Digital Forensics 2013: Orlando, FL, USA
Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
Gilbert L. Peterson, Sujeet Shenoi
Springer, IFIP Advances in Information and Communication Technology 410, ISBN: 978-3-642-41147-2
Contents
Themes and Issues
Forensic Models
A Harmonized Process Model for Digital Forensic Investigation Readiness.
Aleksandar Valjarevic, Hein S. Venter
67-82
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model.
Gary Cantrell, David A. Dampier
83-98
Forensic Techniques
Hash-Based File Content Identification Using Distributed Systems.
York Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi
119-134
Using a Goal-Driven Approach in the Investigation of a Questioned Contract.
Clive Blackwell, Shareeful Islam, Benjamin Aziz
153-167
Filesystem Forensics
File Fragment Analysis Using Normalized Compression Distance.
Stefan Axelsson, Kamran Ali Bajwa, Mandhapati Venkata Srikanth
171-182
Quantifying Windows File Slack Size and Stability.
Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar Weippl
183-193
Automating Video File Carving and Content Identification.
York Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter
195-212
Data Recovery from Proprietary Formatted Cctv Hard Disks.
Aswami Ariffin, Jill Slay, Kim-Kwang Raymond Choo
213-223
Network Forensics
Creating Integrated Evidence Graphs for Network Forensics.
Changwei Liu, Anoop Singhal, Duminda Wijesekera
227-241
A Generic Bayesian Belief Model for Similar Cyber Crimes.
Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan
243-255
An Empirical Study Profiling Internet Pirates.
Pierre K. Y. Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien P. S. Chan
257-272
Real-Time Covert Timing Channel Detection in Networked Virtual Environments.
Anyi Liu, Jim X. Chen, Harry Wechsler
273-288
Cloud Forensics
Impact of Cloud Computing on Digital Forensic Investigations.
Stephen O'Shaughnessy, Anthony Keane
291-303
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments.
Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III, Vassil Roussev
305-328
Forensic Tools
Comparison of the Data Recovery Function of Forensic Tools.
Joe Buchanan-Wollaston, Tim Storer, William Bradley Glisson
331-347
Advanced Forensic Techniques
Detecting Counterfeit Currency and Identifying Its Source.
Ankit Sarkar, Robin Verma, Gaurav Gupta
367-384
Towards Active Linguistic Authentication.
Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt
385-398