Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers /
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practi...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2013.
|
Series: | IFIP Advances in Information and Communication Technology,
410 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-41148-9 |
Table of Contents:
- History, Historiography and the Hermeneutics of the Hard
- Protecting Third Party Privacy in Digital Forensic Investigations
- On the Scientific Maturity of Digital Forensics Research
- Cognitive Approaches for Digital Forensic Readiness Planning
- A Harmonized Process Model for Digital Forensic Investigation Readiness
- Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model
- Reducing the Time Required for Hashing Operations
- Hash-Based File Content Identification Using Distributed Systems
- Creating Super Timelines in Windows Investigations
- Using a Goal-Driven Approach in the Investigation of a Questioned Contract
- File Fragment Analysis Using Normalized Compression Distance
- Quantifying Windows File Slack Size and Stability
- Automating Video File Carving and Content Identification
- Data Recovery from Proprietary-Formatted CCTV Hard Disks
- Creating Integrated Evidence Graphs for Network Forensics
- A Generic Bayesian Belief Model for Similar Cyber Crimes
- An Empirical Study Profiling Internet Pirates
- Real-Time Covert Timing Channel Detection in Networked Virtual Environments
- Impact of Cloud Computing on Digital Forensic Investigations
- Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments
- Comparison of the Data Recovery Function of Forensic Tools
- Security Analysis and Decryption of FileVault 2
- Detecting Counterfeit Currency and Identifying its Source
- Towards Active Linguistic Authentication.