


default search action
SADFE 2008: Berkeley, California, USA
- Third International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008, Berkeley, California, USA, May 22, 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3171-7
Finding Evidence for Digital Forensics I
- Abhishek Choudhury, Marcus K. Rogers, William Blair Gillam, Keith Watson:
A Novel Skin Tone Detection Algorithm for Contraband Image Analysis. 3-9 - Dennis K. Nilsson, Ulf Larson:
Combining Physical and Digital Evidence in Vehicle Environments. 10-14 - Antonio Savoldi, Paolo Gubian:
Towards the Virtual Memory Space Reconstruction for Windows Live Forensic Purposes. 15-22
Digital Forensics Theory
- Slim Rekhis
, Jihène Krichène, Noureddine Boudriga:
Cognitive-Maps Based Investigation of Digital Security Incidents. 25-40 - Sarah J. Moody, Robert F. Erbacher:
SÁDI - Statistical Analysis for Data Type Identification. 41-54
Finding Evidence for Digital Forensics II - Workstation Logs and Residual Data
- Steena Dominica Steven Monteiro, Robert F. Erbacher:
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model. 57-68 - Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S. Wallach:
Finding the Evidence in Tamper-Evident Logs. 69-75
A Legal View of Digital Forensics
- Michael Losavio, Deborah W. Keeling, Adel Elmaghraby
, George Higgins, John Shutt:
Implications of Attorney Experiences with Digital Forensics and Electronic Evidence in the United States. 79-90 - Frank Y. W. Law, Pierre K. Y. Lai, Zoe Lin Jiang, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, C. F. Chong:
Protecting Digital Legal Professional Privilege (LPP) Data. 91-101 - Sean Peisert
, Matt Bishop, Keith Marzullo:
Computer Forensics in Forensis. 102-122 - Charles W. Adams:
Legal Issues Pertaining to the Development of Digital Forensic Tools. 123-132
Works in Progress
- Olfa Nasraoui
, Deborah W. Keeling, Adel Elmaghraby
, George Higgins, Michael Losavio:
Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband Material. 135-140 - Jeffrey S. Marean, Mike Losavio, Ibrahim N. Imam:
A Research Configuration for a Digital Network Forensic Lab. 141-142 - Michael Losavio, Deborah W. Keeling, Adel Elmaghraby, George Higgins, John Shutt:
Network Forensics: Network Data and State Seizures in the United States. 143 - Robert Zeidman:
Multidimensional Correlation of Software Source Code. 144-156

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.