default search action
Digital Forensics 2018: New Delhi, India
- Gilbert L. Peterson, Sujeet Shenoi:
Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers. IFIP Advances in Information and Communication Technology 532, Springer 2018, ISBN 978-3-319-99276-1
Themes and Issues
- Richard E. Overill, Kam-Pui Chow:
Measuring Evidential Weight in Digital Forensic Investigations. 3-10 - Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
Challenges, Opportunities and a Framework for Web Environment Forensics. 11-33 - Saad Alabdulsalam, Kevin Schaefer, M. Tahar Kechadi, Nhien-An Le-Khac:
Internet of Things Forensics - Challenges and a Case Study. 35-48
Forensic Techniques
- Bhupendra Singh, Upasna Singh, Pankaj Sharma, Rajender Nath:
Recovery of Forensic Artifacts from Deleted Jump Lists. 51-65 - Kyle Porter, Slobodan Petrovic:
Obtaining Precision-Recall Trade-Offs in Fuzzy Searches of Large Email Corpora. 67-85 - Thomas Göbel, Harald Baier:
Anti-Forensic Capacity and Detection Rating of Hidden Data in the Ext4 Filesystem. 87-110 - Jijnasa Nayak, Shweta Singh, Saheb Chhabra, Gaurav Gupta, Monika Gupta, Garima Gupta:
Detecting Data Leakage from Hard Copy Documents. 111-124
Network Forensics
- Irvin Homem, Panagiotis Papapetrou, Spyridon Dosis:
Information-Entropy-Based DNS Tunnel Prediction. 127-140 - Ambika Shrestha Chitrakar, Slobodan Petrovic:
Collecting Network Evidence Using Constrained Approximate Search Algorithms. 141-160 - Jan Pluskal, Ondrej Lichtner, Ondrej Rysavý:
Traffic Classification and Application Identification in Network Forensics. 161-181 - Erwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac:
Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic. 183-197 - Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang:
Hashing Incomplete and Unordered Network Streams. 199-224 - Nour Moustafa, Jill Slay:
A Network Forensic Scheme Using Correntropy-Variation for Attack Detection. 225-239
Cloud Forensics
- Anand Kumar Mishra, Emmanuel S. Pilli, Mahesh Chandra Govil:
A Taxonomy of Cloud Endpoint Forensic Tools. 243-261 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis. 263-289
Mobile and Embedded Device Forensics
- Wenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, Stephanie Reinders:
Forensic Analysis of Android Steganography Apps. 293-312 - Danjun Liu, Yong Tang, Baosheng Wang, Wei Xie, Bo Yu:
Automated Vulnerability Detection in Embedded Devices. 313-329 - Ken Yau, Kam-Pui Chow, Siu-Ming Yiu:
A Forensic Logging System for Siemens Programmable Logic Controllers. 331-349 - Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau:
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers. 351-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.