default search action
Digital Forensics 2009: Hong Kong, China
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 306, Springer 2009, ISBN 978-3-642-04154-9
Themes and Issues
- Mark Pollitt:
Digital Forensics as a Surreal Narrative. 3-15 - Nicole Beebe
:
Digital Forensic Research: The Good, the Bad and the Unaddressed. 17-36 - Jill Slay
, Yi-Chi Lin, Benjamin P. Turnbull, Jason Beckett, Paul Lin:
Towards a Formalization of Digital Forensics. 37-47
Forensic Techniques
- Fred Cohen:
Bulk Email Forensics. 51-67 - Greg Dorn, Christopher Marberry, Scott Conrad, Philip Craiger:
Analyzing the Impact of a Virtual Machine on a Host Machine. 69-81 - Yuandong Zhu, Pavel Gladyshev, Joshua James
:
Temporal Analysis of Windows MRU Registry Keys. 83-93 - Christian Schulze, Marco Schreyer, Armin Stahl, Thomas M. Breuel:
Using DCT Features for Printing Technique and Copy Detection. 95-106 - Bo Wang, Xiangwei Kong, Xingang You:
Source Camera Identification Using Support Vector Machines. 107-118 - Scott Conrad, Carlos Rodriguez, Christopher Marberry, Philip Craiger:
Forensic Analysis of the Sony Playstation Portable. 119-129
Integrity and Privacy
- Yuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsutaro Uehara
, Ryôichi Sasaki:
Implementing Boot Control for Windows Vista. 133-141 - Kamil Reddy, Hein S. Venter:
A Forensic Framework for Handling Information Privacy Incidents. 143-155
Network Forensics
- Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
Tracking Contraband Files Transmitted Using Bittorrent. 159-173 - Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Kenneth Tse:
A Model for Foxy Peer-to-Peer Network Investigations. 175-186 - Yanlin Peng, Linfeng Zhang, Yong Guan:
Detecting Fraud in Internet Auction Systems. 187-198
Forensic Computing
- Vassil Roussev, Liqiang Wang, Golden G. Richard III
, Lodovico Marziale:
A Cloud Computing Platform for Large-Scale Forensic Computing. 201-214 - Hugo Kleinhans, Jonathan Butts, Sujeet Shenoi:
Password Cracking Using Sony Playstations. 215-227
Investigative Techniques
- Richard E. Overill, Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law:
A Cost-Effective Model for Digital Forensic Investigations. 231-240 - Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law, Hayson Tse:
Analysis of the Digital Evidence Presented in the Yahoo! Case. 241-252
Legal Issues
- Michael Losavio, Olfa Nasraoui
, Vincent Thacker, Jeffrey S. Marean, Nick Miles, Roman V. Yampolskiy, Ibrahim N. Imam:
Assessing the Legal Risks in Network Forensic Probing. 255-266 - Sydney Liles, Marcus K. Rogers, Marianne Hoebich:
A Survey of the Legal Issues Facing Digital Forensic Experts. 267-276 - David Billard
:
An Extended Model for E-Discovery Operations. 277-287
Evidence Management
- April Tanner, David A. Dampier:
Concept Mapping for Digital Forensic Investigations. 291-300 - Ashish Gehani, Florent Kirchner, Natarajan Shankar:
System Support for Forensic Inference. 301-316
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.