


default search action
Journal of Digital Forensic Practice, Volume 1
Volume 1, Number 1, 2006
- Peter Stephenson:
Trends. 1-2 - Alan E. Brill, Mark Pollitt, Carrie Morgan Whitcomb:
The Evolution of Computer Forensic Best Practices: An Update on Programs and Publications. 3-11 - Michael Losavio, Julia Adams, Marc Rogers:
Gap Analysis: Judicial Experience and Perception of Electronic Evidence. 13-17 - Eric Van Buskirk, Vincent T. Liu:
Digital Evidence: Challenging the Presumption of Reliability. 19-26 - John E. Kerivan:
Heuristic Security-Testing Methods. 27-36 - Angela Orebaugh:
Proactive Forensics. 37-41 - Anthony Nelson:
ISO 27001 as a Support to Digital Forensics. 43-46 - Chet Hosmer:
Discovering Hidden Evidence. 47-56 - Wei Ren:
Modeling Network Forensics Behavior. 57-65 - Mark Pollitt:
Exploration. 67-68 - Scott L. Ksander, William Blair Gillam, Marcus K. Rogers:
Ultrablock Forensic Card Reader. 69-70
Volume 1, Number 2, 2006
- Judie Mulholland:
Message from the Guest Editor. 73-74 - Peter Cassidy:
Statement of Support Anti-Phishing Working Group (APWG). 75-76 - Patrick Cain:
Using XML to Support Robust Information Sharing: An IODEF Automated Approach. 77-82 - Anthony Y. Fu, Xiaotie Deng, Liu Wenyin:
REGAP: A Tool for Unicode-Based Web Identity Fraud Detection. 83-97 - Susan Grant:
The National Consumers League's Call for Action. 99-101 - John S. Quarterman:
PhishScope: Tracking Phish Server Clusters. 103-114 - Gregg Tally, David Sames, Thomas Chen, Chris Colleran, David Jevans, Kevin Omiliak, Rod Rasmussen:
The Phisherman Project: Creating a Comprehensive Data Collection to Combat Phishing Attacks. 115-129 - Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz:
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. 131-142 - Wayne E. Sprague:
Uncharted Waters: Prosecuting Phishing and Online Fraud Cases. 143-146 - Thomas Chen, Peter Henry:
A Review of: "Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. By Markus Jakobsson and Steven Myers, Editors". 147-149
Volume 1, Number 3, 2006
- Judie Mulholland:
Message from the Guest Editor. 151-152 - Victor A. Johnson:
Phishing Tripz. 153-155 - Erin Kenneally:
Enabling the Enablers: An Identity Fraud Solution for Law Enforcement. 157-164 - Robert Lyda, James Hamrock:
Exploring Investigative Methods for Identifying and Profiling Serial Bots. 165-177 - Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel:
Warkitting: The Drive-by Subversion of Wireless Home Routers. 179-192 - Craig M. McRae, Robert Wesley McGrew, Rayford B. Vaughn:
Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams. 193-199 - Bob Breeden, Mike Cantey, Brett Cureton, Clifford Stokes, Peter Henry, Judie Mulholland, Wayne Sprague, Jim Watson:
The Phlorida Autopsy Report. 203-222 - J. Philip Craiger, Paul Burke, Christopher Marberry:
Open Source Tools for Phishing Investigations. 223-229 - Bob Radvanovsky:
Analyzing Spoofed E-mail Headers. 231-243 - Aaron Emigh:
The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond. 245-260 - Peter Henry:
A Review of: "Phishing Exposed: Uncover Secrets from the Dark Side. By Lance James Phishing: Cutting the Identity Theft Line. By Rachel Lininger and Russell Dean Uines". 261-262
Volume 1, Number 4, 2006
- Thijs Bosschert:
Battling Anti-Forensics: Beating the U3 Stick. 265-273 - Paul Burke, Philip Craiger:
Xbox Forensics. 275-282 - Mark Pollitt:
Byte/Counterbyte. 283-284 - Fredesvinda Insa:
The Admissibility of Electronic Evidence in Court (A.E.E.C.): Fighting against High-Tech Crime - Results of a European Study. 285-289 - Michael Losavio, Deborah Wilson, Adel Elmaghraby:
Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices. 291-296 - Christopher Marberry, Philip Craiger:
CD-R Acquisition Hashes Affected by Write Options. 297-307 - Aaron Smith:
Describing and Categorizing Disk-Avoiding Anti-Forensics Tools. 309-313 - Timothy M. Vidas:
The Acquisition and Analysis of Random Access Memory. 315-323 - Nicole Beebe, Gary C. Kessler:
A Review of: "Real Digital Forensics: Computer Security and Incident Response. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose". 325-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.