Table of Contents
|
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics Gilbert Peterson, Sujeet Shenoi (Eds.)
|
Front Matter |
THEMES AND ISSUES
|
The State of the Science of Digital Evidence Examination Fred Cohen, Julie Lowrie, Charles Preston |
3-21 |
An Investigative Framework for Incident Analysis Clive Blackwell |
23-34 |
Cloud Forensics Keyun Ruan, Joe Carthy, Tahar Kechadi, Mark Crosbie |
35-46 |
FORENSIC TECHNIQUES
|
Searching Massive Data Streams Using Multipattern Regular Expressions Jon Stewart, Joel Uckelman |
49-63 |
Fast Content-Based File Type Identification Irfan Ahmed, Kyung-Suk Lhee, Hyun-Jung Shin, Man-Pyo Hong |
65-75 |
Case-Based Reasoning in Live Forensics Bruno Hoelz, Celia Ralha, Frederico Mesquita |
77-88 |
Assembling Metadata for Database Forensics Hector Beyers, Martin Olivier, Gerhard Hancke |
89-99 |
Forensic Leak Detection for Business Process Models Rafael Accorsi, Claus Wonnemann |
101-113 |
Analyzing Stylometric Approaches to Author Obfuscation Patrick Juola, Darren Vescovi |
115-125 |
FRAUD AND MALWARE INVESTIGATIONS
|
Detecting Fraud Using Modified Benford Analysis Christian Winter, Markus Schneider, York Yannikos |
129-141 |
Detecting Collusive Fraud in Enterprise Resource Planning Systems Asadul Islam, Malcolm Corney, George Mohay, Andrew Clark, Shane Bracher, Tobias Raub, Ulrich Flegel |
143-153 |
Analysis of Back-Doored Phishing Kits Heather Mccalley, Brad Wardman, Gary Warner |
155-168 |
Identifying Malware Using Cross-Evidence Correlation Anders Flaglien, Katrin Franke, Andre Arnes |
169-182 |
Detecting Mobile Spam Botnets Using Artificial immune Systems Ickin Vural, Hein Venter |
183-192 |
NETWORK FORENSICS
|
An FPGA System for Detecting Malicious DNS Network Traffic Brennon Thomas, Barry Mullins, Gilbert Peterson, Robert Mills |
195-207 |
Router and Interface Marking for Network Forensics Emmanuel Pilli, Ramesh Joshi, Rajdeep Niyogi |
209-220 |
Extracting Evidence Related to VoIP Calls David Irwin, Jill Slay |
221-228 |
ADVANCED FORENSIC TECHNIQUES
|
Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations Michael Kwan, Richard Overill, Kam-Pui Chow, Hayson Tse, Frank Law, Pierre Lai |
231-243 |
Steganographic Techniques for Hiding Data in SWF Files Mark-Anthony Fouche, Martin Olivier |
245-255 |
Evaluating Digital Forensic Options for the Apple iPad Andrew Hay, Dennis Krill, Benjamin Kuhar, Gilbert Peterson |
257-273 |
Forensic Analysis of Plug Computers Scott Conrad, Greg Dorn, Philip Craiger |
275-287 |