Contributing Authors |
Preface |
Themes and Issues / Part I: |
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1: |
Forensics and Privacy-Enhancing Technologies / Martin Olivier2: |
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3: |
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4: |
Non-Technical Manipulation of Digital Data / Michael Losavio5: |
Investigative Techniques / Part II: |
Detecting Social Engineering / Michael Hoeschele6: |
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7: |
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8: |
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9: |
Exploring Forensic Data with Self-Organizing Maps / B. Fei10: |
Network Forensics / Part III: |
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11: |
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12: |
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13: |
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14: |
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15: |
Portable Electronic Device Forensics / Part IV: |
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16: |
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17: |
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18: |
Linux and File System Forensics / Part V: |
Recovering Digital Evidence from Linux Systems / Philip Craiger19: |
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20: |
Applications and Techniques / Part VI: |
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21: |
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22: |
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23: |
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24: |
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25: |
Contributing Authors |
Preface |
Themes and Issues / Part I: |