Full Text Documents

Search


Table of Contents
Advances in Digital Forensics XIV
Gilbert Peterson, Sujeet Shenoi
Front Matter

Themes and Issues


Measuring Evidential Weight in Digital Forensic Investigations
Richard Overill, Kam-Pui Chow
3-10
Challenges, Opportunities and a Framework for Web Environment Forensics
Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn
11-33
Internet of Things Forensics – Challenges and a Case Study
Saad Alabdulsalam, Kevin Schaefer, Tahar Kechadi, Nhien-An Le-Khac
35-48

Forensic Techniques


Recovery of Forensic Artifacts from Deleted Jump Lists
Bhupendra Singh, Upasna Singh, Pankaj Sharma, Rajender Nath
51-65
Obtaining Precision-Recall Trade-Offs in Fuzzy Searches of Large Email Corpora
Kyle Porter, Slobodan Petrovic
67-85
Anti-Forensic Capacity and Detection Rating of Hidden Data in the Ext4 Filesystem
Thomas Göbel, Harald Baier
87-110
Detecting Data Leakage from Hard Copy Documents
Jijnasa Nayak, Shweta Singh, Saheb Chhabra, Gaurav Gupta, Monika Gupta, Garima Gupta
111-124

Network Forensics


Information-Entropy-Based DNS Tunnel Prediction
Irvin Homem, Panagiotis Papapetrou, Spyridon Dosis
127-140
Collecting Network Evidence Using Constrained Approximate Search Algorithms
Ambika Chitrakar, Slobodan Petrovic
141-160
Traffic Classification and Application Identification in Network Forensics
Jan Pluskal, Ondrej Lichtner, Ondrej Rysavy
161-181
Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic
Erwin Wiel, Mark Scanlon, Nhien-An Le-Khac
183-197
Hashing Incomplete and Unordered Network Streams
Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang
199-224
A Network Forensic Scheme Using Correntropy-Variation for Attack Detection
Nour Moustafa, Jill Slay
225-239

Cloud Forensics


A Taxonomy of Cloud Endpoint Forensic Tools
Anand Mishra, Emmanuel Pilli, Mahesh Govil
243-261
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis
Changwei Liu, Anoop Singhal, Duminda Wijesekera
263-289

Mobile and Embedded Device Forensics


Forensic Analysis of Android Steganography Apps
Wenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, Stephanie Reinders
293-312
Automated Vulnerability Detection in Embedded Devices
Danjun Liu, Yong Tang, Baosheng Wang, Wei Xie, Bo Yu
313-329
A Forensic Logging System for Siemens Programmable Logic Controllers
Ken Yau, Kam-Pui Chow, Siu-Ming Yiu
331-349
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers
Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau
351-367

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/