Table of Contents
|
Advances in Digital Forensics X Gilbert Peterson, Sujeet Shenoi (Eds.)
|
Front Matter |
Internet Crime Investigations
|
Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection Wee-Yong Lim, Amit Sachan, Vrizlynn Thing |
3-16 |
Using Fraud Trees to Analyze Internet Credit Card Fraud Clive Blackwell |
17-29 |
Automated Analysis of Underground Marketplaces Aleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar Weippl |
31-42 |
An Exploratory Profiling Study of Online Auction Fraudsters Vivien Chan, Kam-Pui Chow, Michael Kwan, Guy Fong, Michael Hui, Jemy Tang |
43-56 |
Web User Profiling Based on Browsing Behavior Analysis Xiao-Xi Fan, Kam-Pui Chow, Fei Xu |
57-71 |
Validation Rules for Enhanced Foxy P2P Network Investigations Ricci Ieong, Kam-Pui Chow |
73-83 |
Forensic Techniques
|
Windows Event Forensic Process Quang Do, Ben Martini, Jonathan Looi, Yu Wang, Kim-Kwang Choo |
87-100 |
Schema Reconstruction in Database Forensics Oluwasola Adedayo, Martin Olivier |
101-116 |
Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus Carolina Zarate, Simson Garfinkel, Aubin Heffernan, Scott Horras, Kyle Gorak |
117-132 |
Similarity Hashing Based on Levenshtein Distances Frank Breitinger, Georg Ziroff, Steffen Lange, Harald Baier |
133-147 |
Using Approximate Matching to Reduce the Volume of Digital Data Frank Breitinger, Christian Winter, York Yannikos, Tobias Fink, Michael Seefried |
149-163 |
Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion Ariel Stolerman, Alex Fridman, Rachel Greenstadt, Patrick Brennan, Patrick Juola |
165-183 |
Breaking the Closed-World Assumption in Stylometric Authorship Attribution Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, Rachel Greenstadt |
185-205 |
Mobile Device Forensics
|
Preserving Dates and Timestamps for Incident Handling in Android Smartphones Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta |
209-225 |
An Open Source Toolkit for iOS Filesystem Forensics Ahmad Cheema, Mian Iqbal, Waqas Ali |
227-235 |
Smartphones as Distributed Witnesses for Digital Forensics Heloise Pieterse, Martin Olivier |
237-251 |
Smartphone Message Sentiment Analysis Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas |
253-265 |
Forensic Analysis of the TomTom Navigation Application Nhien-An Le-Khac, Mark Roeloffs, Tahar Kechadi |
267-276 |
Forensic Tools and Training
|
Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool Ibrahim Baggili, Andrew Marrington, Yasser Jafar |
279-295 |
Towards Fully Automated Digital Alibis with Social Interaction Stefanie Beyer, Martin Mulazzani, Sebastian Schrittwieser, Markus Huber, Edgar Weippl |
297-307 |
Data Corpora for Digital Forensics Education and Research York Yannikos, Lukas Graner, Martin Steinebach, Christian Winter |
309-325 |
Educating the Next Generation of Cyberforensic Professionals Mark Pollitt, Philip Craiger |
327-335 |