default search action
Digital Forensics 2005: Orlando, Florida, USA
- Mark Pollitt, Sujeet Shenoi:
Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, February 13-16, 2005. IFIP 194, Springer 2006, ISBN 0-387-30012-0
Themes and Issues
- Nicole Beebe, Jan Guynes Clark:
Dealing with Terabyte Datasets in Digital Investigations. 3-16 - Martin S. Olivier:
Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. 17-31 - Mark Davis, Gavin Manes, Sujeet Shenoi:
A Network-Based Architecture for Storing Digital Evidence. 33-42 - Matthew Meyers, Marcus K. Rogers:
Digital Forensics: Meeting the Challenges of Scientific Evidence. 43-50 - Michael Losavio:
Non-Technical Manipulation of Digital Data - Legal, Ethical and Social Issues. 51-63
Investigative Techniques
- Michael D. Hoeschele, Marcus K. Rogers:
Detecting Social Engineering. 67-77 - Anthony G. Persaud, Yong Guan:
A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery. 79-90 - Thomas Duval, Bernard Jouga, Laurent Roger:
The Mitnick Case: How Bayes Could Have Helped. 91-104 - Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter:
Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. 105-112 - Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier:
Exploring Forensic Data with Self-Organizing Maps. 113-123
Network Forensics
- Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon:
Integrating Digital Forensics in Network Infrastructures. 127-140 - Scott Redding:
Using Peer-to-Peer Technology for Network Forensics. 141-152 - Pallavi Kahai, Mannivannan Srinivasan, Kameswara Rao Namuduri:
Forensic Profiling System. 153-164 - Eunjong Kim, Daniel Massey, Indrajit Ray:
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. 165-176 - Tyler Moore, Anthony Meehan, Gavin Manes, Sujeet Shenoi:
Using Signaling Information in Telecom Network Forensics. 177-188
Portable Electronic Device Forensics
- Svein Yngvar Willassen:
Forensic Analysis of Mobile Phone Internal Memory. 191-204 - Christopher Swenson, Gavin Manes, Sujeet Shenoi:
Imaging and Analysis of GSM SIM Cards. 205-216 - Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi:
Extracting Concealed Data from BIOS Chips. 217-230
Linux and File System Forensics
- Philip Craiger:
Recovering Digital Evidence from Linux Systems. 233-244 - Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi:
Detecting Hidden Data in Ext2/Ext3 File Systems. 245-256
Applications and Techniques
- Gilbert L. Peterson:
Forensic Analysis of Digital Image Tampering. 259-270 - Yixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao:
Content-Based Image Retrieval for Digital Forensics. 271-282 - Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael:
Making Decisions about Legal Responses to Cyber Attacks. 283-294 - Jill Slay, Kris Jorgensen:
Applying Filter Clusters to Reduce Search State Space. 295-301 - Yusuf Motara, Barry Irwin:
In-Kernel Cryptographic Executable Verification. 303-313
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.