default search action
Digital Forensics 2008: Kyoto, Japan
- Indrajit Ray, Sujeet Shenoi:
Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. IFIP 285, Springer 2008, ISBN 978-0-387-84926-3
Themes and Issues
- Rodney McKemmish:
When is Digital Evidence Forensically Sound? 3-15 - Mark Pollitt:
Applying Traditional Forensic Taxonomy to Digital Forensics. 17-26
Evidence Recovery
- Frederick Cohen, Charles Preston:
Recovering Data from Failing Floppy Disks. 29-41 - Timothy Pavlic, Jill Slay, Benjamin P. Turnbull:
Extracting Evidence Using Google Desktop Search. 43-50 - Harry Velupillai, Pontjho Mokhonoana:
Evaluation of Registry Data Removal by Shredder Programs. 51-58
Evidence Integrity
- Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryôichi Sasaki:
Using Boot Control to Preserve the Integrity of Evidence. 61-74 - Svein Yngvar Willassen:
Hypothesis-Based Investigation of Digital Timestamps. 75-86 - Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Improving Disk Sector Integrity Using K-Dimension Hashing. 87-98
Evidence Management
- Vassil Roussev, Golden G. Richard III, Lodovico Marziale:
Class-Aware Similarity Hashing for Data Classification. 101-113 - Alta de Waal, Jacobus Venter, Etienne Barnard:
Applying Topic Modeling to Forensic Data. 115-126
Forensic Techniques
- Matthew Kiley, Shira Dankner, Marcus K. Rogers:
Forensic Analysis of Volatile Instant Messaging. 129-138 - Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson:
Timely Rootkit Detection During Live Response. 139-148
Network Forensics
- Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch:
Identifying and Analyzing Web Server Attacks. 151-161 - Murat Gunestas, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services. 163-176 - Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu:
Detecting Remote Exploits Using Data Mining. 177-189
Portable Electronic Device Forensics
- Martin S. Olivier:
Using Sensor Dirt for Toolmark Analysis of Digital Photographs. 193-206 - Fanjie Meng, Xiangwei Kong, Xingang You:
A New Feature-Based Method for Source Camera Identification. 207-218 - Antonio Savoldi, Paolo Gubian:
Data Recovery from Windows CE Based Handheld Devices. 219-230 - Charles Adams, Anthony Whitledge, Sujeet Shenoi:
Legal Issues Pertaining to the Use of Cell Phone Data. 231-243
Event Data Recorder Forensics
- Mark Hartong, Rajni Goel, Duminda Wijesekera:
Protection and Recovery of Railroad Event Recorder Data. 247-260 - Nathan Singleton, Jeremy S. Daily, Gavin Manes:
Automobile Event Data Recorder Forensics. 261-272
Novel Investigative Techniques
- Michael Y. K. Kwan, Kam-Pui Chow, Frank Y. W. Law, Pierre K. Y. Lai:
Reasoning About Evidence Using Bayesian Networks. 275-289 - Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
Inferring Sources of Leaks in Document Management Systems. 291-306 - Paul Fogg, Gilbert L. Peterson, Michael Veth:
Image Background Matching for Identifying Suspects. 307-321
Forensic Tools
- Renico Koen, Martin S. Olivier:
An Evidence Acquisition Tool for Live Systems. 325-334 - Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn:
Time Analysis of Hard Drive Imaging Tools. 335-344 - Benjamin M. Rodriguez, Gilbert L. Peterson, Kenneth W. Bauer Jr.:
Fusion of Steganalysis Systems Using Bayesian Model Averaging. 345-355 - Philip Craiger, Paul Burke, Christopher Marberry, Mark Pollitt:
A Virtual Digital Forensics Laboratory. 357-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.