Forensic tracking and mobility prediction in vehicular networks, in Advances in Digital Forensics, pp.91-105, 2010. ,
Dealing with terabyte data sets in digital investigations, in Advances in Digital Forensics, pp.3-16, 2005. ,
Philosophy of Science (Volume One): From Problem to Theory, Transaction Publishers, 1998. ,
Philosophy of Science (Volume Two): From Explanation to Justification, Transaction Publishers, 1998. ,
Content-Based Image Retrieval for Digital Forensics, Advances in Digital Forensics, pp.271-282, 2005. ,
DOI : 10.1007/0-387-31163-7_22
Advances in Digital Forensics VI, 2010. ,
DOI : 10.1007/978-3-642-15506-2
Toward a science of digital forensic evidence examination, in Advances in Digital Forensics VI, pp.17-35, 2010. ,
Forensic analysis of a Playstation-3 console, in Advances in, pp.65-76, 2010. ,
Recovering digital evidence from Linux systems, in Advances in Digital Forensics, pp.233-244, 2005. ,
A network-based architecture for storing digital evidence, in Advances in Digital Forensics, pp.33-42, 2005. ,
The Mitnick case: How Bayes could have helped, in Advances in Digital Forensics, pp.91-104, 2005. ,
Exploring forensic data with self-organizing maps, in Advances in Digital Forensics, pp.113-123, 2005. ,
Extracting Concealed Data from BIOS Chips, Advances in Digital Forensics, pp.217-230, 2005. ,
DOI : 10.1007/0-387-31163-7_18
Wrongful Convictions and Forensic Science: The Need to Regulate Crime Labs, Working Paper 08-02, 2008. ,
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services, Advances in Digital Forensics VI, pp.133-150, 2010. ,
DOI : 10.1007/978-3-642-15506-2_10
URL : https://hal.archives-ouvertes.fr/hal-01060614
Data recovery function testing for digital forensic tools, in Advances in Digital Forensics, pp.297-311, 2010. ,
Detecting social engineering, in Advances in Digital Forensics, pp.67-77, 2005. ,
Identifying First Seeders in Foxy Peer-to-Peer Networks, Advances in Digital Forensics VI, pp.151-168, 2010. ,
DOI : 10.1007/978-3-642-15506-2_11
URL : https://hal.archives-ouvertes.fr/hal-01060615
Forensic Profiling System, Advances in Digital Forensics, M. Pollitt and S ,
DOI : 10.1007/0-387-31163-7_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.8395
Global Internet routing forensics, in Advances in Digital Forensics, pp.165-176, 2005. ,
Digital devices and miscarriages of justice, Daily Caller (dailycaller.com, 2012. ,
Evaluation of evidence in Internet auction fraud investigations, in Advances in Digital Forensics, pp.121-132, 2010. ,
Applying Forensic Principles to Computer-Based Assessment, Advances in Digital Forensics, pp.105-112, 2005. ,
DOI : 10.1007/0-387-31163-7_9
Identifying volatile data from multiple memory dumps in live forensics, in Advances in, pp.185-194, 2010. ,
An Analysis of the Green Dam Youth Escort Software, Advances in Digital Forensics VI, pp.49-62, 2010. ,
DOI : 10.1007/978-3-642-15506-2_4
URL : https://hal.archives-ouvertes.fr/hal-01060609
Non-technical manipulation of digital data, in Advances in Digital Forensics, pp.51-63, 2005. ,
Digital forensics: Meeting the challenges of scientific evidence, in Advances in Digital Forensics, pp.43-50, 2005. ,
Using Signaling Information in Telecom Network Forensics, Advances in Digital Forensics, pp.177-188, 2005. ,
DOI : 10.1007/0-387-31163-7_15
In-kernel cryptographic executable verification , in Advances in Digital Forensics, pp.303-313, 2005. ,
A visualization system for analyzing information leakage, in Advances in Digital Forensics, pp.269-282, 2010. ,
A forensic readiness model for wireless networks, in Advances in Digital Forensics, pp.107-117, 2010. ,
A compiled memory analysis tool, in Advances in Digital Forensics, pp.195-204, 2010. ,
Forensics and privacy-enhancing technologies, in Advances in Digital Forensics, pp.17-31, 2005. ,
Making Decisions about Legal Responses to Cyber Attacks, Advances in Digital Forensics, pp.283-294, 2005. ,
DOI : 10.1007/0-387-31163-7_23
A framework for email investigations, in Advances in Digital Forensics, pp.79-90, 2005. ,
Forensic analysis of digital image tampering, in Advances in Digital Forensics, pp.259-270, 2005. ,
Detecting Hidden Data in Ext2/Ext3 File Systems, Advances in Digital Forensics, pp.245-256, 2005. ,
DOI : 10.1007/0-387-31163-7_20
A History of Digital Forensics, Advances in Digital Forensics VI, pp.3-15, 2010. ,
DOI : 10.1007/978-3-642-15506-2_1
URL : https://hal.archives-ouvertes.fr/hal-01060606
Advances in Digital Forensics, 2005. ,
DOI : 10.1007/0-387-31163-7
Using peer-to-peer technology for network forensics, in Advances in Digital Forensics, pp.141-152, 2005. ,
Data Fingerprinting with Similarity Digests, Advances in Digital Forensics VI, pp.207-226, 2010. ,
DOI : 10.1007/978-3-642-15506-2_15
URL : https://hal.archives-ouvertes.fr/hal-01060620
Uncertainty in live forensics, in Advances in Digital Forensics, pp.171-184, 2010. ,
Redefining evidence containers for provenance and accurate data representation, in Advances in Digital Forensics, pp.227-242, 2010. ,
Integrating digital forensics in network infrastructures, in Advances in Digital Forensics, pp.127-140, 2005. ,
The coming-of-age of software architecture research, Proceedings of the Twenty-Third International Conference on Software Engineering, pp.656-664, 2001. ,
Applying Filter Clusters to Reduce Search State Space, Advances in Digital Forensics, M. Pollitt and S ,
DOI : 10.1007/0-387-31163-7_24
Paul Feyerabend und die Softwaretechnologie, Informatik-Spektrum, vol.21, issue.5, pp.273-276, 1998. ,
DOI : 10.1007/s002870050105
Imaging and Analysis of GSM SIM Cards, Advances in Digital Forensics, M. Pollitt and S ,
DOI : 10.1007/0-387-31163-7_17
Digital Watermarking of Virtual Machine Images, Advances in Digital Forensics VI, pp.257-268, 2010. ,
DOI : 10.1007/978-3-642-15506-2_18
URL : https://hal.archives-ouvertes.fr/hal-01060623
Virtual Expansion of Rainbow Tables, Advances in Digital Forensics VI, pp.243-256, 2010. ,
DOI : 10.1007/978-3-642-15506-2_17
URL : https://hal.archives-ouvertes.fr/hal-01060622
Using a local search warrant to acquire evidence stored overseas via the Internet, in Advances in Digital Forensics, pp.37-48, 2010. ,
Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, pp.191-204, 2005. ,
Forensic Analysis of Popular Chinese Internet Applications, Advances in Digital Forensics VI, pp.285-295, 2010. ,
DOI : 10.1007/978-3-642-15506-2_20
URL : https://hal.archives-ouvertes.fr/hal-01060625
A consistency study of the Windows registry, in Advances in Digital Forensics, pp.77-90, 2010. ,