default search action
Digital Investigation, Volume 1
Volume 1, Number 1, February 2004
- Eoghan Casey:
The need for knowledge sharing and standardization. 1-2 - Geoff Fellows:
Peer-to-peer networking issues - an overview. 3-6 - Monique Mattei Ferraro, Andrew Russell:
Current issues confronting well-established computer-assisted child exploitation and computer crime task forces. 7-15 - Peter Sommer:
The challenges of large computer evidence cases. 16-17 - Chris Boyd, Pete Forster:
Time and date issues in forensic computing - a case study. 18-23 - Peter Stephenson:
The right tools for the job. 24-27 - Eoghan Casey:
Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. 28-43 - Events. 45-
- Research summary. 47-49
- Brian D. Carrier, Joe Grand:
A hardware-based memory acquisition procedure for digital investigations. 50-60 - Sarah Mocas:
Building theoretical underpinnings for digital forensics research. 61-68 - Thomas E. Daniels:
A functional reference model of passive systems for tracing network traffic. 69-81
Volume 1, Number 2, June 2004
- Eoghan Casey:
The need for objective case review. 83-85 - Sarah Hilley:
News announcements. 86-88 - Esther George:
UK Computer Misuse Act - the Trojan virus defence: Regina v Aaron Caffrey, Southwark Crown Court, 17 October 2003. 89- - Matthew Pemble:
Investigating around mainframes and other high-end systems: the revenge of big iron. 90-93 - Erin Kenneally:
Digital logs - proof matters. 94-101 - Hank Wolfe:
Penetrating encrypted evidence. 102-105 - Beryl A. Howell:
Ambiguities in US law for investigators. 106-111 - Éric Freyssinet, Zeno J. M. H. Geradts:
Future issues in forensic computing and an introduction to ENSFI. 112-113 - Eoghan Casey:
Tool review - WinHex. 114-128 - Sarah Hilley:
Events. 129- - Pavel Gladyshev, Ahmed Patel:
Finite state machine approach to digital event reconstruction. 130-149 - Olivier Y. de Vel:
File classification using byte sub-stream kernels. 150-157
Volume 1, Number 3, September 2004
- Eoghan Casey:
Reporting security breaches - a risk to be avoided or responsibility to be embraced? 151-161 - Sarah Hilley:
News. Digit. Investig. 1(3): 162-164 (2004) - Chris Vaughan:
Xbox security issues and forensic recovery methodology (utilising Linux). 165-172 - Owen O'Connor:
Deploying forensic tools via PXE. 173-176 - Douglas A. Schmitknecht:
Building FBI computer forensics capacity: one lab at a time. 177-182 - Andy Jones, Christopher Meyler:
What evidence is left after disk cleaners? 183-188 - Nigel Jones:
Training and accreditation - who are the experts? 189-194 - D. Watson:
Book Review. 195-196 - Cory Altheide:
Forensic analysis of Windows hosts using UNIX-based tools. 197-212 - Events. Digit. Investig. 1(3): 213- (2004)
- Matthew B. Gerber, John Leeson:
Formalization of computer input and output: the Hadley model. 214-224 - Malcolm W. Stevens:
Unification of relative time frames for digital forensics. 225-239
Volume 1, Number 4, December 2004
- Eoghan Casey:
State of the field: growth, growth, growth. 241-242 - News announcements. Digit. Investig. 1(4): 243-246 (2004)
- Bruce J. Nikkel:
Domain name forensics: a systematic approach to investigating an internet presence. 247-255 - Harlan Carvey:
Instant messaging investigations on a live Windows XP system. 256-260 - Philip Sealey:
Remote forensics. 261-265 - Barrie Mellars:
Forensic examination of mobile phones. 266-272 - Robert Jones:
Your day in court - the rôle of the expert witness. 273-278 - Mark Solon, Penny Harper:
Preparing evidence for court. 279-283 - Eoghan Casey, Aaron Stanley:
Tool review - remote forensic preservation and examination tools. 284-297 - Florian P. Buchholz, Eugene H. Spafford:
On the role of file system metadata in digital forensics. 298-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.