Full Text Documents

Search


Table of Contents
Advances in Digital Forensics IX
Gilbert Peterson, Sujeet Shenoi (Eds.)
Front Matter

THEMES AND ISSUES


History, Historiography and the Hermeneutics of the Hard Drive
Mark Pollitt
3-17
Protecting Third Party Privacy in Digital Forensic Investigations
Wynand Staden
19-31
On the Scientific Maturity of Digital Forensics Research
Martin Olivier, Stefan Gruner
33-49

FORENSIC MODELS


Cognitive Approaches for Digital Forensic Readiness Planning
Antonio Pooe, Les Labuschagne
53-66
A Harmonized Process Model for Digital Forensic Investigation Readiness
Aleksandar Valjarevic, Hein Venter
67-82
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model
Gary Cantrell, David Dampier
83-98

FORENSIC TECHNIQUES


Reducing the Time Required for Hashing Operations
Frank Breitinger, Kaloyan Petrov
101-117
Hash-Based File Content Identification Using Distributed Systems
York Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi
119-134
Creating Super Timelines in Windows Investigations
Stephen Esposito, Gilbert Peterson
135-144
Log File Analysis with Context-Free Grammars
Gregory Bosman, Stefan Gruner
145-152
Using a Goal-Driven Approach in the Investigation of a Questioned Contract
Clive Blackwell, Shareeful Islam, Benjamin Aziz
153-167

FILESYSTEM FORENSICS


File Fragment Analysis Using Normalized Compression Distance
Stefan Axelsson, Kamran Bajwa, Mandhapati Srikanth
171-182
Quantifying Windows File Slack Size and Stability
Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar Weippl
183-193
Automating Video File Carving and Content Identification
York Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter
195-212
Data Recovery from Proprietary Formatted Cctv Hard Disks
Aswami Ariffin, Jill Slay, Kim-Kwang Choo
213-223

NETWORK FORENSICS


Creating Integrated Evidence Graphs for Network Forensics
Changwei Liu, Anoop Singhal, Duminda Wijesekera
227-241
A Generic Bayesian Belief Model for Similar Cyber Crimes
Hayson Tse, Kam-Pui Chow, Michael Kwan
243-255
An Empirical Study Profiling Internet Pirates
Pierre Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien Chan
257-272
Real-Time Covert Timing Channel Detection in Networked Virtual Environments
Anyi Liu, Jim Chen, Harry Wechsler
273-288

CLOUD FORENSICS


Impact of Cloud Computing on Digital Forensic Investigations
Stephen O’shaughnessy, Anthony Keane
291-303
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments
Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden Richard Iii, Vassil Roussev
305-328

FORENSIC TOOLS


Comparison of the Data Recovery Function of Forensic Tools
Joe Buchanan-Wollaston, Tim Storer, William Glisson
331-347
Security Analysis and Decryption of Filevault 2
Omar Choudary, Felix Grobert, Joachim Metz
349-363

ADVANCED FORENSIC TECHNIQUES


Detecting Counterfeit Currency and Identifying Its Source
Ankit Sarkar, Robin Verma, Gaurav Gupta
367-384
Towards Active Linguistic Authentication
Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt
385-398

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/