


default search action
Digital Forensics 2009: Hong Kong, China
- Gilbert L. Peterson, Sujeet Shenoi:

Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers. IFIP Advances in Information and Communication Technology 306, Springer 2009, ISBN 978-3-642-04154-9
Themes and Issues
- Mark Pollitt:

Digital Forensics as a Surreal Narrative. 3-15 - Nicole Beebe

:
Digital Forensic Research: The Good, the Bad and the Unaddressed. 17-36 - Jill Slay

, Yi-Chi Lin, Benjamin P. Turnbull, Jason Beckett, Paul Lin:
Towards a Formalization of Digital Forensics. 37-47
Forensic Techniques
- Fred Cohen:

Bulk Email Forensics. 51-67 - Greg Dorn, Christopher Marberry, Scott Conrad, Philip Craiger:

Analyzing the Impact of a Virtual Machine on a Host Machine. 69-81 - Yuandong Zhu, Pavel Gladyshev, Joshua James

:
Temporal Analysis of Windows MRU Registry Keys. 83-93 - Christian Schulze, Marco Schreyer, Armin Stahl, Thomas M. Breuel:

Using DCT Features for Printing Technique and Copy Detection. 95-106 - Bo Wang, Xiangwei Kong, Xingang You:

Source Camera Identification Using Support Vector Machines. 107-118 - Scott Conrad, Carlos Rodriguez, Christopher Marberry, Philip Craiger:

Forensic Analysis of the Sony Playstation Portable. 119-129
Integrity and Privacy
- Yuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsutaro Uehara

, Ryôichi Sasaki:
Implementing Boot Control for Windows Vista. 133-141 - Kamil Reddy, Hein S. Venter:

A Forensic Framework for Handling Information Privacy Incidents. 143-155
Network Forensics
- Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:

Tracking Contraband Files Transmitted Using Bittorrent. 159-173 - Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Kenneth Tse:

A Model for Foxy Peer-to-Peer Network Investigations. 175-186 - Yanlin Peng, Linfeng Zhang, Yong Guan:

Detecting Fraud in Internet Auction Systems. 187-198
Forensic Computing
- Vassil Roussev, Liqiang Wang, Golden G. Richard III

, Lodovico Marziale:
A Cloud Computing Platform for Large-Scale Forensic Computing. 201-214 - Hugo Kleinhans, Jonathan Butts, Sujeet Shenoi:

Password Cracking Using Sony Playstations. 215-227
Investigative Techniques
- Richard E. Overill, Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law:

A Cost-Effective Model for Digital Forensic Investigations. 231-240 - Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law, Hayson Tse:

Analysis of the Digital Evidence Presented in the Yahoo! Case. 241-252
Legal Issues
- Michael Losavio, Olfa Nasraoui

, Vincent Thacker, Jeffrey S. Marean, Nick Miles, Roman V. Yampolskiy, Ibrahim N. Imam
:
Assessing the Legal Risks in Network Forensic Probing. 255-266 - Sydney Liles, Marcus K. Rogers

, Marianne Hoebich:
A Survey of the Legal Issues Facing Digital Forensic Experts. 267-276 - David Billard

:
An Extended Model for E-Discovery Operations. 277-287
Evidence Management
- April Tanner, David A. Dampier:

Concept Mapping for Digital Forensic Investigations. 291-300 - Ashish Gehani, Florent Kirchner, Natarajan Shankar:

System Support for Forensic Inference. 301-316

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














