


default search action
Digital Investigation, Volume 6
Volume 6, Numbers 1-2, September 2009
- Eoghan Casey

:
Digital forensics: Coming of age. 1-2
- Andy Jones:

Lessons not learned on data disposal. 3-7 - Yuandong Zhu, Joshua James

, Pavel Gladyshev
:
A comparative methodology for the reconstruction of digital events using windows restore points. 8-15 - Jungheum Park

, Sangjin Lee:
Forensic investigation of Microsoft PowerPoint files. 16-24 - Rachel Zax, Frank Adelstein:

FAUST: Forensic artifacts of uninstalled steganography tools. 25-38 - Bruce J. Nikkel:

Forensic analysis of GPT disks and GUID partition tables. 39-47 - Wiger van Houten, Zeno J. M. H. Geradts

:
Source video camera identification for multiply compressed videos originating from YouTube. 48-60 - David Byers, Nahid Shahmehri:

A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1. 61-70 - Lei Pan

, Lynn Margaret Batten:
Robust performance testing for digital forensic tools. 71-81 - A. D. Irons, P. Stephens, R. Ian Ferguson:

Digital Investigation as a distinct discipline: A pedagogic perspective. 82-90
- Peter F. R. Forster:

Photoshop CS3 for forensics professionals. 91
Volume 6, Number Supplement, September 2009
- Simson L. Garfinkel

, Paul F. Farrell Jr., Vassil Roussev, George W. Dinolt:
Bringing science to digital forensics with standardized forensic corpora. S2-S11 - Yinghua Guo, Jill Slay

, Jason Beckett:
Validation and verification of computer forensic software tools - Searching Function. S12-S22 - Damir Kahvedzic, M. Tahar Kechadi

:
DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge. S23-S33 - Daniel Ayers:

A second generation computer forensic analysis system. S34-S42 - Kathryn Watkins, Mike McWhorte, Jeff Long, Bill Hill:

Teleporter: An analytically and forensically sound duplicate transfer system. S43-S47 - Brian Neil Levine, Marc Liberatore:

DEX: Digital evidence provenance supporting reproducibility and comparison. S48-S56 - Michael Cohen, Simson L. Garfinkel

, Bradley L. Schatz:
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. S57-S68 - Yuandong Zhu, Pavel Gladyshev

, Joshua James
:
Using shellbag information to reconstruct user activities. S69-S77 - Jens Olsson, Martin Boldt

:
Computer forensic timeline visualization tool. S78-S87 - Husrev T. Sencar, Nasir D. Memon

:
Identification and recovery of JPEG files with missing fragments. S88-S98 - Nicole Lang Beebe, Sonia D. Stacy, Dane Stuckey:

Digital forensic implications of ZFS. S99-S107 - Kibom Kim, Sangseo Park, Taejoo Chang, Cheolwon Lee, Sungjai Baek:

Lessons learned from the construction of a Korean software reference data set for digital forensics. S108-S113 - Vrizlynn L. L. Thing, Hwei-Ming Ying:

A novel time-memory trade-off method for password recovery. S114-S120 - Seyed Mahmood Hejazi, Chamseddine Talhi, Mourad Debbabi

:
Extraction of forensically sensitive information from windows physical memory. S121-S131 - Carsten Maartmann-Moe, Steffen E. Thorkildsen, André Årnes:

The persistence of memory: Forensic identification and extraction of cryptographic keys. S132-S140
Volume 6, Numbers 3-4, May 2010
- Eoghan Casey

:
Digital dust: Evidence in every nook and cranny. 93-94
- Joseph R. Rabaiotti, Christopher James Hargreaves

:
Using a software exploit to image RAM on an embedded system. 95-103 - Konstantinos Xynos

, Simon Harries, Iain Sutherland
, Gareth Davies, Andrew Blyth:
Xbox 360: A digital forensic investigation of the hard disk drive. 104-111 - Richard P. Mislan, Eoghan Casey

, Gary C. Kessler:
The growing need for on-scene triage of mobile devices. 112-124 - Ivo Pooters:

Full user data acquisition from Symbian smart phones. 125-135 - Eoghan Casey

, Michael Bann, John Doyle:
Introduction to Windows Mobile Forensics. 136-146 - C. Klaver:

Windows Mobile advanced forensics. 147-167 - Kevin Jonkers:

The forensic use of mobile phone flasher boxes. 168-178 - Onno van Eijk, Mark Roeloffs:

Forensic acquisition and analysis of the Random Access Memory of TomTom GPS navigation systems. 179-188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














