default search action
Digital Investigation, Volume 5
Volume 5, Numbers 1-2, September 2008
- Eoghan Casey:
State of the Journal. 1-2 - Sarah Hilley:
News. 3-5 - James Wardwell, G. Stevenson Smith:
Recovering erased digital evidence from CD-RW discs in a child exploitation investigation. 6-9 - Beverley Nutter:
Pinpointing TomTom location records: A forensic analysis. 10-18 - Wouter S. van Dongen:
Case study: Forensic analysis of a Samsung digital video recorder. 19-28 - David Byers, Nahid Shahmehri:
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors. 29-33 - Christopher James Hargreaves, Howard Chivers, Dave Titheridge:
Windows Vista and digital investigations. 34-48 - Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon:
Classification of digital camera-models based on demosaicing artifacts. 49-59 - Chad M. S. Steel, Chang-Tien Lu:
Impersonator identification through dynamic fingerprinting. 60-70 - Joseph J. Schwerha IV:
Why computer forensic professionals shouldn't be required to have private investigator licenses. 71-72
Volume 5, Number Supplement, September 2008
- Anandabrata Pal, Husrev T. Sencar, Nasir D. Memon:
Detecting file fragmentation point using sequential hypothesis testing. S2-S13 - William C. Calhoun, Drue Coles:
Predicting the types of file fragments. S14-S20 - Jesse D. Kornblum:
Using JPEG quantization tables to identify imagery processed by software. S21-S25 - Brendan Dolan-Gavitt:
Forensic analysis of the Windows registry in memory. S26-S32 - Timothy D. Morgan:
Recovering deleted data from the Windows registry. S33-S41 - Farkhund Iqbal, Rachid Hadjidj, Benjamin C. M. Fung, Mourad Debbabi:
A novel approach of mining write-prints for authorship attribution in e-mail forensics. S42-S51 - Ruud B. van Baar, Wouter Alink, Alex van Ballegooij:
Forensic memory analysis: Files mapped in memory. S52-S57 - Andreas Schuster:
The impact of Microsoft Windows pool allocation strategies on memory forensics. S58-S64 - Andrew Case, Andrew Cristina, Lodovico Marziale, Golden G. Richard III, Vassil Roussev:
FACE: Automated digital evidence discovery and correlation. S65-S75 - Aaron Burghardt, Adam J. Feldman:
Using the HFS+ journal for deleted file recovery. S76-S82 - Robert A. Joyce, Judson Powers, Frank Adelstein:
MEGA: A tool for Mac OS X operating system and application forensics. S83-S90 - Jooyoung Lee, Sung-Kyong Un, Dowon Hong:
High-speed search using Tarari content processor in digital forensics. S91-S95 - Joseph Lewthwaite, Victoria Smith:
Limewire examinations. S96-S104 - Stephen Brueckner, David Guaspari, Frank Adelstein, Joseph Weeks:
Automated computer forensics training in a virtualized environment. S105-S111 - Michael I. Cohen:
PyFlag - An advanced network forensic framework. S112-S120 - Alessandro Distefano, Gianluigi Me:
An overall assessment of Mobile Internal Acquisition Tool. S121-S127 - Olivier Thonnard, Marc Dacier:
A framework for attack patterns' discovery in honeynet data. S128-S139
Volume 5, Numbers 3-4, March 2009
- Eoghan Casey:
"Dawn raids" bring a new form in incident response. 73-74 - Jesse D. Kornblum:
Implementing BitLocker Drive Encryption for forensic analysis. 75-84 - Nigel R. Poole, Qin Zhou, P. Abatis:
Analysis of CCTV digital video recorder hard disk storage system. 85-92 - Murilo Tito Pereira:
Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records. 93-103 - Bora Park, Jungheum Park, Sangjin Lee:
Data concealment and detection in Microsoft Office 2007 files. 104-114 - Martin S. Olivier:
On metadata context in Database Forensics. 115-123 - Rachid Hadjidj, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem:
Towards an integrated e-mail forensic analysis framework. 124-137 - Michael I. Cohen:
Source attribution for network address translated forensic captures. 138-145 - Peter Sommer:
Meetings between experts: A route to simpler, fairer trials? 146-152 - Peter F. R. Forster:
Steve Anson and Steve Bunting, Mastering Windows network forensics and investigations , Sybex (an imprint of Wiley Publishing Inc.), US and Canada (2007) ISBN 978-0-4700-9762-5 530 pp. 153-154
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.