


default search action
Digital Investigation, Volume 2
Volume 2, Number 1, February 2005
- Eoghan Casey

, Gary Gordon, John Leeson:
Origins and progress. 1-2 - Adrian Reid:

Letter to the Editor. 3- - News. Digit. Investig. 2(1): 4-7 (2005)

- Bruce J. Nikkel:

Forensic acquisition and analysis of magnetic tapes. 8-18 - Harlan Carvey:

Malware analysis for windows administrators. 19-22 - Dan Haagman, Byrne Ghavalas:

Trojan defence: A forensic view. 23-30 - Andrew Sheldon:

The future of forensic computing. 31-35 - Eric Thompson:

MD5 collisions and the impact on computer forensics. 36-40 - Erin E. Kenneally:

The Internet is the computer: The role of forensics in bridging the digital and physical divide. 41-44
- Philip Turner:

Digital provenance - interpretation, verification and corroboration. 45-49 - Brent T. McBride, Gilbert L. Peterson

, Steven C. Gustafson:
A new blind method for detecting novel steganography. 50-70
Volume 2, Number 2, June 2005
- Eoghan Casey

:
Growing pains. 71-73 - News. Digit. Investig. 2(2): 74-76 (2005)

- Bruce J. Nikkel:

Letter to the editor. 77- - Brian D. Carrier:

Volume analysis of disk spanning logical volumes. 78-88 - Geoff H. Fellows:

The joys of complexity and the deleted file. 89-93 - Harlan Carvey, Cory Altheide:

Tracking USB storage: Analysis of windows artifacts generated by USB storage devices. 94-100 - Erin E. Kenneally, Christopher L. T. Brown:

Risk sensitive digital evidence collection. 101-119 - Wayne A. Jansen, Rick Ayers:

An overview and analysis of PDA forensic tools. 120-132 - Byrne Ghavalas, Alan Philips:

Trojan defence: A forensic view part II. 133-136 - John J. Barbara:

Digital evidence accreditation in the corporate and business environment. 137-146 - Nicole Beebe

, Jan Guynes Clark:
A hierarchical, objectives-based framework for the digital investigations process. 147-167
Volume 2, Number 3, September 2005
- Eoghan Casey

:
Investigating security breaches. 169-170 - Pressure mounts on US Senate to pass cybercrime treaty. Digit. Investig. 2(3): 171-174 (2005)

- Keith McDonald:

To image a Macintosh. 175-179 - Susan W. Brenner:

Requiring protocols in computer search warrants. 180-188 - Stephen Mason:

Trusted computing and forensic investigations. 189-192 - Bruce J. Nikkel:

Generalizing sources of live network evidence. 193-200 - Harlan Carvey:

The Windows Registry as a forensic resource. 201-205 - The future implications of computer forensics on VOIP. Digit. Investig. 2(3): 206-208 (2005)

- Michael A. Penhallurick:

Methodologies for the use of VMware to boot cloned/mounted subject hard disk images. 209-222 - Philip Turner:

Unification of digital evidence from disparate sources (Digital Evidence Bags). 223-228
Volume 2, Number 4, December 2005
- Eoghan Casey

:
Digital arms race - The need for speed. 229-230 - A tribute to Gordon Stevenson. 235-236

- Forensics - cred or crud? Digit. Investig. 2(4): 237-238 (2005)

- Jim Kent, Byrne Ghavalas:

The unique challenges of collecting corporate evidence. 239-243 - Danny Bradbury:

No place to hide. 244-246 - Erin E. Kenneally, Andrea Monti

:
Case study: A failure in success' clothing. 247-253 - Eoghan Casey

:
Case study: Network intrusion investigation - lessons in forensic preparation. 254-260 - Nick Nykodym, Robert Taylor, Julia Vilela:

Criminal profiling and insider cyber crime. 261-267 - Mark Bedford:

Methods of discovery and exploitation of Host Protected Areas on IDE storage devices that conform to ATAPI-4. 268-275
- Spike Quinn:

Examining the state of preparedness of Information Technology management in New Zealand for events that may require forensic analysis. 276-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














