Contributing Authors |
Preface |
Themes and Issues / Part I: |
Some Challenges in Digital Forensics / Eugene Spafford1: |
Evidence Collection and Handling / Part II: |
AFF: An Open Extensible Format for Disk Imaging / S. Garfinkel ; D. Malan ; K. Dubec ; C. Stevens ; C. Pham2: |
File System Support for Digital Evidence Bags / Golden Richard III ; Vassil Roussev3: |
Remote Upload of Evidence Over Mobile Ad Hoc Networks / Indrajit Ray4: |
Applying Machine Trust Models to Forensic Investigations / M. Wojcik ; H. Venter ; J. Eloff ; M. Olivier5: |
Exploring Big Haystacks: Data Mining and Knowledge Management / Mark Pollitt ; Anthony Whitledge6: |
Forensic Techniques / Part III: |
Countering Hostile Forensic Techniques / Scott Piper ; Mark Davis ; Sujeet Shenoi7: |
Using PLSI-U to Detect Insider Threats From Email Traffic / James Okolica ; Gilbert Peterson ; Robert Mills8: |
Collusion Detection Using Multimedia Fingerprints / Anthony Persaud ; Yong Guan9: |
Authorship Attribution for Electronic Documents / Patrick Juola10: |
Linking Individuals to Digital Information / Shelly Seier ; David Greer ; Gavin Manes11: |
Use-Misuse Case Driven Analysis of Positive Train Control / Mark Hartong ; Rajni Goel ; Duminda Wijesekera12: |
Operating System and File System Forensics / Part IV: |
Mac OS X Forensics / Philip Craiger ; Paul Burke13: |
Detecting Data Concealment Programs Using File System Analysis / M. Davis ; R. Kennedy ; K. Pyles ; A. Strickler ; S. Shenoi14: |
Assessing Trace Evidence Left by Secure Deletion Programs / 15: |
Network Forensics / Part V: |
On the Reliability of Network Eavesdropping Tools / Eric Cronin ; Micah Sherr ; Matthew Blaze16: |
Active Traffic Capture for Network Forensics / Marco Slaviero ; Anna Granova ; Martin Olivier17: |
Logical Traffic Isolation Using Differentiated Services / Tinus Strauss ; Derrick Kourie18: |
Passive Detection of NAT Routers and Client Counting / Kenneth Straka19: |
Analysis of Web Proxy Logs / B. Fei20: |
GSM Cell Site Forensics / Christopher Swenson ; Tyler Moore21: |
An Architecture for SCADA Network Forensics / T. Kilpatrick ; J. Gonzalez ; R. Chandia ; M. Papa22: |
Portable Electronic Device Forensics / Part VI: |
Identifying Digital Cameras Using CFA Interpolation / Sevinc Bayram ; Husrev Sencar ; Nasir Memon23: |
Forensic Analysis of BIOS Chips / Pavel Gershteyn24: |
Training, Governance and Legal Issues / Part VII: |
A Training Tool for Internet Crimes Against Children Cases / S. Aggarwal ; B. Breeden ; P. Henry ; J. Mulholland25: |
Process Flow Diagrams for Training and Operations / Jacobus Venter26: |
A Control Framework for Digital Forensics / S. von Solms ; C. Louwrens ; C. Reekie ; T. Grobler27: |
Criminal Regulation of Anti-Forensic Tools in Japan / Tetsuya Ishii28: |
Contributing Authors |
Preface |
Themes and Issues / Part I: |