


default search action
Digital Forensics 2007: Orlando, Florida, USA
- Philip Craiger, Sujeet Shenoi:

Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007. IFIP 242, Springer 2007, ISBN 978-0-387-73741-6
Legal Issues
- Barbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke:

Calibration Testing Of Network Tap Devices. 3-19 - Christopher Swenson, Charles Adams, Anthony Whitledge, Sujeet Shenoi:

On the Legality of Analyzing Telephone Call Records. 21-39 - Marc Rogers

, K. Scarborough, K. Frakes, C. San Martin:
Survey of Law Enforcement Perceptions Regarding Digital Evidence. 41-52
Insider Threat Detection
- Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew:

Insider Threat Analysis Using Information-Centric Modeling. 55-73 - Daniel A. Ray, Phillip G. Bradford:

An Integrated System for Insider Threat Detection. 75-86
Rootkit Detection
- Adam D. Todd, J. Benson, Gilbert L. Peterson

, T. Franz, Michael Stevens, Richard A. Raines:
Analysis of Tools for Detecting Rootkits and Hidden Processes. 89-105 - Doug Wampler, James Graham:

A Method for Detecting Linux Kernel Module Rootkits. 107-116
Authorship Attribution
- Patrick Juola:

Future Trends in Authorship Attribution. 119-132 - Carole E. Chaski:

The Keyboard Dilemma and Authorship Identification. 133-146
Forensic Techniques
- Christopher Marberry, Philip Craiger:

Factors Affecting One-Way Hashing of CD-R Media. 149-161 - James R. Lyle, Steven Mead, Kelsey Rider:

Disk Drive I/O Commands and Write Blocking. 163-177 - Nicole Beebe

, Glenn B. Dietrich:
A New Process Model for Text String Searching. 179-191 - Benjamin M. Rodriguez, Gilbert L. Peterson

:
Detecting Steganography Using Multi-Class Classification. 193-204 - Alex Barclay, L. Watson, David Greer, John Hale

, Gavin Manes:
Redacting Digital Information from Electronic Devices. 205-214
File Systems Forensics
- Golden G. Richard III

, Vassil Roussev, Lodovico Marziale:
In-Place File Carving. 217-230 - Christopher Swenson, Raquel Phillips, Sujeet Shenoi:

File System Journal Forensics. 231-244
Network Forensics
- Robert McGrew, Rayford B. Vaughn:

Using Search Engines to Acquire Network Forensic Evidence. 247-253 - Mark Hartong, Rajni Goel, Duminda Wijesekera:

A Framework for Investigating Railroad Accidents. 255-265
Portable Electronic Device Forensics
- Paul Burke, Philip Craiger:

Forensic Analysis of Xbox Consoles. 269-280 - Ashish Gehani, John H. Reif:

Super-Resolution Video Analysis for Forensic Investigations. 281-299
Evidence Analysis and Management
- Jacobus Venter, Alta de Waal

, Cornelius Willers:
Specializing CRISP-DM for Evidence Mining. 303-315 - Kweku Kwakye Arthur, Martin S. Olivier

, Hein S. Venter
:
Applying The Biba Integrity Model to Evidence Management. 317-327
Formal Methods
- Nayot Poolsapassit, Indrajit Ray:

Investigating Computer Attacks Using Attack Trees. 331-343 - Eduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie

:
Attack Patterns: A New Forensic and Design Tool. 345-357

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














