Chargement en cours…

Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers /

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practi...

Description complète

Détails bibliographiques
Cote:Libro Electrónico
Collectivité auteur: SpringerLink (Online service)
Autres auteurs: Peterson, Gilbert (Éditeur intellectuel), Shenoi, Sujeet (Éditeur intellectuel)
Format: Électronique eBook
Langue:Inglés
Publié: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Édition:1st ed. 2013.
Collection:IFIP Advances in Information and Communication Technology, 410
Sujets:
Accès en ligne:Texto Completo
Table des matières:
  • History, Historiography and the Hermeneutics of the Hard
  • Protecting Third Party Privacy in Digital Forensic Investigations
  • On the Scientific Maturity of Digital Forensics Research
  • Cognitive Approaches for Digital Forensic Readiness Planning
  • A Harmonized Process Model for Digital Forensic Investigation Readiness
  • Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model
  • Reducing the Time Required for Hashing Operations
  • Hash-Based File Content Identification Using Distributed Systems
  • Creating Super Timelines in Windows Investigations
  • Using a Goal-Driven Approach in the Investigation of a Questioned Contract
  • File Fragment Analysis Using Normalized Compression Distance
  • Quantifying Windows File Slack Size and Stability
  • Automating Video File Carving and Content Identification
  • Data Recovery from Proprietary-Formatted CCTV Hard Disks
  • Creating Integrated Evidence Graphs for Network Forensics
  • A Generic Bayesian Belief Model for Similar Cyber Crimes
  • An Empirical Study Profiling Internet Pirates
  • Real-Time Covert Timing Channel Detection in Networked Virtual Environments
  • Impact of Cloud Computing on Digital Forensic Investigations
  • Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments
  • Comparison of the Data Recovery Function of Forensic Tools
  • Security Analysis and Decryption of FileVault 2
  • Detecting Counterfeit Currency and Identifying its Source
  • Towards Active Linguistic Authentication.