Table of Contents
|
Advances in Digital Forensics XIV Gilbert Peterson, Sujeet Shenoi |
Front Matter |
Themes and Issues
|
Measuring Evidential Weight in Digital Forensic Investigations Richard Overill, Kam-Pui Chow |
3-10 |
Challenges, Opportunities and a Framework for Web Environment Forensics Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn |
11-33 |
Internet of Things Forensics – Challenges and a Case Study Saad Alabdulsalam, Kevin Schaefer, Tahar Kechadi, Nhien-An Le-Khac |
35-48 |
Forensic Techniques
|
Recovery of Forensic Artifacts from Deleted Jump Lists Bhupendra Singh, Upasna Singh, Pankaj Sharma, Rajender Nath |
51-65 |
Obtaining Precision-Recall Trade-Offs in Fuzzy Searches of Large Email Corpora Kyle Porter, Slobodan Petrovic |
67-85 |
Anti-Forensic Capacity and Detection Rating of Hidden Data in the Ext4 Filesystem Thomas Göbel, Harald Baier |
87-110 |
Detecting Data Leakage from Hard Copy Documents Jijnasa Nayak, Shweta Singh, Saheb Chhabra, Gaurav Gupta, Monika Gupta, Garima Gupta |
111-124 |
Network Forensics
|
Information-Entropy-Based DNS Tunnel Prediction Irvin Homem, Panagiotis Papapetrou, Spyridon Dosis |
127-140 |
Collecting Network Evidence Using Constrained Approximate Search Algorithms Ambika Chitrakar, Slobodan Petrovic |
141-160 |
Traffic Classification and Application Identification in Network Forensics Jan Pluskal, Ondrej Lichtner, Ondrej Rysavy |
161-181 |
Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic Erwin Wiel, Mark Scanlon, Nhien-An Le-Khac |
183-197 |
Hashing Incomplete and Unordered Network Streams Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang |
199-224 |
A Network Forensic Scheme Using Correntropy-Variation for Attack Detection Nour Moustafa, Jill Slay |
225-239 |
Cloud Forensics
|
A Taxonomy of Cloud Endpoint Forensic Tools Anand Mishra, Emmanuel Pilli, Mahesh Govil |
243-261 |
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis Changwei Liu, Anoop Singhal, Duminda Wijesekera |
263-289 |
Mobile and Embedded Device Forensics
|
Forensic Analysis of Android Steganography Apps Wenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, Stephanie Reinders |
293-312 |
Automated Vulnerability Detection in Embedded Devices Danjun Liu, Yong Tang, Baosheng Wang, Wei Xie, Bo Yu |
313-329 |
A Forensic Logging System for Siemens Programmable Logic Controllers Ken Yau, Kam-Pui Chow, Siu-Ming Yiu |
331-349 |
Enhancing the Security and Forensic Capabilities of Programmable Logic Controllers Chun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau |
351-367 |