


default search action
Journal of Digital Forensics, Security and Law, Volume 5
Volume 5, Number 1, 2010
- Gregory H. Carlton, Reginald Worthley:
Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners. 5-20 - Chun Wei, Alan P. Sprague, Gary Warner
, Anthony Skjellum:
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining. 21-48 - Aleksander Byrski
, Wojciech Stryjewski, Bartlomiej Czechowicz:
Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage. 49-62
Volume 5, Number 2, 2010
- Yinghua Guo, Jill Slay:
Computer Forensic Function Testing: Media Preparation, Write Protection And Verification. 5-20 - Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryôichi Sasaki:
HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery. 21-34 - Craig Valli
:
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. 35-44 - Luciana Duranti, Barbara Endicott-Popovsky:
Digital Records Forensics: A New Science and Academic Program for Forensic Readiness. 45-62 - Grover S. Kearns:
Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach. 63-84 - Gary C. Kessler:
Book Review: Digital Forensic Evidence Examination (2nd ed.). 85-88
Volume 5, Number 3, 2010
- Graeme Baxter Bell, Richard Boddington:
The Beginning of the End for Digital Forensic Recovery? 5-32 - Brad Wardman:
The Deadliest Catch: Reeling In Big Phish With a Deep MD5 Net. 33-56 - Sameera Mubarak:
Trust Account Fraud And Effective Information Security Management. 57-72
Volume 5, Number 4, 2010
- Khawla Abdulla Alghafli, Andrew Jones, Thomas Anthony Martin
:
Forensic Analysis of the Windows 7 Registry. 5-30 - Murray Brand, Craig Valli
, Andrew Woodward:
Malware Forensics: Discovery of the Intent of Deception. 31-42 - Andy Jones, Craig Valli
, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies:
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. 43-64 - Milton H. Luoma, Vicki Miller Luoma:
Avoiding Sanctions at the E-Discovery Meet-And- Confer in Common Law Countries. 65-80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.