


default search action
Journal of Digital Forensic Practice, Volume 1
Volume 1, Number 1, 2006
- Peter Stephenson:

Trends. 1-2 - Alan E. Brill, Mark Pollitt, Carrie Morgan Whitcomb:

The Evolution of Computer Forensic Best Practices: An Update on Programs and Publications. 3-11 - Michael Losavio, Julia Adams, Marc Rogers:

Gap Analysis: Judicial Experience and Perception of Electronic Evidence. 13-17 - Eric Van Buskirk, Vincent T. Liu:

Digital Evidence: Challenging the Presumption of Reliability. 19-26 - John E. Kerivan:

Heuristic Security-Testing Methods. 27-36 - Angela Orebaugh:

Proactive Forensics. 37-41 - Anthony Nelson:

ISO 27001 as a Support to Digital Forensics. 43-46 - Chet Hosmer:

Discovering Hidden Evidence. 47-56 - Wei Ren:

Modeling Network Forensics Behavior. 57-65 - Mark Pollitt:

Exploration. 67-68 - Scott L. Ksander, William Blair Gillam, Marcus K. Rogers:

Ultrablock Forensic Card Reader. 69-70
Volume 1, Number 2, 2006
- Judie Mulholland:

Message from the Guest Editor. 73-74 - Peter Cassidy:

Statement of Support Anti-Phishing Working Group (APWG). 75-76 - Patrick Cain:

Using XML to Support Robust Information Sharing: An IODEF Automated Approach. 77-82 - Anthony Y. Fu, Xiaotie Deng, Liu Wenyin:

REGAP: A Tool for Unicode-Based Web Identity Fraud Detection. 83-97 - Susan Grant:

The National Consumers League's Call for Action. 99-101 - John S. Quarterman:

PhishScope: Tracking Phish Server Clusters. 103-114 - Gregg Tally, David Sames, Thomas Chen, Chris Colleran, David Jevans, Kevin Omiliak, Rod Rasmussen:

The Phisherman Project: Creating a Comprehensive Data Collection to Combat Phishing Attacks. 115-129 - Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz:

Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. 131-142 - Wayne E. Sprague:

Uncharted Waters: Prosecuting Phishing and Online Fraud Cases. 143-146 - Thomas Chen, Peter Henry:

A Review of: "Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. By Markus Jakobsson and Steven Myers, Editors". 147-149
Volume 1, Number 3, 2006
- Judie Mulholland:

Message from the Guest Editor. 151-152 - Victor A. Johnson:

Phishing Tripz. 153-155 - Erin Kenneally:

Enabling the Enablers: An Identity Fraud Solution for Law Enforcement. 157-164 - Robert Lyda, James Hamrock:

Exploring Investigative Methods for Identifying and Profiling Serial Bots. 165-177 - Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel:

Warkitting: The Drive-by Subversion of Wireless Home Routers. 179-192 - Craig M. McRae, Robert Wesley McGrew, Rayford B. Vaughn:

Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams. 193-199 - Bob Breeden, Mike Cantey, Brett Cureton, Clifford Stokes, Peter Henry, Judie Mulholland, Wayne Sprague, Jim Watson:

The Phlorida Autopsy Report. 203-222 - J. Philip Craiger, Paul Burke, Christopher Marberry:

Open Source Tools for Phishing Investigations. 223-229 - Bob Radvanovsky

:
Analyzing Spoofed E-mail Headers. 231-243 - Aaron Emigh:

The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond. 245-260 - Peter Henry:

A Review of: "Phishing Exposed: Uncover Secrets from the Dark Side. By Lance James Phishing: Cutting the Identity Theft Line. By Rachel Lininger and Russell Dean Uines". 261-262
Volume 1, Number 4, 2006
- Thijs Bosschert:

Battling Anti-Forensics: Beating the U3 Stick. 265-273 - Paul Burke, Philip Craiger:

Xbox Forensics. 275-282 - Mark Pollitt:

Byte/Counterbyte. 283-284 - Fredesvinda Insa:

The Admissibility of Electronic Evidence in Court (A.E.E.C.): Fighting against High-Tech Crime - Results of a European Study. 285-289 - Michael Losavio, Deborah Wilson, Adel Elmaghraby:

Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices. 291-296 - Christopher Marberry, Philip Craiger:

CD-R Acquisition Hashes Affected by Write Options. 297-307 - Aaron Smith:

Describing and Categorizing Disk-Avoiding Anti-Forensics Tools. 309-313 - Timothy M. Vidas:

The Acquisition and Analysis of Random Access Memory. 315-323 - Nicole Beebe, Gary C. Kessler:

A Review of: "Real Digital Forensics: Computer Security and Incident Response. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose". 325-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














