


default search action
Journal of Digital Forensics, Security and Law, Volume 5
Volume 5, Number 1, 2010
- Gregory H. Carlton, Reginald Worthley:

Identifying a Computer Forensics Expert: A Study to Measure the Characteristics of Forensic Computer Examiners. 5-20 - Chun Wei, Alan P. Sprague, Gary Warner

, Anthony Skjellum:
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining. 21-48 - Aleksander Byrski

, Wojciech Stryjewski, Bartlomiej Czechowicz:
Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage. 49-62
Volume 5, Number 2, 2010
- Yinghua Guo, Jill Slay:

Computer Forensic Function Testing: Media Preparation, Write Protection And Verification. 5-20 - Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryôichi Sasaki:

HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery. 21-34 - Craig Valli

:
Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. 35-44 - Luciana Duranti, Barbara Endicott-Popovsky:

Digital Records Forensics: A New Science and Academic Program for Forensic Readiness. 45-62 - Grover S. Kearns:

Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach. 63-84 - Gary C. Kessler:

Book Review: Digital Forensic Evidence Examination (2nd ed.). 85-88
Volume 5, Number 3, 2010
- Graeme Baxter Bell, Richard Boddington:

The Beginning of the End for Digital Forensic Recovery? 5-32 - Brad Wardman:

The Deadliest Catch: Reeling In Big Phish With a Deep MD5 Net. 33-56 - Sameera Mubarak:

Trust Account Fraud And Effective Information Security Management. 57-72
Volume 5, Number 4, 2010
- Khawla Abdulla Alghafli, Andrew Jones, Thomas Anthony Martin

:
Forensic Analysis of the Windows 7 Registry. 5-30 - Murray Brand, Craig Valli

, Andrew Woodward:
Malware Forensics: Discovery of the Intent of Deception. 31-42 - Andy Jones, Craig Valli

, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies:
The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. 43-64 - Milton H. Luoma, Vicki Miller Luoma:

Avoiding Sanctions at the E-Discovery Meet-And- Confer in Common Law Countries. 65-80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














