Table of Contents
|
Advances in Digital Forensics VIII Gilbert Peterson, Sujeet Shenoi (Eds.)
|
Front Matter |
THEMES AND ISSUES
|
On the Creation of Reliable Digital Evidence Thomas Kemmerich, Nicolai Kuntze, Carsten Rudolph, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen |
3-17 |
Managing Terabyte-Scale Investigations with Similarity Digests Vassil Roussev |
19-34 |
Visualizing Information in Digital Forensics Grant Osborne, Hannah Thinyane, Jill Slay |
35-47 |
FORENSIC TECHNIQUES
|
XML Conversion of the Windows Registry for Forensic Processing and Distribution Alex Nelson |
51-65 |
Context-Based File Block Classification Luigi Sportiello, Stefano Zanero |
67-82 |
A New Approach for Creating Forensic Hashsets Marcelo Ruback, Bruno Hoelz, Celia Ralha |
83-97 |
Reasoning about Evidence using Bayesian Networks Hayson Tse, Kam-Pui Chow, Michael Kwan |
99-113 |
Data Visualization for Social Network Forensics Martin Mulazzani, Markus Huber, Edgar Weippl |
115-126 |
MOBILE PHONE FORENSICS
|
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Hui, Gang Zhou, Mengfei He, Yanbin Tang |
129-142 |
Comparing Sources of Location Data from Android Smartphones Michael Spreitzenbarth, Sven Schmitt, Felix Freiling |
143-157 |
An Open Framework for Smartphone Evidence Acquisition Lamine Aouad, Tahar Kechadi, Justin Trentesaux, Nhien-An Le-Khac |
159-166 |
CLOUD FORENSICS
|
Finding File Fragments in the Cloud Dirk Ras, Martin Olivier |
169-185 |
Isolating Instances in Cloud Forensics Waldo Delport, Martin Olivier |
187-200 |
Key Terms for Service Level Agreements to Support Cloud Forensics Keyun Ruan, Joshua James, Joe Carthy, Tahar Kechadi |
201-212 |
NETWORK FORENSICS
|
Evidence Collection in Peer-to-Peer Network Investigations Teja Myneedu, Yong Guan |
215-230 |
Validation of Rules Used in Foxy Peer-to-Peer Network Investigations Ricci Ieong, Kam-Pui Chow, Pierre Lai |
231-245 |
A Log File Digital Forensic Model Himal Lalla, Stephen Flowerday, Tendai Sanyamahwe, Paul Tarwireyi |
247-259 |
Implementing Forensic Readiness Using Performance Monitoring Tools Franscois Staden, Hein Venter |
261-270 |
ADVANCED FORENSIC TECHNIQUES
|
Reconstruction in Database Forensics Oluwasola Fasan, Martin Olivier |
273-287 |
Data Hiding Techniques for Database Environments Heloise Pieterse, Martin Olivier |
289-301 |
Forensic Tracking and Mobility Prediction in Vehicular Networks Saif Al-Kuwari, Stephen Wolthusen |
303-317 |
Using Internal Depth to Aid Stereoscopic Image Splicing Detection Mark-Anthony Fouche, Martin Olivier |
319-333 |