


default search action
Digital Investigation, Volume 4
Volume 4, Number 1, March 2007
- Eoghan Casey

:
Digital evidence maps - A sign of the times. 1-2 - Andy Spruill, Chris Pavan:

Tackling the U3 trend with computer forensics. 7-12 - Sarah Hilley:

Anti-forensics with a small army of exploits. 13-15 - Claire LaVelle, Almudena Konrad:

FriendlyRoboCopy: A GUI to RoboCopy for computer forensic investigators. 16-23 - Jesse D. Kornblum:

Using every part of the buffalo in Windows memory analysis. 24-29 - Philip Turner:

Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags. 30-35 - Mike Dickson:

An examination into Trillian basic 3.x contact identification. 36-45
- Hank Wolfe:

Krishna Sankar, Sri Sundaralingam, Andrew Balinsky and Darrin Miller, Cisco Wireless LAN Security, Cisco Press (2005) ISBN 1-58705-154-0 419 pp. 46 - Hank Wolfe:

Paul L. Piccard, Brian Baskin, Craig Edwards, George Spillman and Marcus H. Sachs, Securing IM and P2P Applications for the Enterprise, Syngress Publishing Inc. (2006) ISBN 1-59749-017-2 454 pp. 46-47
Volume 4, Number 2, June 2007
- Eoghan Casey

:
What does "forensically sound" really mean? 49-50 - Bruce J. Nikkel:

An introduction to investigating IPv6 networks. 59-67 - Jason Solomon, Ewa Huebner, Derek Bem, Magdalena Szezynska:

User data persistence in physical memory. 68-72 - Wouter S. van Dongen:

Forensic artefacts left by Windows Live Messenger 8.0. 73-87 - Golden G. Richard III

, Vassil Roussev, Lodovico Marziale:
Forensic discovery auditing of digital evidence containers. 88-97 - Christopher Malinowski, Richard Noble:

Hashing and data integrity: Reliability of hashing and granularity size reduction. 98-104
Volume 4, Number Supplement, September 2007
- Simson L. Garfinkel

:
Carving contiguous and fragmented files with fast object validation. 2-12 - James R. Lyle, Mark Wozar:

Issues with imaging drives containing faulty sectors. 13-15 - Gerry Masters, Philip Turner:

Forensic data recovery and examination of magnetic swipe card cloning devices. 16-22 - Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Barbara Endicott-Popovsky:

Capture - A behavioral analysis tool for applications and documents. 23-30 - Florian P. Buchholz, Brett C. Tjaden:

A brief study of time. 31-42 - Frank Adelstein, Robert A. Joyce:

File Marshal: Automatic extraction of peer-to-peer data. 43-48 - Nicole Lang Beebe, Jan Guynes Clark:

Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results. 49-54 - Mridul Sankar Barik, Gaurav Gupta, Shubhro Sinha, Alok Mishra, Chandan Mazumdar:

An efficient technique for enhancing forensic capabilities of Ext2 file system. 55-61 - Brendan Dolan-Gavitt:

The VAD tree: A process-eye view of physical memory. 62-64 - Andreas Schuster:

Introducing the Microsoft Vista event log file format. 65-72 - Lodovico Marziale, Golden G. Richard III

, Vassil Roussev:
Massive threading: Using GPUs to increase the performance of digital forensics tools. 73-81 - Ali Reza Arasteh, Mourad Debbabi

, Assaad Sakha, Mohamed Mostafa Saleh
:
Analyzing multiple logs for forensic evidence. 82-91 - Rich Murphey:

Automated Windows event log forensics. 92-100 - Carol A. Taylor, Barbara Endicott-Popovsky, Deborah A. Frincke:

Specifying digital forensics: A forensics policy approach. 101-104 - Vassil Roussev, Golden G. Richard III

, Lodovico Marziale:
Multi-resolution similarity hashing. 105-113 - Ali Reza Arasteh, Mourad Debbabi

:
Forensic memory analysis: From stack and code to execution history. 114-125 - Bradley L. Schatz:

BodySnatcher: Towards reliable volatile memory acquisition by software. 126-134
Volume 4, Numbers 3-4, September - December 2007
- Eoghan Casey

:
Attacks against forensic analysis. 105-106 - Sarah Hilley:

News. 107-110 - Sarah Hilley:

News. 110-112 - Nicko van Someren:

RIPA part III - The intricacies of decryption. 113-115 - Geoff Fellows:

NTFS volume mounts, directory junctions and $Reparse. 116-118 - Michael I. Cohen:

Advanced carving techniques. 119-128 - Ewa Huebner, Derek Bem, Frans A. Henskens

, Mark Wallis
:
Persistent systems techniques in forensic acquisition of memory. 129-137 - Wouter S. van Dongen:

Forensic artefacts left by Pidgin Messenger 2.0. 138-145 - M. N. A. Khan, Chris R. Chatwin, Rupert C. D. Young:

A framework for post-event timeline reconstruction using neural networks. 146-157 - James S. Okolica, Gilbert L. Peterson

, Robert F. Mills:
Using Author Topic to detect insider threats from email traffic. 158-164 - Kris Harms:

Corrigendum to "Forensic analysis of System Restore points in Microsoft Windows XP" [Digit Investig 3 (3) (2006) 151-158]. 165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














