


default search action
Digital Forensics 2017: Orlando, FL, USA
- Gilbert L. Peterson, Sujeet Shenoi:

Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers. IFIP Advances in Information and Communication Technology 511, Springer 2017, ISBN 978-3-319-67207-6
Themes and Issues
- Oluwasayo Oyelami, Martin Olivier

:
Establishing Findings in Digital Forensic Examinations: A Case Study Method. 3-21 - Albert Antwi-Boasiako, Hein S. Venter

:
A Model for Digital Evidence Admissibility Assessment. 23-38
Mobile and Embedded Device Forensics
- Heloise Pieterse

, Martin S. Olivier
, Renier van Heerden:
Evaluating the Authenticity of Smartphone Evidence. 41-61 - Logan Morrison, Huw Read

, Konstantinos Xynos
, Iain Sutherland
:
Forensic Evaluation of an Amazon Fire TV Stick. 63-79 - Ken Yau, Kam-Pui Chow:

Detecting Anomalous Programmable Logic Controller Events Using Machine Learning. 81-94
Network and Cloud Forensics
- Tommy Chin, Kaiqi Xiong:

A Forensic Methodology for Software-Defined Network Switches. 97-110 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:

Identifying Evidence for Cloud Forensic Analysis. 111-130
Threat Detection and Mitigation
- Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski:

Digital Forensic Implications of Collusion Attacks on the Lightning Network. 133-147 - Nicole Beebe, Lishu Liu, Zi Ye:

Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis. 149-167 - Bruno W. P. Hoelz, Marcelo Maues:

Anti-Forensic Threat Modeling. 169-183
Malware Forensics
- Rayan Mosli, Rui Li, Bo Yuan, Yin Pan

:
A Behavior-Based Approach for Malware Detection. 187-201 - Zachary Grimmett, Jason Staggs, Sujeet Shenoi:

Categorizing Mobile Device Malware Based on System Side-Effects. 203-219
Image Forensics
- Junbin Fang

, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. 223-244 - Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta:

Detecting Fraudulent Bank Checks. 245-266
Forensic Techniques
- Ryan Good, Gilbert L. Peterson

:
Automated Collection and Correlation of File Provenance Information. 269-284 - Shiva Houshmand

, Sudhir Aggarwal:
Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks. 285-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














