S. Kuwari and S. Wolthusen, Forensic tracking and mobility prediction in vehicular networks, in Advances in Digital Forensics, pp.91-105, 2010.

N. Beebe and J. Clark, Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, pp.3-16, 2005.

M. Bunge, Philosophy of Science (Volume One): From Problem to Theory, Transaction Publishers, 1998.

M. Bunge, Philosophy of Science (Volume Two): From Explanation to Justification, Transaction Publishers, 1998.

Y. Chen, V. Roussev, G. Richard, and Y. Gao, Content-Based Image Retrieval for Digital Forensics, Advances in Digital Forensics, pp.271-282, 2005.
DOI : 10.1007/0-387-31163-7_22

K. Chow and S. Shenoi, Advances in Digital Forensics VI, 2010.
DOI : 10.1007/978-3-642-15506-2

F. Cohen, Toward a science of digital forensic evidence examination, in Advances in Digital Forensics VI, pp.17-35, 2010.

S. Conrad, G. Dorn, and P. Craiger, Forensic analysis of a Playstation-3 console, in Advances in, pp.65-76, 2010.

P. Craiger, Recovering digital evidence from Linux systems, in Advances in Digital Forensics, pp.233-244, 2005.

M. Davis, G. Manes, and S. Shenoi, A network-based architecture for storing digital evidence, in Advances in Digital Forensics, pp.33-42, 2005.

T. Duval, B. Jouga, and L. Roger, The Mitnick case: How Bayes could have helped, in Advances in Digital Forensics, pp.91-104, 2005.

B. Fei, J. Eloff, H. Venter, and M. Olivier, Exploring forensic data with self-organizing maps, in Advances in Digital Forensics, pp.113-123, 2005.

P. Gershteyn, M. Davis, G. Manes, and S. Shenoi, Extracting Concealed Data from BIOS Chips, Advances in Digital Forensics, pp.217-230, 2005.
DOI : 10.1007/0-387-31163-7_18

P. Giannelli, Wrongful Convictions and Forensic Science: The Need to Regulate Crime Labs, Working Paper 08-02, 2008.

M. Gunestas, M. Mehmet, and D. Wijsekera, Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services, Advances in Digital Forensics VI, pp.133-150, 2010.
DOI : 10.1007/978-3-642-15506-2_10

URL : https://hal.archives-ouvertes.fr/hal-01060614

Y. Guo and J. Slay, Data recovery function testing for digital forensic tools, in Advances in Digital Forensics, pp.297-311, 2010.

M. Hoeschele and M. Rogers, Detecting social engineering, in Advances in Digital Forensics, pp.67-77, 2005.

R. Ieong, P. Lai, K. Chow, M. Kwan, and F. Law, Identifying First Seeders in Foxy Peer-to-Peer Networks, Advances in Digital Forensics VI, pp.151-168, 2010.
DOI : 10.1007/978-3-642-15506-2_11

URL : https://hal.archives-ouvertes.fr/hal-01060615

P. Kahai, M. Srinivasan, K. Namuduri, and R. Pendse, Forensic Profiling System, Advances in Digital Forensics, M. Pollitt and S
DOI : 10.1007/0-387-31163-7_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.8395

E. Kim, D. Massey, and I. Ray, Global Internet routing forensics, in Advances in Digital Forensics, pp.165-176, 2005.

R. Koppl and M. Ferraro, Digital devices and miscarriages of justice, Daily Caller (dailycaller.com, 2012.

. Lai, Evaluation of evidence in Internet auction fraud investigations, in Advances in Digital Forensics, pp.121-132, 2010.

R. Laubscher, D. Rabe, M. Olivier, J. Eloff, and H. Venter, Applying Forensic Principles to Computer-Based Assessment, Advances in Digital Forensics, pp.105-112, 2005.
DOI : 10.1007/0-387-31163-7_9

F. Law, P. Chan, S. Yiu, B. Tang, P. Lai et al., Identifying volatile data from multiple memory dumps in live forensics, in Advances in, pp.185-194, 2010.

F. Li, H. Chan, K. Chow, and P. Lai, An Analysis of the Green Dam Youth Escort Software, Advances in Digital Forensics VI, pp.49-62, 2010.
DOI : 10.1007/978-3-642-15506-2_4

URL : https://hal.archives-ouvertes.fr/hal-01060609

M. Losavio, Non-technical manipulation of digital data, in Advances in Digital Forensics, pp.51-63, 2005.

M. Meyers and M. Rogers, Digital forensics: Meeting the challenges of scientific evidence, in Advances in Digital Forensics, pp.43-50, 2005.

T. Moore, A. Meehan, G. Manes, and S. Shenoi, Using Signaling Information in Telecom Network Forensics, Advances in Digital Forensics, pp.177-188, 2005.
DOI : 10.1007/0-387-31163-7_15

Y. Motora and B. Irwin, In-kernel cryptographic executable verification , in Advances in Digital Forensics, pp.303-313, 2005.

Y. Nakayama, S. Shibaguchi, and K. Okada, A visualization system for analyzing information leakage, in Advances in Digital Forensics, pp.269-282, 2010.

S. Ngobeni, H. Venter, and I. Burke, A forensic readiness model for wireless networks, in Advances in Digital Forensics, pp.107-117, 2010.

J. Okolica and G. Peterson, A compiled memory analysis tool, in Advances in Digital Forensics, pp.195-204, 2010.

M. Olivier, Forensics and privacy-enhancing technologies, in Advances in Digital Forensics, pp.17-31, 2005.

L. Peng, T. Wingfield, D. Wijsekera, E. Frye, R. Jackson et al., Making Decisions about Legal Responses to Cyber Attacks, Advances in Digital Forensics, pp.283-294, 2005.
DOI : 10.1007/0-387-31163-7_23

A. Persaud and Y. Guan, A framework for email investigations, in Advances in Digital Forensics, pp.79-90, 2005.

G. Peterson, Forensic analysis of digital image tampering, in Advances in Digital Forensics, pp.259-270, 2005.

S. Piper, M. Davis, G. Manes, and S. Shenoi, Detecting Hidden Data in Ext2/Ext3 File Systems, Advances in Digital Forensics, pp.245-256, 2005.
DOI : 10.1007/0-387-31163-7_20

M. Pollitt, A History of Digital Forensics, Advances in Digital Forensics VI, pp.3-15, 2010.
DOI : 10.1007/978-3-642-15506-2_1

URL : https://hal.archives-ouvertes.fr/hal-01060606

M. Pollitt and S. Shenoi, Advances in Digital Forensics, 2005.
DOI : 10.1007/0-387-31163-7

S. Redding, Using peer-to-peer technology for network forensics, in Advances in Digital Forensics, pp.141-152, 2005.

V. Roussev, Data Fingerprinting with Similarity Digests, Advances in Digital Forensics VI, pp.207-226, 2010.
DOI : 10.1007/978-3-642-15506-2_15

URL : https://hal.archives-ouvertes.fr/hal-01060620

A. Savoldi, P. Gubian, and I. Echizen, Uncertainty in live forensics, in Advances in Digital Forensics, pp.171-184, 2010.

B. Schatz and M. Cohen, Redefining evidence containers for provenance and accurate data representation, in Advances in Digital Forensics, pp.227-242, 2010.

K. Shanmugasundaram, H. Bronnimann, and N. Memon, Integrating digital forensics in network infrastructures, in Advances in Digital Forensics, pp.127-140, 2005.

M. Shaw, The coming-of-age of software architecture research, Proceedings of the Twenty-Third International Conference on Software Engineering, pp.656-664, 2001.

J. Slay and K. Jorgensen, Applying Filter Clusters to Reduce Search State Space, Advances in Digital Forensics, M. Pollitt and S
DOI : 10.1007/0-387-31163-7_24

G. Snelting, Paul Feyerabend und die Softwaretechnologie, Informatik-Spektrum, vol.21, issue.5, pp.273-276, 1998.
DOI : 10.1007/s002870050105

C. Swenson, G. Manes, and S. Shenoi, Imaging and Analysis of GSM SIM Cards, Advances in Digital Forensics, M. Pollitt and S
DOI : 10.1007/0-387-31163-7_17

K. Tadano, M. Kawato, R. Furukawa, F. Machida, and Y. Maeno, Digital Watermarking of Virtual Machine Images, Advances in Digital Forensics VI, pp.257-268, 2010.
DOI : 10.1007/978-3-642-15506-2_18

URL : https://hal.archives-ouvertes.fr/hal-01060623

V. Thing, Virtual Expansion of Rainbow Tables, Advances in Digital Forensics VI, pp.243-256, 2010.
DOI : 10.1007/978-3-642-15506-2_17

URL : https://hal.archives-ouvertes.fr/hal-01060622

K. Wang, Using a local search warrant to acquire evidence stored overseas via the Internet, in Advances in Digital Forensics, pp.37-48, 2010.

S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, pp.191-204, 2005.

Y. Yang, K. Chow, L. Hui, C. Wang, L. Chen et al., Forensic Analysis of Popular Chinese Internet Applications, Advances in Digital Forensics VI, pp.285-295, 2010.
DOI : 10.1007/978-3-642-15506-2_20

URL : https://hal.archives-ouvertes.fr/hal-01060625

Y. Zhu, J. James, and P. Gladyshev, A consistency study of the Windows registry, in Advances in Digital Forensics, pp.77-90, 2010.