


default search action
Digital Investigation, Volume 8
Volume 8, Number 1, July 2011
- Eoghan Casey

:
Responding to a data breach: A little knowledge is a dangerous thing. 1-2
- Stefan Vömel, Felix C. Freiling:

A survey of main memory acquisition and analysis techniques for the windows operating system. 3-22 - George Grispos

, Tim Storer, William Bradley Glisson
:
A comparison of forensic evidence recovery techniques for a windows mobile smart phone. 23-36 - Eoghan Casey

, Adrien Cheval, Jong Yeon Lee, David Oxley, Yong Jun Song:
Forensic acquisition and analysis of palm webOS on mobile devices. 37-47 - Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:

Forensic investigation of OOXML format documents. 48-55 - Yun-Sheng Yen, I-Long Lin, Bo-Lin Wu:

A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence. 56-67 - Zhili Chen, Liusheng Huang, Wei Yang:

Detection of substitution-based linguistic steganography by relative frequency analysis. 68-77 - Na Cheng, Rajarathnam Chandramouli

, K. P. Subbalakshmi
:
Author gender identification from text. 78-88
Volume 8, Number Supplement, August 2011
- Wietse Z. Venema:

Eleventh Annual DFRWS Conference. S1-S2 - Clay Shields, Ophir Frieder, Mark Maloof:

A system for the proactive, continuous, and efficient collection of digital forensic evidence. S3-S13 - Timothy Vidas, Chengye Zhang, Nicolas Christin

:
Toward a general collection methodology for Android devices. S14-S24 - Khawla Al-Wehaibi, Tim Storer, William Bradley Glisson

:
Augmenting password recovery with online profiling. S25-S33 - Vassil Roussev:

An evaluation of forensic similarity hashes. S34-S41 - Hajime Inoue, Frank Adelstein, Robert A. Joyce:

Visualization in testing a volatile memory forensic tool. S42-S51 - Andrew Marrington

, Ibrahim M. Baggili
, George M. Mohay, Andrew J. Clark:
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines. S52-S61 - Junghoon Oh

, SeungBong Lee, Sangjin Lee:
Advanced evidence collection and analysis of web browser activity. S62-S70 - Jonathan Grier:

Detecting data theft using stochastic forensics. S71-S77 - Robert Beverly, Simson L. Garfinkel

, Greg Cardwell:
Forensic carving of network packets and associated data structures. S78-S89 - Bilal Shebaro, Jedidiah R. Crandall

:
Privacy-preserving network flow recording. S90-S100 - Michael I. Cohen, Darren Bilby, Germano Caronni:

Distributed forensics and incident response in the enterprise. S101-S110 - Christopher King, Timothy Vidas:

Empirical analysis of solid state disk data retention when used with contemporary operating systems. S111-S117 - James S. Okolica, Gilbert L. Peterson

:
Extracting the windows clipboard from physical memory. S118-S124 - Ralf D. Brown:

Reconstructing corrupt DEFLATEd files. S125-S131
Volume 8, Number 2, November 2011
- Eoghan Casey

:
A unified voice: The need for an international digital forensic convention. 89-91
- Consortium of Digital Forensic Specialists: Shape the future of your profession. 92-93

- Zeno J. M. H. Geradts

:
ENFSI Forensic IT Working group. 94-95 - Susan Ballou, Rhesa G. Gilliland:

Emerging paper standards in computer forensics. 96-97 - Peter Sommer:

Certification, registration and assessment of digital forensic experts: The UK experience. 98-105 - Elisabetta Allegra, Roberto Di Pietro

, Mauro La Noce, Valerio Ruocco, Nino Vincenzo Verde:
Cross-border co-operation and education in digital investigations: A European perspective. 106-113 - Jason Beckett, Jill Slay

:
Scientific underpinnings and background to standards and accreditation in digital forensics. 114-121 - Anders Flaglien, Aleksander Mallasvik, Magnus Mustorp, André Årnes:

Storage and exchange formats for digital evidence. 122-128 - Eoghan Casey

, Geoff Fellows, Matthew Geiger, Gerasimos Stellatos:
The growing impact of full disk encryption on digital forensics. 129-134 - Paul Owen, Paula Thomas:

An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines. 135-140 - Angus M. Marshall

:
Standards, regulation & quality in digital investigations: The state we are in. 141-144
Volume 8, Numbers 3-4, February 2012
- Eoghan Casey

:
Editorial - Cutting the Gordian knot: Defining requirements for trustworthy tools. 145-146
- Rabeah Al-Zaidy, Benjamin C. M. Fung

, Amr M. Youssef, Francis Fortin:
Mining criminal networks from unstructured text documents. 147-160 - Simson L. Garfinkel

:
Digital forensics XML and the DFXML toolset. 161-174 - Joe Sylve, Andrew Case

, Lodovico Marziale, Golden G. Richard III
:
Acquisition and analysis of volatile memory from android devices. 175-184 - Matthew Tart

, Iain Brodie, Nicholas Gleed, James Matthews:
Historic cell site analysis - Overview of principles and survey methodologies. 185-193 - Antonio Savoldi, Mario Piccinelli, Paolo Gubian:

A statistical method for detecting on-disk wiped areas. 194-214 - S. Devi Mahalakshmi

, K. Vijayalakshmi, Priyadharsini Selvaraj
:
Digital image forgery detection and estimation by exploring basic image manipulations. 215-225 - Hany Farid, Mary J. Bravo:

Perceptual discrimination of computer generated and photographic faces. 226-235

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














