default search action
ICDF2C 2012: Lafayette, IN, USA
- Marcus K. Rogers, Kathryn C. Seigfried-Spellar:
Digital Forensics and Cyber Crime - 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 114, Springer 2013, ISBN 978-3-642-39890-2
Cloud Investigations
- Keyun Ruan, Joe Carthy:
Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis. 1-21 - Keyun Ruan, Joe Carthy:
Cloud Forensic Maturity Model. 22-41 - Jeremy Koppen, Gerald Gent, Kevin Bryan, Lisa Cingiser DiPippo, Jillian Kramer, Marquita Moreland, Victor Fay Wolfe:
Identifying Remnants of Evidence in the Cloud. 42-57
Malware
- Matthew F. Tennyson:
On Improving Authorship Attribution of Source Code. 58-65
Behavioral
- Ahmed F. Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu, Pavel Gladyshev:
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes. 66-80 - Kathryn C. Seigfried-Spellar:
Measuring the Preference of Image Content for Self-reported Consumers of Child Pornography. 81-90 - Ibrahim M. Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi:
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. 91-108
Law
- Litska Strikwerda:
When Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law? 109-143
New Developments in Digital Forensics
- Ibrahim M. Baggili, Afrah BaAbdallah, Deena Al-Safi, Andrew Marrington:
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research. 144-157 - Abdallah A. Mohamed, Roman V. Yampolskiy:
Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern. 158-166 - Frank Breitinger, Harald Baier:
Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2. 167-182 - Niall McGrath, Pavel Gladyshev:
Investigating File Encrypted Material Using NTFS $logfile. 183-203 - Marc Beck, Eric C. Rouchka, Roman V. Yampolskiy:
Finding Data in DNA: Computer Forensic Investigations of Living Organisms. 204-219 - Oluwasola Mary Adedayo, Martin S. Olivier:
On the Completeness of Reconstructed Data for Database Forensics. 220-238
Mobile Device Forensics
- Mohamed Al Marzougy, Ibrahim M. Baggili, Andrew Marrington:
BlackBerry PlayBook Backup Forensic Analysis. 239-252 - Lamine M. Aouad, M. Tahar Kechadi, Roberto Di Russo:
ANTS ROAD: A New Tool for SQLite Data Recovery on Android Devices. 253-263 - Shahzad Saleem, Oliver Popov, Oheneba Kwame Appiah-Kubi:
Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis. 264-282 - Christer Idland, Thomas Jelle, Stig Fr. Mjølsnes:
Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. 283-301
Cybercrime Investigations
- Daan de Graaf, Ahmed F. Shosha, Pavel Gladyshev:
BREDOLAB: Shopping in the Cybercrime Underworld. 302-313 - Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
A Review and Comparative Study of Digital Forensic Investigation Models. 314-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.