


default search action
Digital Investigation, Volume 1
Volume 1, Number 1, February 2004
- Eoghan Casey

:
The need for knowledge sharing and standardization. 1-2 - Geoff Fellows:

Peer-to-peer networking issues - an overview. 3-6 - Monique Mattei Ferraro, Andrew Russell:

Current issues confronting well-established computer-assisted child exploitation and computer crime task forces. 7-15 - Peter Sommer:

The challenges of large computer evidence cases. 16-17 - Chris Boyd, Pete Forster:

Time and date issues in forensic computing - a case study. 18-23 - Peter Stephenson:

The right tools for the job. 24-27 - Eoghan Casey

:
Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. 28-43 - Events. 45-

- Research summary. 47-49

- Brian D. Carrier, Joe Grand:

A hardware-based memory acquisition procedure for digital investigations. 50-60 - Sarah Mocas:

Building theoretical underpinnings for digital forensics research. 61-68 - Thomas E. Daniels:

A functional reference model of passive systems for tracing network traffic. 69-81
Volume 1, Number 2, June 2004
- Eoghan Casey

:
The need for objective case review. 83-85 - Sarah Hilley:

News announcements. 86-88 - Esther George:

UK Computer Misuse Act - the Trojan virus defence: Regina v Aaron Caffrey, Southwark Crown Court, 17 October 2003. 89- - Matthew Pemble:

Investigating around mainframes and other high-end systems: the revenge of big iron. 90-93 - Erin Kenneally:

Digital logs - proof matters. 94-101 - Hank Wolfe:

Penetrating encrypted evidence. 102-105 - Beryl A. Howell:

Ambiguities in US law for investigators. 106-111 - Éric Freyssinet, Zeno J. M. H. Geradts

:
Future issues in forensic computing and an introduction to ENSFI. 112-113 - Eoghan Casey

:
Tool review - WinHex. 114-128 - Sarah Hilley:

Events. 129- - Pavel Gladyshev

, Ahmed Patel:
Finite state machine approach to digital event reconstruction. 130-149 - Olivier Y. de Vel:

File classification using byte sub-stream kernels. 150-157
Volume 1, Number 3, September 2004
- Eoghan Casey:

Reporting security breaches - a risk to be avoided or responsibility to be embraced? 151-161 - Sarah Hilley:

News. Digit. Investig. 1(3): 162-164 (2004) - Chris Vaughan:

Xbox security issues and forensic recovery methodology (utilising Linux). 165-172 - Owen O'Connor:

Deploying forensic tools via PXE. 173-176 - Douglas A. Schmitknecht:

Building FBI computer forensics capacity: one lab at a time. 177-182 - Andy Jones, Christopher Meyler:

What evidence is left after disk cleaners? 183-188 - Nigel Jones:

Training and accreditation - who are the experts? 189-194 - D. Watson:

Book Review. 195-196 - Cory Altheide:

Forensic analysis of Windows hosts using UNIX-based tools. 197-212 - Events. Digit. Investig. 1(3): 213- (2004)

- Matthew B. Gerber, John Leeson:

Formalization of computer input and output: the Hadley model. 214-224 - Malcolm W. Stevens:

Unification of relative time frames for digital forensics. 225-239
Volume 1, Number 4, December 2004
- Eoghan Casey:

State of the field: growth, growth, growth. 241-242 - News announcements. Digit. Investig. 1(4): 243-246 (2004)

- Bruce J. Nikkel:

Domain name forensics: a systematic approach to investigating an internet presence. 247-255 - Harlan Carvey:

Instant messaging investigations on a live Windows XP system. 256-260 - Philip Sealey:

Remote forensics. 261-265 - Barrie Mellars:

Forensic examination of mobile phones. 266-272 - Robert Jones:

Your day in court - the rôle of the expert witness. 273-278 - Mark Solon, Penny Harper:

Preparing evidence for court. 279-283 - Eoghan Casey

, Aaron Stanley:
Tool review - remote forensic preservation and examination tools. 284-297 - Florian P. Buchholz, Eugene H. Spafford

:
On the role of file system metadata in digital forensics. 298-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














