index - Advances in Digital Forensics VIII
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Advances in Digital Forensics VIII
Gilbert Peterson, Sujeet Shenoi (Eds.)
Front Matter

THEMES AND ISSUES


On the Creation of Reliable Digital Evidence
Thomas Kemmerich, Nicolai Kuntze, Carsten Rudolph, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen
3-17
Managing Terabyte-Scale Investigations with Similarity Digests
Vassil Roussev
19-34
Visualizing Information in Digital Forensics
Grant Osborne, Hannah Thinyane, Jill Slay
35-47

FORENSIC TECHNIQUES


XML Conversion of the Windows Registry for Forensic Processing and Distribution
Alex Nelson
51-65
Context-Based File Block Classification
Luigi Sportiello, Stefano Zanero
67-82
A New Approach for Creating Forensic Hashsets
Marcelo Ruback, Bruno Hoelz, Celia Ralha
83-97
Reasoning about Evidence using Bayesian Networks
Hayson Tse, Kam-Pui Chow, Michael Kwan
99-113
Data Visualization for Social Network Forensics
Martin Mulazzani, Markus Huber, Edgar Weippl
115-126

MOBILE PHONE FORENSICS


Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones
Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Hui, Gang Zhou, Mengfei He, Yanbin Tang
129-142
Comparing Sources of Location Data from Android Smartphones
Michael Spreitzenbarth, Sven Schmitt, Felix Freiling
143-157
An Open Framework for Smartphone Evidence Acquisition
Lamine Aouad, Tahar Kechadi, Justin Trentesaux, Nhien-An Le-Khac
159-166

CLOUD FORENSICS


Finding File Fragments in the Cloud
Dirk Ras, Martin Olivier
169-185
Isolating Instances in Cloud Forensics
Waldo Delport, Martin Olivier
187-200
Key Terms for Service Level Agreements to Support Cloud Forensics
Keyun Ruan, Joshua James, Joe Carthy, Tahar Kechadi
201-212

NETWORK FORENSICS


Evidence Collection in Peer-to-Peer Network Investigations
Teja Myneedu, Yong Guan
215-230
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations
Ricci Ieong, Kam-Pui Chow, Pierre Lai
231-245
A Log File Digital Forensic Model
Himal Lalla, Stephen Flowerday, Tendai Sanyamahwe, Paul Tarwireyi
247-259
Implementing Forensic Readiness Using Performance Monitoring Tools
Franscois Staden, Hein Venter
261-270

ADVANCED FORENSIC TECHNIQUES


Reconstruction in Database Forensics
Oluwasola Fasan, Martin Olivier
273-287
Data Hiding Techniques for Database Environments
Heloise Pieterse, Martin Olivier
289-301
Forensic Tracking and Mobility Prediction in Vehicular Networks
Saif Al-Kuwari, Stephen Wolthusen
303-317
Using Internal Depth to Aid Stereoscopic Image Splicing Detection
Mark-Anthony Fouche, Martin Olivier
319-333

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/