Full Text Documents

Search


Table of Contents
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics
Gilbert Peterson, Sujeet Shenoi (Eds.)
Front Matter

THEMES AND ISSUES


The State of the Science of Digital Evidence Examination
Fred Cohen, Julie Lowrie, Charles Preston
3-21
An Investigative Framework for Incident Analysis
Clive Blackwell
23-34
Cloud Forensics
Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie
35-46

FORENSIC TECHNIQUES


Searching Massive Data Streams Using Multipattern Regular Expressions
Jon Stewart, Joel Uckelman
49-63
Fast Content-Based File Type Identification
Irfan Ahmed, Kyung-Suk Lhee, Hyun-Jung Shin, Man-Pyo Hong
65-75
Case-Based Reasoning in Live Forensics
Bruno Hoelz, Celia Ralha, Frederico Mesquita
77-88
Assembling Metadata for Database Forensics
Hector Beyers, Martin Olivier, Gerhard Hancke
89-99
Forensic Leak Detection for Business Process Models
Rafael Accorsi, Claus Wonnemann
101-113
Analyzing Stylometric Approaches to Author Obfuscation
Patrick Juola, Darren Vescovi
115-125

FRAUD AND MALWARE INVESTIGATIONS


Detecting Fraud Using Modified Benford Analysis
Christian Winter, Markus Schneider, York Yannikos
129-141
Detecting Collusive Fraud in Enterprise Resource Planning Systems
Asadul Islam, Malcolm Corney, George Mohay, Andrew Clark, Shane Bracher, Tobias Raub, Ulrich Flegel
143-153
Analysis of Back-Doored Phishing Kits
Heather Mccalley, Brad Wardman, Gary Warner
155-168
Identifying Malware Using Cross-Evidence Correlation
Anders Flaglien, Katrin Franke, Andre Arnes
169-182
Detecting Mobile Spam Botnets Using Artificial immune Systems
Ickin Vural, Hein Venter
183-192

NETWORK FORENSICS


An FPGA System for Detecting Malicious DNS Network Traffic
Brennon Thomas, Barry Mullins, Gilbert Peterson, Robert Mills
195-207
Router and Interface Marking for Network Forensics
Emmanuel Pilli, Ramesh Joshi, Rajdeep Niyogi
209-220
Extracting Evidence Related to VoIP Calls
David Irwin, Jill Slay
221-228

ADVANCED FORENSIC TECHNIQUES


Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations
Michael Kwan, Richard Overill, Kam-Pui Chow, Hayson Tse, Frank Law, Pierre Lai
231-243
Steganographic Techniques for Hiding Data in SWF Files
Mark-Anthony Fouche, Martin Olivier
245-255
Evaluating Digital Forensic Options for the Apple iPad
Andrew Hay, Dennis Krill, Benjamin Kuhar, Gilbert Peterson
257-273
Forensic Analysis of Plug Computers
Scott Conrad, Greg Dorn, Philip Craiger
275-287

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/