


default search action
Digital Forensics 2014: Vienna, Austria
- Gilbert L. Peterson

, Sujeet Shenoi:
Advances in Digital Forensics X - 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers. IFIP Advances in Information and Communication Technology 433, Springer 2014, ISBN 978-3-662-44951-6
Internet Crime Investigations
- Wee-Yong Lim, Amit Sachan, Vrizlynn L. L. Thing:

Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection. 3-16 - Clive Blackwell:

Using Fraud Trees to Analyze Internet Credit Card Fraud. 17-29 - Aleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar R. Weippl:

Automated Analysis of Underground Marketplaces. 31-42 - Vivien P. S. Chan, Kam-Pui Chow, Michael Y. K. Kwan, Guy Fong, Michael Hui, Jemy Tang:

An Exploratory Profiling Study of Online Auction Fraudsters. 43-56 - Xiao-Xi Fan, Kam-Pui Chow, Fei Xu:

Web User Profiling Based on Browsing Behavior Analysis. 57-71 - Ricci S. C. Ieong, Kam-Pui Chow:

Validation Rules for Enhanced Foxy P2P Network Investigations. 73-83
Forensic Techniques
- Quang Do, Ben Martini, Jonathan Looi, Yu Wang, Kim-Kwang Raymond Choo:

Windows Event Forensic Process. 87-100 - Oluwasola Mary Adedayo, Martin S. Olivier

:
Schema Reconstruction in Database Forensics. 101-116 - Carolina Zarate, Simson L. Garfinkel

, Aubin Heffernan, Scott Horras, Kyle Gorak:
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus. 117-132 - Frank Breitinger

, Georg Ziroff, Steffen Lange, Harald Baier:
Similarity Hashing Based on Levenshtein Distances. 133-147 - Frank Breitinger

, Christian Winter, York Yannikos
, Tobias Fink, Michael Seefried:
Using Approximate Matching to Reduce the Volume of Digital Data. 149-163 - Ariel Stolerman, Alex Fridman, Rachel Greenstadt, Patrick Brennan, Patrick Juola:

Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion. 165-183 - Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, Rachel Greenstadt:

Breaking the Closed-World Assumption in Stylometric Authorship Attribution. 185-205
Mobile Device Forensics
- Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta:

Preserving Dates and Timestamps for Incident Handling in Android Smartphones. 209-225 - Ahmad Raza Cheema

, Mian Muhammad Waseem Iqbal
, Waqas Ali:
An Open Source Toolkit for iOS Filesystem Forensics. 227-235 - Heloise Pieterse, Martin S. Olivier

:
Smartphones as Distributed Witnesses for Digital Forensics. 237-251 - Panagiotis Andriotis

, Atsuhiro Takasu, Theo Tryfonas
:
Smartphone Message Sentiment Analysis. 253-265 - Nhien-An Le-Khac

, Mark Roeloffs, M. Tahar Kechadi
:
Forensic Analysis of the TomTom Navigation Application. 267-276
Forensic Tools and Training
- Ibrahim M. Baggili, Andrew Marrington, Yasser Jafar:

Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool. 279-295 - Stefanie Beyer, Martin Mulazzani, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:

Towards Fully Automated Digital Alibis with Social Interaction. 297-307 - York Yannikos

, Lukas Graner, Martin Steinebach, Christian Winter:
Data Corpora for Digital Forensics Education and Research. 309-325 - Mark Pollitt, Philip Craiger:

Educating the Next Generation of Cyberforensic Professionals. 327-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














