default search action
Digital Forensics 2011: Orlando, FL, USA
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 361, Springer 2011, ISBN 978-3-642-24211-3
Themes and Issues
- Frederick Cohen, Julie Lowrie, Charles Preston:
The State of the Science of Digital Evidence Examination. 3-21 - Clive Blackwell:
An Investigative Framework for Incident Analysis. 23-34 - Keyun Ruan, Joe Carthy, M. Tahar Kechadi, Mark Crosbie:
Cloud Forensics. 35-46
Forensic Techniques
- Jon Stewart, Joel Uckelman:
Searching Massive Data Streams Using Multipattern Regular Expressions. 49-63 - Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
Fast Content-Based File Type Identification. 65-75 - Bruno W. P. Hoelz, Célia Ghedini Ralha, Frederico Mesquita:
Case-Based Reasoning in Live Forensics. 77-88 - Hector Beyers, Martin S. Olivier, Gerhard P. Hancke:
Assembling Metadata for Database Forensics. 89-99 - Rafael Accorsi, Claus Wonnemann:
Forensic Leak Detection for Business Process Models. 101-113 - Patrick Juola, Darren Vescovi:
Analyzing Stylometric Approaches to Author Obfuscation. 115-125
Fraud and Malware Investigations
- Christian Winter, Markus Schneider, York Yannikos:
Detecting Fraud Using Modified Benford Analysis. 129-141 - Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:
Detecting Collusive Fraud in Enterprise Resource Planning Systems. 143-153 - Heather McCalley, Brad Wardman, Gary Warner:
Analysis of Back-Doored Phishing Kits. 155-168 - Anders Flaglien, Katrin Franke, André Årnes:
Identifying Malware Using Cross-Evidence Correlation. 169-182 - Ickin Vural, Hein S. Venter:
Detecting Mobile Spam Botnets Using Artificial immune Systems. 183-192
Network Forensics
- Brennon Thomas, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
An FPGA System for Detecting Malicious DNS Network Traffic. 195-207 - Emmanuel S. Pilli, Ramesh Chandra Joshi, Rajdeep Niyogi:
Router and Interface Marking for Network Forensics. 209-220 - David Irwin, Jill Slay:
Extracting Evidence Related to VoIP Calls. 221-228
Advanced Forensic Techniques
- Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai:
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations. 231-243 - Mark-Anthony Fouche, Martin S. Olivier:
Steganographic Techniques for Hiding Data in SWF Files. 245-255 - Andrew W. Hay, Dennis Krill, Benjamin Kuhar, Gilbert L. Peterson:
Evaluating Digital Forensic Options for the Apple iPad. 257-273 - Scott Conrad, Greg Dorn, Philip Craiger:
Forensic Analysis of Plug Computers. 275-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.