![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
5. DFRWS 2005: New Orleans, Louisiana, USA
- Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, DFRWS 2005, Astor Crowne Plaza, New Orleans, Louisiana, USA, August 17-19, 2005. 2005
Data Hiding and Counter Forensics
- Knut Eckstein, Marko Jahnke:
Data Hiding in Journaling File Systems. - Matthew Geiger:
Evaluating Commercial Counter-Forensic Tools. - Frank Adelstein, Yun Gao, Golden G. Richard III:
Automatically Creating Realistic Targets for Digital Forensics Investigation.
Scalability and Automation
- Brian D. Carrier, Eugene H. Spafford:
Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. - A. Chris Bogen, David A. Dampier:
Preparing for Large-Scale Investigations with Case Domain Modeling.
Network and File System Analysis
- William Blair Gillam, Marc Rogers:
File Hound: A Forensics Tool for First Responders. - Christian G. Sarmoria, Steve J. Chapin:
Monitoring Access to Shared Memory-Mapped Files. - Wei Wang, Thomas E. Daniels:
Network Forensics Analysis with Evidence Graphs.
Digital Forensics Tools
- Florian P. Buchholz, Courtney Falk:
Design and Implementation of Zeitline: a Forensic Timeline Editor. - Philip Turner:
Unification of Digital Evidence from Disparate Sources (Digital Evidence Bags). - Golden G. Richard III, Vassil Roussev:
Scalpel: A Frugal, High Performance File Carver.
Collection and Processing of Digital Evidence
- Lei Pan, Lynn Margaret Batten:
Reproducibility of Digital Evidence in Forensic Investigations. - Erin E. Kenneally, Christopher L. T. Brown:
Risk Sensitive Digital Evidence Collection. DFRWS 2005
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.