


default search action
ICDF2C 2010: Abu Dhabi, United Arab Emirates
- Ibrahim M. Baggili:
Digital Forensics and Cyber Crime - Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 53, Springer 2011, ISBN 978-3-642-19512-9 - Ali Alkaabi, George M. Mohay, Adrian McCullagh, Nicholas Chantler:
Dealing with the Problem of Cybercrime. 1-18 - S. Santhosh Baboo, P. Vinod Bhattathiripad:
Software Piracy Forensics: The Need for Further Developing AFC. 19-26 - Mohammad Iftekhar Husain, Ibrahim M. Baggili, Ramalingam Sridhar:
A Simple Cost-Effective Framework for iPhone Forensic Analysis. 27-37 - Gurvinder Singh, Martin Eian, Svein Yngvar Willassen, Stig Fr. Mjølsnes
:
Detecting Intermediary Hosts by TCP Latency Measurements. 38-54 - Pavel Gladyshev
, Afrah Almansoori
:
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire. 55-64 - Zouheir Trabelsi, Mohamed Al-Hemairy
, Ibrahim M. Baggili, Saad Ali Amin
:
Towards More Secure Biometric Readers for Effective Digital Forensic Investigation. 65-77 - Hamda Bariki, Mariam Hashmi, Ibrahim M. Baggili:
Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools. 78-95 - Joshua James
, Pavel Gladyshev
, Yuandong Zhu:
Signature Based Detection of User Events for Post-mortem Forensic Analysis. 96-109 - Shahzad Saleem
, Oliver Popov:
Protecting Digital Evidence Integrity by Using Smart Cards. 110-119 - Noor Hashim, Iain Sutherland
:
An Architecture for the Forensic Analysis of Windows System Artifacts. 120-128 - Emmanuel S. Pilli
, Ramesh Chandra Joshi, Rajdeep Niyogi:
An IP Traceback Model for Network Forensics. 129-136 - Digambar Povar
, V. K. Bhadran:
Forensic Data Carving. 137-148 - Damir Kahvedzic, M. Tahar Kechadi
:
Semantic Modelling of Digital Forensic Evidence. 149-156

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.