


default search action
SADFE 2005: Taipei, Taiwan
- First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan. IEEE Computer Society 2005, ISBN 0-7695-2478-8
Introductions
- Preface.
- Committees.
Keynote Address I
- Philip Attfield:
United States v Gorshkov Detailed Forensics and Case Study; Expert Witness Perspective. 3-26
Session 1: Digital Forensic Engineering Process and Standards
- A. Chris Bogen, David A. Dampier:
Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective. 27-39 - Patrick S. Chen, Lawrence M. F. Tsai, Ying-Chieh Chen, George Yee:
Standardizing the Construction of a Digital Forensics Laboratory. 40-47 - Tom Wilsdon, Jill Slay
:
Digital Forensics: Exploring Validation, Verification and Certification. 48-55 - C. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu:
Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. 56-68
Keynote Address II
- Stephen C. Schroeder:
How to be a Digital Forensic Expert Witness. 69-88
Session 2: Tools and Investigation Methodologies
- Jacob Zimmermann, Andrew J. Clark, George M. Mohay, Fabien Pouget, Marc Dacier
:
The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. 89-104 - Fabio Casadei, Antonio Savoldi, Paolo Gubian:
SIMbrush: an Open Source Tool for GSM and UMTS Forensics Analysis. 105-119 - Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier
:
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. 120-134
Session 3: Evidence Analysis and Case Construction
- Ajantha Herath, Susantha Herath, Prasantha Samarasinghe, Jayantha Herath:
Computer Forensics, Information Security and Law: A Case Study. 135-141 - Charles W. Adams:
Legal Requirements for the Use of Keystroke Loggers. 142-154
Keynote Address IV
- George M. Mohay:
Technical Challenges and Directions for Digital Forensics. 155-164
Session 4: Legal Issues: Evidences, Cases and Prosecution
- Sudhir Aggarwal, Peter Henry, Leo Kermes, Judie Mulholland:
Evidence Handling in Proactive Cyberstalking Investigations: The PAPA Approach. 165-176 - Michael Martin Losavio:
The Law of Possession of Digital Objects: Dominion and Control Issues for Digital Forensics Investigations and Prosecutions. 177-186
Session 5: Cyber Investigation Systems
- Kam-Pui Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan:
Digital Evidence Search Kit. 187-194 - Sudhir Aggarwal, Mike Burmester, Peter Henry, Leo Kermes, Judie Mulholland:
Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. 195-205 - Lyta Penna, Andrew J. Clark, George M. Mohay:
Challenges of Automating the Detection of Paedophile Activity on the Internet. 206-222
Session 6: Integrity and Preservation of Data/Evidences
- I-Chuan Chang, Bor-Wen Hsu, Chi-Sung Laih:
A DCT Quantization-Based Image Authentication System for Digital Forensics. 223-235 - Seokhee Lee
, Hyunsang Kim, Sangjin Lee, Jongin Lim:
Digital evidence collection process in integrity and memory information gathering. 236-247 - Dario V. Forte, Cristiano Maruti, Michele R. Vetturi, Michele Zambelli:
SecSyslog: an Approach to Secure Logging Based on Covert Channels. 248-263 - Dun-Yu Hsiao, Soo-Chang Pei:
Detecting Digital Tampering by Blur Estimation. 264-278

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.