Table of Contents
|
Advances in Digital Forensics XVI Gilbert Peterson, Sujeet Shenoi |
Front Matter |
Themes and Issues
|
Digital Forensics and the Big Data Deluge — Some Concerns Based on Ramsey Theory Martin Olivier |
3-23 |
Identity and Sufficiency of Digital Evidence Michael Losavio |
25-36 |
Forensic Techniques
|
Interactive Temporal Digital Forensic Event Analysis Nikolai Adderley, Gilbert Peterson |
39-55 |
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang |
57-72 |
A Novel Approach for Generating Synthetic Datasets for Digital Forensics Thomas Göbel, Thomas Schäfer, Julien Hachenberger, Jan Türr, Harald Baier |
73-93 |
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines Ken Yau, Kam-Pui Chow, Siu-Ming Yiu |
95-108 |
Filesystem Forensics
|
A Digital Media Similarity Measure for Triage of Digital Forensic Evidence Myeong Lim, James Jones |
111-135 |
Resident Data Pattern Analysis Using Sector Clustering for Storage Drive Forensics Nitesh Bharadwaj, Upasna Singh, Gaurav Gupta |
137-157 |
Cloud Forensics
|
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments Changwei Liu, Anoop Singhal, Duminda Wijesekera |
161-180 |
A Taxonomy of Hypervisor Forensic Tools Anand Mishra, Mahesh Govil, Emmanuel Pilli |
181-199 |
Social Media Forensics
|
Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition Wencan Wu, Kam-Pui Chow, Yonghao Mai, Jun Zhang |
203-214 |
Retrieving E-Dating Application Artifacts from iPhone Backups Ranul Thantilage, Nhien-An Le-Khac |
215-230 |
Multimedia Forensics
|
Target Identity Attacks on Facial Recognition Systems Saheb Chhabra, Naman Banati, Gaurav Gupta, Garima Gupta |
233-252 |
Electric Network Frequency Based Audio Forensics Using Convolutional Neural Networks Maoyu Mao, Zhongcheng Xiao, Xiangui Kang, Xiang Li and Liang Xiao |
253-270 |
Novel Applications
|
Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning Yichen Wei, Kam-Pui Chow, Siu-Ming Yiu |
273-290 |
Detecting Local Machine Data Leakage in Real Time Jingcheng Liu, Yaping Zhang, Yuze Li, Yongheng Jia, Yao Chen, Jin Cao |
291-308 |