Table of Contents
|
Advances in Digital Forensics IX Gilbert Peterson, Sujeet Shenoi (Eds.)
|
Front Matter |
THEMES AND ISSUES
|
History, Historiography and the Hermeneutics of the Hard Drive Mark Pollitt |
3-17 |
Protecting Third Party Privacy in Digital Forensic Investigations Wynand Staden |
19-31 |
On the Scientific Maturity of Digital Forensics Research Martin Olivier, Stefan Gruner |
33-49 |
FORENSIC MODELS
|
Cognitive Approaches for Digital Forensic Readiness Planning Antonio Pooe, Les Labuschagne |
53-66 |
A Harmonized Process Model for Digital Forensic Investigation Readiness Aleksandar Valjarevic, Hein Venter |
67-82 |
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model Gary Cantrell, David Dampier |
83-98 |
FORENSIC TECHNIQUES
|
Reducing the Time Required for Hashing Operations Frank Breitinger, Kaloyan Petrov |
101-117 |
Hash-Based File Content Identification Using Distributed Systems York Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi |
119-134 |
Creating Super Timelines in Windows Investigations Stephen Esposito, Gilbert Peterson |
135-144 |
Log File Analysis with Context-Free Grammars Gregory Bosman, Stefan Gruner |
145-152 |
Using a Goal-Driven Approach in the Investigation of a Questioned Contract Clive Blackwell, Shareeful Islam, Benjamin Aziz |
153-167 |
FILESYSTEM FORENSICS
|
File Fragment Analysis Using Normalized Compression Distance Stefan Axelsson, Kamran Bajwa, Mandhapati Srikanth |
171-182 |
Quantifying Windows File Slack Size and Stability Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar Weippl |
183-193 |
Automating Video File Carving and Content Identification York Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter |
195-212 |
Data Recovery from Proprietary Formatted Cctv Hard Disks Aswami Ariffin, Jill Slay, Kim-Kwang Choo |
213-223 |
NETWORK FORENSICS
|
Creating Integrated Evidence Graphs for Network Forensics Changwei Liu, Anoop Singhal, Duminda Wijesekera |
227-241 |
A Generic Bayesian Belief Model for Similar Cyber Crimes Hayson Tse, Kam-Pui Chow, Michael Kwan |
243-255 |
An Empirical Study Profiling Internet Pirates Pierre Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien Chan |
257-272 |
Real-Time Covert Timing Channel Detection in Networked Virtual Environments Anyi Liu, Jim Chen, Harry Wechsler |
273-288 |
CLOUD FORENSICS
|
Impact of Cloud Computing on Digital Forensic Investigations Stephen O’shaughnessy, Anthony Keane |
291-303 |
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden Richard Iii, Vassil Roussev |
305-328 |
FORENSIC TOOLS
|
Comparison of the Data Recovery Function of Forensic Tools Joe Buchanan-Wollaston, Tim Storer, William Glisson |
331-347 |
Security Analysis and Decryption of Filevault 2 Omar Choudary, Felix Grobert, Joachim Metz |
349-363 |
ADVANCED FORENSIC TECHNIQUES
|
Detecting Counterfeit Currency and Identifying Its Source Ankit Sarkar, Robin Verma, Gaurav Gupta |
367-384 |
Towards Active Linguistic Authentication Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt |
385-398 |