


default search action
Journal of Digital Forensic Practice, Volume 2
Volume 2, Number 1, 2008
- Ewa Huebner, Derek Bem:

Forensic Extraction of EFS-Encrypted Files in Live System Investigation. 1-12 - Victor Limongelli:

Digital Evidence: Findings of Reliability, Not Presumptions. 13-16 - Jonathan Matusitz:

Postmodernism and Networks of Cyberterrorists. 17-26 - Abdelrahman Desoky, Mohamed F. Younis:

Graphstega: Graph Steganography Methodology. 27-36 - John H. Riley Jr.:

Windows Directory Entries for 8.3 Names in VFAT File Systems. 37-42 - Gary C. Kessler:

On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners. 43-53 - Mark Pollitt:

Digital Orange Juice. 54-56
Volume 2, Number 2, 2008
- Ronald E. Kaplan:

Computer Forensics - What Is It Good For? 57-61 - Mark Pollitt, Kara L. Nance, Brian Hay, Ronald C. Dodge, Philip Craiger, Paul Burke, Christopher Marberry, Bryan Brubaker:

Virtualization and Digital Forensics: A Research and Education Agenda. 62-73 - Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn:

A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon. 74-82 - Scott Inch:

A Simple Image Hiding Technique: What You May Be Missing. 83-94 - Yoginder S. Dandass, Nathan Joseph Necaise, Sherry Reede Thomas:

An Empirical Analysis of Disk Sector Hashes for Data Carving. 95-104 - Mark Pollitt:

Blue Skies and Storm Clouds. 105-106
Volume 2, Number 3, 2008
- Jesse D. Kornblum:

Auditing Hash Sets: Lessons Learned from Jurassic Park. 108-112 - Gavin Wylie Manes, James Johnson, Alex Barclay, Michael Harvey, Elizabeth Downing, John Hale

:
Issues and Techniques for Redacting PDF Files. 113-116 - Seyed Mahmood Hejazi, Mourad Debbabi

, Chamseddine Talhi:
Automated Windows Memory File Extraction for Cyber Forensics Investigation. 117-131 - Abdelrahman Desoky:

Nostega: A Novel Noiseless Steganography Paradigm. 132-139 - David Glen Ferguson:

Redefining File Slack in Microsoft® NTFS. 140-156 - Mark Pollitt:

Managing Expectations. 157-158 - Samuel Liles:

Software Forensics. By Robert Slade. 159-160
Volume 2, Number 4, 2008
- Jonathan Matusitz, Elizabeth Minei:

Cyberterrorism: Its Effects on Health-Related Infrastructures. 161-171 - Mark Pollitt:

The Good, the Bad, the Unaddressed. 172-174 - S. Santhosh Baboo, P. Vinod Bhattathiripad:

Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques. 175-182 - Lucas Donato:

An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations. 183-195 - Vincent Urias, Curtis Hash, Lorie M. Liebrock:

Consideration of Issues for Parallel Digital Forensics of RAID Systems. 196-208 - Wayne Liu, Sudhir Aggarwal, Zhenhai Duan:

Incorporating Accountability into Internet E-mail. 209-220

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














