of the buffalo in Windows memory analysis. 24-29 - Philip Turner:
Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags. 30-35 - Mike Dickson:
An examination into Trillian basic 3.x contact identification. 36-45
- Hank Wolfe:
Krishna Sankar, Sri Sundaralingam, Andrew Balinsky and Darrin Miller, Cisco Wireless LAN Security, Cisco Press (2005) ISBN 1-58705-154-0 419 pp. 46 - Hank Wolfe:
Paul L. Piccard, Brian Baskin, Craig Edwards, George Spillman and Marcus H. Sachs, Securing IM and P2P Applications for the Enterprise, Syngress Publishing Inc. (2006) ISBN 1-59749-017-2 454 pp. 46-47
Volume 4, Number 2, June 2007
- Eoghan Casey
:
What does "forensically sound" really mean? 49-50 - Bruce J. Nikkel:
An introduction to investigating IPv6 networks. 59-67 - Jason Solomon, Ewa Huebner, Derek Bem, Magdalena Szezynska:
User data persistence in physical memory. 68-72 - Wouter S. van Dongen:
Forensic artefacts left by Windows Live Messenger 8.0. 73-87 - Golden G. Richard III
, Vassil Roussev, Lodovico Marziale:
Forensic discovery auditing of digital evidence containers. 88-97 - Christopher Malinowski, Richard Noble:
Hashing and data integrity: Reliability of hashing and granularity size reduction. 98-104
Volume 4, Number Supplement, September 2007
- Simson L. Garfinkel:
Carving contiguous and fragmented files with fast object validation. 2-12 - James R. Lyle, Mark Wozar:
Issues with imaging drives containing faulty sectors. 13-15 - Gerry Masters, Philip Turner:
Forensic data recovery and examination of magnetic swipe card cloning devices. 16-22 - Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Barbara Endicott-Popovsky:
Capture - A behavioral analysis tool for applications and documents. 23-30 - Florian P. Buchholz, Brett C. Tjaden:
A brief study of time. 31-42 - Frank Adelstein, Robert A. Joyce:
File Marshal: Automatic extraction of peer-to-peer data. 43-48 - Nicole Lang Beebe, Jan Guynes Clark:
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results. 49-54 - Mridul Sankar Barik, Gaurav Gupta, Shubhro Sinha, Alok Mishra, Chandan Mazumdar:
An efficient technique for enhancing forensic capabilities of Ext2 file system. 55-61 - Brendan Dolan-Gavitt:
The VAD tree: A process-eye view of physical memory. 62-64 - Andreas Schuster:
Introducing the Microsoft Vista event log file format. 65-72 - Lodovico Marziale, Golden G. Richard III
, Vassil Roussev:
Massive threading: Using GPUs to increase the performance of digital forensics tools. 73-81 - Ali Reza Arasteh, Mourad Debbabi
, Assaad Sakha, Mohamed Mostafa Saleh
:
Analyzing multiple logs for forensic evidence. 82-91 - Rich Murphey:
Automated Windows event log forensics. 92-100 - Carol A. Taylor, Barbara Endicott-Popovsky, Deborah A. Frincke:
Specifying digital forensics: A forensics policy approach. 101-104 - Vassil Roussev, Golden G. Richard III
, Lodovico Marziale:
Multi-resolution similarity hashing. 105-113 - Ali Reza Arasteh, Mourad Debbabi
:
Forensic memory analysis: From stack and code to execution history. 114-125 - Bradley L. Schatz:
BodySnatcher: Towards reliable volatile memory acquisition by software. 126-134
Volume 4, Numbers 3-4, September - December 2007
- Eoghan Casey
:
Attacks against forensic analysis. 105-106 - Sarah Hilley:
News. 107-110 - Sarah Hilley:
News. 110-112 - Nicko van Someren:
RIPA part III - The intricacies of decryption. 113-115 - Geoff Fellows:
NTFS volume mounts, directory junctions and $Reparse. 116-118 - Michael I. Cohen:
Advanced carving techniques. 119-128 - Ewa Huebner, Derek Bem, Frans A. Henskens
, Mark Wallis:
Persistent systems techniques in forensic acquisition of memory. 129-137 - Wouter S. van Dongen:
Forensic artefacts left by Pidgin Messenger 2.0. 138-145 - M. N. A. Khan, Chris R. Chatwin, Rupert C. D. Young:
A framework for post-event timeline reconstruction using neural networks. 146-157 - James S. Okolica, Gilbert L. Peterson
, Robert F. Mills:
Using Author Topic to detect insider threats from email traffic. 158-164 - Kris Harms:
Corrigendum to "Forensic analysis of System Restore points in Microsoft Windows XP" [Digit Investig 3 (3) (2006) 151-158]. 165
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.