default search action
Digital Forensics 2014: Vienna, Austria
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics X - 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers. IFIP Advances in Information and Communication Technology 433, Springer 2014, ISBN 978-3-662-44951-6
Internet Crime Investigations
- Wee-Yong Lim, Amit Sachan, Vrizlynn L. L. Thing:
Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection. 3-16 - Clive Blackwell:
Using Fraud Trees to Analyze Internet Credit Card Fraud. 17-29 - Aleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar R. Weippl:
Automated Analysis of Underground Marketplaces. 31-42 - Vivien P. S. Chan, Kam-Pui Chow, Michael Y. K. Kwan, Guy Fong, Michael Hui, Jemy Tang:
An Exploratory Profiling Study of Online Auction Fraudsters. 43-56 - Xiao-Xi Fan, Kam-Pui Chow, Fei Xu:
Web User Profiling Based on Browsing Behavior Analysis. 57-71 - Ricci S. C. Ieong, Kam-Pui Chow:
Validation Rules for Enhanced Foxy P2P Network Investigations. 73-83
Forensic Techniques
- Quang Do, Ben Martini, Jonathan Looi, Yu Wang, Kim-Kwang Raymond Choo:
Windows Event Forensic Process. 87-100 - Oluwasola Mary Adedayo, Martin S. Olivier:
Schema Reconstruction in Database Forensics. 101-116 - Carolina Zarate, Simson L. Garfinkel, Aubin Heffernan, Scott Horras, Kyle Gorak:
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus. 117-132 - Frank Breitinger, Georg Ziroff, Steffen Lange, Harald Baier:
Similarity Hashing Based on Levenshtein Distances. 133-147 - Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, Michael Seefried:
Using Approximate Matching to Reduce the Volume of Digital Data. 149-163 - Ariel Stolerman, Alex Fridman, Rachel Greenstadt, Patrick Brennan, Patrick Juola:
Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion. 165-183 - Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, Rachel Greenstadt:
Breaking the Closed-World Assumption in Stylometric Authorship Attribution. 185-205
Mobile Device Forensics
- Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta:
Preserving Dates and Timestamps for Incident Handling in Android Smartphones. 209-225 - Ahmad Raza Cheema, Mian Muhammad Waseem Iqbal, Waqas Ali:
An Open Source Toolkit for iOS Filesystem Forensics. 227-235 - Heloise Pieterse, Martin S. Olivier:
Smartphones as Distributed Witnesses for Digital Forensics. 237-251 - Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas:
Smartphone Message Sentiment Analysis. 253-265 - Nhien-An Le-Khac, Mark Roeloffs, M. Tahar Kechadi:
Forensic Analysis of the TomTom Navigation Application. 267-276
Forensic Tools and Training
- Ibrahim M. Baggili, Andrew Marrington, Yasser Jafar:
Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool. 279-295 - Stefanie Beyer, Martin Mulazzani, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
Towards Fully Automated Digital Alibis with Social Interaction. 297-307 - York Yannikos, Lukas Graner, Martin Steinebach, Christian Winter:
Data Corpora for Digital Forensics Education and Research. 309-325 - Mark Pollitt, Philip Craiger:
Educating the Next Generation of Cyberforensic Professionals. 327-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.