


default search action
ICDF2C 2013: Moscow, Russia
- Pavel Gladyshev

, Andrew Marrington, Ibrahim M. Baggili:
Digital Forensics and Cyber Crime - Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 132, Springer 2014, ISBN 978-3-319-14288-3
Digital Forensics - Technical
- Munkhbaatar Doyoddorj, Kyung Hyune Rhee:

Robust Copy-Move Forgery Detection Based on Dual-Transform. 3-16 - P. Shabana Subair, C. Balan, S. Dija, K. L. Thomas:

Forensic Decryption of FAT BitLocker Volumes. 17-29 - Prachi Goel, Babu M. Mehtre:

Forensic Artifacts of the flareGet Download Manager. 30-38 - Asif Iqbal, Hanan Al Obaidli, Andrew Marrington

, Ibrahim M. Baggili
:
Amazon Kindle Fire HD Forensics. 39-50 - Martin Lambertz, Rafael Uetz, Elmar Gerhards-Padilla:

Resurrection: A Carver for Fragmented Files. 51-66 - Rainer Poisel, Marlies Rybnicek, Simon Tjoa

:
Taxonomy of Data Fragment Classification Techniques. 67-85 - Neil C. Rowe:

Identifying Forensically Uninteresting Files Using a Large Corpus. 86-101 - Martin Steinebach, Huajian Liu, York Yannikos

:
FaceHash: Face Detection and Robust Hashing. 102-115
Information Warfare, Cyber Terrorism, and Critical Infrastructure Protection
- Esti Peshin:

Regulating Social Network Services for Lawful Interception. 119-129 - Murdoch Watney

:
Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis. 130-143
Digital Forensics - Standards, Certification and Accreditation
- Joshua I. James

, Alejandra Lopez-Fernandez, Pavel Gladyshev:
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations. 147-169 - Frank Breitinger

, Huajian Liu, Christian Winter, Harald Baier, Alexey Rybalchenko, Martin Steinebach:
Towards a Process Model for Hash Functions in Digital Forensics. 170-186
Automation in Digital Forensics
- Fergal Brennan, Martins Udris, Pavel Gladyshev

:
An Automated Link Analysis Solution Applied to Digital Forensic Investigations. 189-206 - Andrew Marrington

, Farkhund Iqbal
, Ibrahim M. Baggili
:
Computer Profiling for Preliminary Forensic Examination. 207-220
Digital Forensics and the Cloud
- Joshua I. James

, Ahmed F. Shosha, Pavel Gladyshev:
Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE. 223-236 - Lucia De Marco, M. Tahar Kechadi

, Filomena Ferrucci
:
Cloud Forensic Readiness: Foundations. 237-244
Poster Presentation
- Deepak Gupta, Babu M. Mehtre:

Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes. 247-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














