default search action
Digital Forensics 2007: Orlando, Florida, USA
- Philip Craiger, Sujeet Shenoi:
Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007. IFIP 242, Springer 2007, ISBN 978-0-387-73741-6
Legal Issues
- Barbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke:
Calibration Testing Of Network Tap Devices. 3-19 - Christopher Swenson, Charles Adams, Anthony Whitledge, Sujeet Shenoi:
On the Legality of Analyzing Telephone Call Records. 21-39 - Marc Rogers, K. Scarborough, K. Frakes, C. San Martin:
Survey of Law Enforcement Perceptions Regarding Digital Evidence. 41-52
Insider Threat Detection
- Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew:
Insider Threat Analysis Using Information-Centric Modeling. 55-73 - Daniel A. Ray, Phillip G. Bradford:
An Integrated System for Insider Threat Detection. 75-86
Rootkit Detection
- Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines:
Analysis of Tools for Detecting Rootkits and Hidden Processes. 89-105 - Doug Wampler, James Graham:
A Method for Detecting Linux Kernel Module Rootkits. 107-116
Authorship Attribution
- Patrick Juola:
Future Trends in Authorship Attribution. 119-132 - Carole E. Chaski:
The Keyboard Dilemma and Authorship Identification. 133-146
Forensic Techniques
- Christopher Marberry, Philip Craiger:
Factors Affecting One-Way Hashing of CD-R Media. 149-161 - James R. Lyle, Steven Mead, Kelsey Rider:
Disk Drive I/O Commands and Write Blocking. 163-177 - Nicole Beebe, Glenn B. Dietrich:
A New Process Model for Text String Searching. 179-191 - Benjamin M. Rodriguez, Gilbert L. Peterson:
Detecting Steganography Using Multi-Class Classification. 193-204 - Alex Barclay, L. Watson, David Greer, John Hale, Gavin Manes:
Redacting Digital Information from Electronic Devices. 205-214
File Systems Forensics
- Golden G. Richard III, Vassil Roussev, Lodovico Marziale:
In-Place File Carving. 217-230 - Christopher Swenson, Raquel Phillips, Sujeet Shenoi:
File System Journal Forensics. 231-244
Network Forensics
- Robert McGrew, Rayford B. Vaughn:
Using Search Engines to Acquire Network Forensic Evidence. 247-253 - Mark Hartong, Rajni Goel, Duminda Wijesekera:
A Framework for Investigating Railroad Accidents. 255-265
Portable Electronic Device Forensics
- Paul Burke, Philip Craiger:
Forensic Analysis of Xbox Consoles. 269-280 - Ashish Gehani, John H. Reif:
Super-Resolution Video Analysis for Forensic Investigations. 281-299
Evidence Analysis and Management
- Jacobus Venter, Alta de Waal, Cornelius Willers:
Specializing CRISP-DM for Evidence Mining. 303-315 - Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter:
Applying The Biba Integrity Model to Evidence Management. 317-327
Formal Methods
- Nayot Poolsapassit, Indrajit Ray:
Investigating Computer Attacks Using Attack Trees. 331-343 - Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie:
Attack Patterns: A New Forensic and Design Tool. 345-357
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.