


default search action
SADFE 2007: Seattle, Washington, USA
- Ming-Yuh Huang, Deborah A. Frincke:
Second International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2007, Seattle, Washington, USA, April 10-12, 2007. IEEE Computer Society 2007, ISBN 0-7695-2808-2
Use of Models in Forensics
- Sean Peisert
, Matt Bishop, Sidney Karin, Keith Marzullo:
Toward Models for Forensic Analysis. 3-15 - Michael W. Andrew:
Defining a Process Model for Forensic Analysis of Digital Devices and Storage Media. 16-30 - Jorge Herrerías Guerrero, Roberto Gómez Cárdenas:
A Log Correlation Model to Support the Evidence Search Process in a Forensic Investigation. 31-42
Use of Models in Forensics
- Mark Pollitt:
An Ad Hoc Review of Digital Forensic Models. 43-54
Gathering and Understanding Digital Forensic Data
- Robert F. Erbacher, John Mulholland:
Identification and Localization of Data Types within Large-Scale File Systems. 55-70 - Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Pierre K. Y. Lai:
The Rules of Time on NTFS File System. 71-85 - Antonio Savoldi, Paolo Gubian:
Data Hiding in SIM/USIM Cards: A Steganographic Approach. 86-100
Gathering and Understanding Digital Forensic Data (Panels)
- Michael Losavio:
Panel: Lawyers, Judges and Digital Forensics: Evaluating Situational Awareness and Evidentiary Skills with Electronic Evidence, from Cybercrime to Civil Lawsuits.. 101 - Philip Attfield, Stephen Schroeder:
Real-World Implications of Digital Forensics: Technical, Methodological & Procedural Hurdles. 102
Forensic Analysis Tools: Are They Performing the Way They Should?
- Sudhir Aggarwal, Daniel Beech, Rajarshi Das, Breno de Medeiros, Eric Thompson:
X-Online: An Online Interface for Digital Decryption Tools. 105-116 - Lei Pan
, Lynn Margaret Batten:
A Lower Bound on Effective Performance Testing for Digital Forensic Tools. 117-130 - Barbara Endicott-Popovsky, J. D. Fluckiger, Deborah A. Frincke:
Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs. 131-146
Challenge Papers
- Adel Elmaghraby
, James H. Graham, Jana Godwin, Michael Losavio, Deborah Wilson:
Challenge - Construction of an Adequate Digital Forensics Testbed. 147-149 - Robert F. Erbacher, Barbara Endicott-Popovsky, Deborah A. Frincke:
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution. 150-154
Education and Training
- Carol A. Taylor, Barbara Endicott-Popovsky, Amelia Phillips:
Forensics Education: Assessment and Measures of Excellence. 155-165 - Michael Losavio:
Panel Topic: Education and Interdisciplinary Issues in Digital Forensics, Computer Science and Judicial Process. 166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.