default search action
Digital Forensics 2017: Orlando, FL, USA
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers. IFIP Advances in Information and Communication Technology 511, Springer 2017, ISBN 978-3-319-67207-6
Themes and Issues
- Oluwasayo Oyelami, Martin Olivier:
Establishing Findings in Digital Forensic Examinations: A Case Study Method. 3-21 - Albert Antwi-Boasiako, Hein S. Venter:
A Model for Digital Evidence Admissibility Assessment. 23-38
Mobile and Embedded Device Forensics
- Heloise Pieterse, Martin S. Olivier, Renier van Heerden:
Evaluating the Authenticity of Smartphone Evidence. 41-61 - Logan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland:
Forensic Evaluation of an Amazon Fire TV Stick. 63-79 - Ken Yau, Kam-Pui Chow:
Detecting Anomalous Programmable Logic Controller Events Using Machine Learning. 81-94
Network and Cloud Forensics
- Tommy Chin, Kaiqi Xiong:
A Forensic Methodology for Software-Defined Network Switches. 97-110 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Identifying Evidence for Cloud Forensic Analysis. 111-130
Threat Detection and Mitigation
- Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski:
Digital Forensic Implications of Collusion Attacks on the Lightning Network. 133-147 - Nicole Beebe, Lishu Liu, Zi Ye:
Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis. 149-167 - Bruno W. P. Hoelz, Marcelo Maues:
Anti-Forensic Threat Modeling. 169-183
Malware Forensics
- Rayan Mosli, Rui Li, Bo Yuan, Yin Pan:
A Behavior-Based Approach for Malware Detection. 187-201 - Zachary Grimmett, Jason Staggs, Sujeet Shenoi:
Categorizing Mobile Device Malware Based on System Side-Effects. 203-219
Image Forensics
- Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. 223-244 - Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta:
Detecting Fraudulent Bank Checks. 245-266
Forensic Techniques
- Ryan Good, Gilbert L. Peterson:
Automated Collection and Correlation of File Provenance Information. 269-284 - Shiva Houshmand, Sudhir Aggarwal:
Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks. 285-303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.