default search action
Digital Investigation, Volume 2
Volume 2, Number 1, February 2005
- Eoghan Casey, Gary Gordon, John Leeson:
Origins and progress. 1-2 - Adrian Reid:
Letter to the Editor. 3- - News. Digit. Investig. 2(1): 4-7 (2005)
- Bruce J. Nikkel:
Forensic acquisition and analysis of magnetic tapes. 8-18 - Harlan Carvey:
Malware analysis for windows administrators. 19-22 - Dan Haagman, Byrne Ghavalas:
Trojan defence: A forensic view. 23-30 - Andrew Sheldon:
The future of forensic computing. 31-35 - Eric Thompson:
MD5 collisions and the impact on computer forensics. 36-40 - Erin E. Kenneally:
The Internet is the computer: The role of forensics in bridging the digital and physical divide. 41-44
- Philip Turner:
Digital provenance - interpretation, verification and corroboration. 45-49 - Brent T. McBride, Gilbert L. Peterson, Steven C. Gustafson:
A new blind method for detecting novel steganography. 50-70
Volume 2, Number 2, June 2005
- Eoghan Casey:
Growing pains. 71-73 - News. Digit. Investig. 2(2): 74-76 (2005)
- Bruce J. Nikkel:
Letter to the editor. 77- - Brian D. Carrier:
Volume analysis of disk spanning logical volumes. 78-88 - Geoff H. Fellows:
The joys of complexity and the deleted file. 89-93 - Harlan Carvey, Cory Altheide:
Tracking USB storage: Analysis of windows artifacts generated by USB storage devices. 94-100 - Erin E. Kenneally, Christopher L. T. Brown:
Risk sensitive digital evidence collection. 101-119 - Wayne A. Jansen, Rick Ayers:
An overview and analysis of PDA forensic tools. 120-132 - Byrne Ghavalas, Alan Philips:
Trojan defence: A forensic view part II. 133-136 - John J. Barbara:
Digital evidence accreditation in the corporate and business environment. 137-146 - Nicole Beebe, Jan Guynes Clark:
A hierarchical, objectives-based framework for the digital investigations process. 147-167
Volume 2, Number 3, September 2005
- Eoghan Casey:
Investigating security breaches. 169-170 - Pressure mounts on US Senate to pass cybercrime treaty. Digit. Investig. 2(3): 171-174 (2005)
- Keith McDonald:
To image a Macintosh. 175-179 - Susan W. Brenner:
Requiring protocols in computer search warrants. 180-188 - Stephen Mason:
Trusted computing and forensic investigations. 189-192 - Bruce J. Nikkel:
Generalizing sources of live network evidence. 193-200 - Harlan Carvey:
The Windows Registry as a forensic resource. 201-205 - The future implications of computer forensics on VOIP. Digit. Investig. 2(3): 206-208 (2005)
- Michael A. Penhallurick:
Methodologies for the use of VMware to boot cloned/mounted subject hard disk images. 209-222 - Philip Turner:
Unification of digital evidence from disparate sources (Digital Evidence Bags). 223-228
Volume 2, Number 4, December 2005
- Eoghan Casey:
Digital arms race - The need for speed. 229-230 - A tribute to Gordon Stevenson. 235-236
- Forensics - cred or crud? Digit. Investig. 2(4): 237-238 (2005)
- Jim Kent, Byrne Ghavalas:
The unique challenges of collecting corporate evidence. 239-243 - Danny Bradbury:
No place to hide. 244-246 - Erin E. Kenneally, Andrea Monti:
Case study: A failure in success' clothing. 247-253 - Eoghan Casey:
Case study: Network intrusion investigation - lessons in forensic preparation. 254-260 - Nick Nykodym, Robert Taylor, Julia Vilela:
Criminal profiling and insider cyber crime. 261-267 - Mark Bedford:
Methods of discovery and exploitation of Host Protected Areas on IDE storage devices that conform to ATAPI-4. 268-275
- Spike Quinn:
Examining the state of preparedness of Information Technology management in New Zealand for events that may require forensic analysis. 276-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.