


default search action
Digital Forensics 2005: Orlando, Florida, USA
- Mark Pollitt, Sujeet Shenoi:

Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, February 13-16, 2005. IFIP 194, Springer 2006, ISBN 0-387-30012-0
Themes and Issues
- Nicole Beebe, Jan Guynes Clark:

Dealing with Terabyte Datasets in Digital Investigations. 3-16 - Martin S. Olivier:

Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. 17-31 - Mark Davis, Gavin Manes, Sujeet Shenoi:

A Network-Based Architecture for Storing Digital Evidence. 33-42 - Matthew Meyers, Marcus K. Rogers:

Digital Forensics: Meeting the Challenges of Scientific Evidence. 43-50 - Michael Losavio:

Non-Technical Manipulation of Digital Data - Legal, Ethical and Social Issues. 51-63
Investigative Techniques
- Michael D. Hoeschele, Marcus K. Rogers:

Detecting Social Engineering. 67-77 - Anthony G. Persaud, Yong Guan:

A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery. 79-90 - Thomas Duval, Bernard Jouga, Laurent Roger:

The Mitnick Case: How Bayes Could Have Helped. 91-104 - Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter:

Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. 105-112 - Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier:

Exploring Forensic Data with Self-Organizing Maps. 113-123
Network Forensics
- Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon:

Integrating Digital Forensics in Network Infrastructures. 127-140 - Scott Redding:

Using Peer-to-Peer Technology for Network Forensics. 141-152 - Pallavi Kahai, Mannivannan Srinivasan, Kameswara Rao Namuduri:

Forensic Profiling System. 153-164 - Eunjong Kim, Daniel Massey, Indrajit Ray:

Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. 165-176 - Tyler Moore, Anthony Meehan, Gavin Manes, Sujeet Shenoi:

Using Signaling Information in Telecom Network Forensics. 177-188
Portable Electronic Device Forensics
- Svein Yngvar Willassen:

Forensic Analysis of Mobile Phone Internal Memory. 191-204 - Christopher Swenson, Gavin Manes, Sujeet Shenoi:

Imaging and Analysis of GSM SIM Cards. 205-216 - Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi:

Extracting Concealed Data from BIOS Chips. 217-230
Linux and File System Forensics
- Philip Craiger:

Recovering Digital Evidence from Linux Systems. 233-244 - Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi:

Detecting Hidden Data in Ext2/Ext3 File Systems. 245-256
Applications and Techniques
- Gilbert L. Peterson:

Forensic Analysis of Digital Image Tampering. 259-270 - Yixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao:

Content-Based Image Retrieval for Digital Forensics. 271-282 - Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael:

Making Decisions about Legal Responses to Cyber Attacks. 283-294 - Jill Slay, Kris Jorgensen:

Applying Filter Clusters to Reduce Search State Space. 295-301 - Yusuf Motara, Barry Irwin:

In-Kernel Cryptographic Executable Verification. 303-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














