


default search action
Digital Forensics 2011: Orlando, FL, USA
- Gilbert L. Peterson, Sujeet Shenoi:

Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 361, Springer 2011, ISBN 978-3-642-24211-3
Themes and Issues
- Frederick Cohen, Julie Lowrie, Charles Preston:

The State of the Science of Digital Evidence Examination. 3-21 - Clive Blackwell:

An Investigative Framework for Incident Analysis. 23-34 - Keyun Ruan, Joe Carthy, M. Tahar Kechadi

, Mark Crosbie:
Cloud Forensics. 35-46
Forensic Techniques
- Jon Stewart, Joel Uckelman:

Searching Massive Data Streams Using Multipattern Regular Expressions. 49-63 - Irfan Ahmed

, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
Fast Content-Based File Type Identification. 65-75 - Bruno W. P. Hoelz, Célia Ghedini Ralha

, Frederico Mesquita:
Case-Based Reasoning in Live Forensics. 77-88 - Hector Beyers, Martin S. Olivier

, Gerhard P. Hancke:
Assembling Metadata for Database Forensics. 89-99 - Rafael Accorsi, Claus Wonnemann:

Forensic Leak Detection for Business Process Models. 101-113 - Patrick Juola, Darren Vescovi:

Analyzing Stylometric Approaches to Author Obfuscation. 115-125
Fraud and Malware Investigations
- Christian Winter, Markus Schneider, York Yannikos

:
Detecting Fraud Using Modified Benford Analysis. 129-141 - Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel:

Detecting Collusive Fraud in Enterprise Resource Planning Systems. 143-153 - Heather McCalley, Brad Wardman, Gary Warner

:
Analysis of Back-Doored Phishing Kits. 155-168 - Anders Flaglien, Katrin Franke, André Årnes:

Identifying Malware Using Cross-Evidence Correlation. 169-182 - Ickin Vural, Hein S. Venter:

Detecting Mobile Spam Botnets Using Artificial immune Systems. 183-192
Network Forensics
- Brennon Thomas, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:

An FPGA System for Detecting Malicious DNS Network Traffic. 195-207 - Emmanuel S. Pilli

, Ramesh Chandra Joshi, Rajdeep Niyogi:
Router and Interface Marking for Network Forensics. 209-220 - David Irwin, Jill Slay:

Extracting Evidence Related to VoIP Calls. 221-228
Advanced Forensic Techniques
- Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai:

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations. 231-243 - Mark-Anthony Fouche, Martin S. Olivier

:
Steganographic Techniques for Hiding Data in SWF Files. 245-255 - Andrew W. Hay, Dennis J. Krill, Benjamin Kuhar, Gilbert L. Peterson:

Evaluating Digital Forensic Options for the Apple iPad. 257-273 - Scott Conrad, Greg Dorn, Philip Craiger:

Forensic Analysis of Plug Computers. 275-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














