


default search action
Digital Investigation, Volume 5
Volume 5, Numbers 1-2, September 2008
- Eoghan Casey

:
State of the Journal. 1-2 - Sarah Hilley:

News. 3-5 - James Wardwell, G. Stevenson Smith:

Recovering erased digital evidence from CD-RW discs in a child exploitation investigation. 6-9 - Beverley Nutter:

Pinpointing TomTom location records: A forensic analysis. 10-18 - Wouter S. van Dongen:

Case study: Forensic analysis of a Samsung digital video recorder. 19-28 - David Byers, Nahid Shahmehri:

Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors. 29-33 - Christopher James Hargreaves

, Howard Chivers, Dave Titheridge:
Windows Vista and digital investigations. 34-48 - Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon

:
Classification of digital camera-models based on demosaicing artifacts. 49-59 - Chad M. S. Steel, Chang-Tien Lu

:
Impersonator identification through dynamic fingerprinting. 60-70 - Joseph J. Schwerha IV:

Why computer forensic professionals shouldn't be required to have private investigator licenses. 71-72
Volume 5, Number Supplement, September 2008
- Anandabrata Pal, Husrev T. Sencar, Nasir D. Memon

:
Detecting file fragmentation point using sequential hypothesis testing. S2-S13 - William C. Calhoun

, Drue Coles:
Predicting the types of file fragments. S14-S20 - Jesse D. Kornblum:

Using JPEG quantization tables to identify imagery processed by software. S21-S25 - Brendan Dolan-Gavitt:

Forensic analysis of the Windows registry in memory. S26-S32 - Timothy D. Morgan:

Recovering deleted data from the Windows registry. S33-S41 - Farkhund Iqbal

, Rachid Hadjidj, Benjamin C. M. Fung
, Mourad Debbabi
:
A novel approach of mining write-prints for authorship attribution in e-mail forensics. S42-S51 - Ruud B. van Baar, Wouter Alink, Alex van Ballegooij:

Forensic memory analysis: Files mapped in memory. S52-S57 - Andreas Schuster:

The impact of Microsoft Windows pool allocation strategies on memory forensics. S58-S64 - Andrew Case

, Andrew Cristina, Lodovico Marziale, Golden G. Richard III
, Vassil Roussev:
FACE: Automated digital evidence discovery and correlation. S65-S75 - Aaron Burghardt, Adam J. Feldman:

Using the HFS+ journal for deleted file recovery. S76-S82 - Robert A. Joyce, Judson Powers, Frank Adelstein:

MEGA: A tool for Mac OS X operating system and application forensics. S83-S90 - Jooyoung Lee, Sung-Kyong Un, Dowon Hong

:
High-speed search using Tarari content processor in digital forensics. S91-S95 - Joseph Lewthwaite, Victoria Smith:

Limewire examinations. S96-S104 - Stephen Brueckner, David Guaspari, Frank Adelstein, Joseph Weeks:

Automated computer forensics training in a virtualized environment. S105-S111 - Michael I. Cohen:

PyFlag - An advanced network forensic framework. S112-S120 - Alessandro Distefano, Gianluigi Me

:
An overall assessment of Mobile Internal Acquisition Tool. S121-S127 - Olivier Thonnard, Marc Dacier

:
A framework for attack patterns' discovery in honeynet data. S128-S139
Volume 5, Numbers 3-4, March 2009
- Eoghan Casey

:
"Dawn raids" bring a new form in incident response. 73-74 - Jesse D. Kornblum:

Implementing BitLocker Drive Encryption for forensic analysis. 75-84 - Nigel R. Poole, Qin Zhou

, P. Abatis:
Analysis of CCTV digital video recorder hard disk storage system. 85-92 - Murilo Tito Pereira:

Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records. 93-103 - Bora Park, Jungheum Park

, Sangjin Lee:
Data concealment and detection in Microsoft Office 2007 files. 104-114 - Martin S. Olivier

:
On metadata context in Database Forensics. 115-123 - Rachid Hadjidj, Mourad Debbabi

, Hakim Lounis, Farkhund Iqbal
, Adam Szporer, Djamel Benredjem:
Towards an integrated e-mail forensic analysis framework. 124-137 - Michael I. Cohen:

Source attribution for network address translated forensic captures. 138-145 - Peter Sommer:

Meetings between experts: A route to simpler, fairer trials? 146-152 - Peter F. R. Forster:

Steve Anson and Steve Bunting, Mastering Windows network forensics and investigations , Sybex (an imprint of Wiley Publishing Inc.), US and Canada (2007) ISBN 978-0-4700-9762-5 530 pp. 153-154

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














