default search action
ICDF2C 2011: Dublin, Ireland
- Pavel Gladyshev, Marcus K. Rogers:
Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 88, Springer 2012, ISBN 978-3-642-35514-1
Cybercrime Investigations
- Cynthia A. Murphy:
The Role of Perception in Age Estimation. 1-16 - Kathryn C. Seigfried-Spellar, Gary R. Bertoline, Marcus K. Rogers:
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers. 17-32 - Esti Peshin:
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media. 33-35
Mobile Device Forensics
- Kelly A. Cole, Ramindu L. Silva, Richard P. Mislan:
All Bot Net: A Need for Smartphone P2P Awareness. 36-46 - Eric Katz, Richard Mislan, Marcus K. Rogers, Anthony Smith:
Results of Field Testing Mobile Phone Shielding Devices. 47-61 - Thomas Schaefer, Hans Höfken, Marko Schuba:
Windows Phone 7 from a Digital Forensics' Perspective. 62-76 - S. Satheesh Kumar, Bibin Thomas, K. L. Thomas:
An Agent Based Tool for Windows Mobile Forensics. 77-88 - Mark Lohrum:
Forensic Extractions of Data from the Nokia N900. 89-103
New Developments in Digital Forensics
- James R. Lyle:
A Strategy for Testing Metadata Based Deleted File Recovery Tools. 104-114 - Neil C. Rowe, Simson L. Garfinkel:
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus. 115-130 - Ahmed F. Shosha, Joshua James, Pavel Gladyshev:
A Novel Methodology for Malware Intrusion Attack Path Reconstruction. 131-140 - Frank Breitinger, Harald Baier:
Performance Issues About Context-Triggered Piecewise Hashing. 141-155
Short Papers
- Sean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France:
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment. 156-171 - Matthew Levendoski, Tejashree Datar, Marcus K. Rogers:
Yahoo! Messenger Forensics on Windows Vista and Windows 7. 172-179 - Martin Steinebach:
Robust Hashing for Efficient Forensic Analysis of Image Sets. 180-187 - Anthony Keane, Stephen O'Shaughnessy:
Tracking User Activity on Personal Computers. 188-196
Digital Forensics Techniques
- Alexander G. Barnett:
The Forensic Value of the Windows 7 Jump List. 197-210 - Gyu-Sang Cho, Marcus K. Rogers:
Finding Forensic Information on Creating a Folder in $LogFile of NTFS. 211-225 - Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida:
Rescuing Digital Data from Submerged HDD. 226-237
Digital Forensics Education
- Christian Moch, Felix C. Freiling:
Evaluating the Forensic Image Generator Generator. 238-252
Internet and Network Investigations
- Mark Lohrum:
Forensic Extractions of Data from the Nokia N900. 253-267
Formal Methods of Digital Forensics
- Clive Blackwell:
A Forensic Framework for Incident Analysis Applied to the Insider Threat. 268-281 - Serguei A. Mokhov, Joey Paquet, Mourad Debbabi:
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid. 282-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.