default search action
Digital Forensics 2006: Orlando, Florida, USA
- Martin S. Olivier, Sujeet Shenoi:
Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006. IFIP Advances in Information and Communication Technology 222, Springer 2006, ISBN 978-0-387-36890-0
Themes and Issues
- Eugene H. Spafford:
Some Challenges in Digital Forensics. 1-9
Evidence Collection and Handling
- Simson L. Garfinkel, David J. Malan, Karl-Alexander Dubec, Christopher C. Stevens, Cecile Pham:
AFF: An Open Extensible Format for Disk Imaging. 13-27 - Golden G. Richard III, Vassil Roussev:
File System Support for Digital Evidence Bags. 29-40 - Indrajit Ray:
Remote Upload of Evidence over Mobile Ad Hoc Networks. 41-54 - Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier:
Applying Machine Trust Models to Forensic Investigations. 55-65 - Mark Pollitt, Anthony Whitledge:
Exploring Big Haystacks: Data Mining and Knowledge Management. 67-76
Forensic Techniques
- Scott Piper, Mark Davis, Sujeet Shenoi:
Countering Hostile Forensic Techniques. 79-90 - James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using PLSI-U to Detect Insider Threats from Email Traffic. 91-103 - Anthony G. Persaud, Yong Guan:
Collusion Detection Using Multimedia Fingerprints. 105-118 - Patrick Juola:
Authorship Attribution for Electronic Documents. 119-130 - Shelly Seier, David Greer, Gavin Manes:
Linking Individuals to Digital Information. 131-140 - Mark Hartong, Rajni Goel, Duminda Wijesekera:
Use-Misuse Case Driven Analysis of Positive Train Control. 141-155
Operating System and File System Forensics
- Philip Craiger, Paul Burke:
Mac OS X Forensics. 159-170 - Mark Davis, Richard Kennedy, Kristina Pyles, Amanda Strickler, Sujeet Shenoi:
Detecting Data Concealment Programs Using File System Analysis. 171-183 - Paul Burke, Philip Craiger:
Assessing Trace Evidence Left by Secure Deletion Programs. 185-195
Network Forensics
- Eric Cronin, Micah Sherr, Matt Blaze:
On the Reliability of Network Eavesdropping Tools. 199-213 - Marco Slaviero, Anna Granova, Martin S. Olivier:
Active Traffic Capture for Network Forensics. 215-228 - Tinus Strauss, Martin S. Olivier, Derrick G. Kourie:
Logical Traffic Isolation Using Differentiated Services. 229-237 - Kenneth Straka, Gavin Manes:
Passive Detection of NAT Routers and Client Counting. 239-246 - Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter:
Analysis of Web Proxy Logs. 247-258 - Christopher Swenson, Tyler Moore, Sujeet Shenoi:
GSM Cell Site Forensics. 259-272 - Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
An Architecture for SCADA Network Forensics. 273-285
Portable Electronic Device Forensics
- Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Identifying Digital Cameras Using CFA Interpolation. 289-299 - Pavel Gershteyn, Mark Davis, Sujeet Shenoi:
Forensic Analysis of BIOS Chips. 301-314
Training, Governance and Legal Issues
- Sudhir Aggarwal, Bob Breeden, Peter Henry, Judie Mulholland:
A Training Tool for Internet Crimes Against Children Cases. 317-330 - Jacobus Venter:
Process Flow Diagrams for Training and Operations. 331-342 - Sebastiaan H. von Solms, C. P. Louwrens, Colette Reekie, Talania Grobler:
A Control Framework for Digital Forensics. 343-355 - Tetsuya Ishii:
Criminal Regulation of Anti-Forensic Tools in Japan. 357-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.