default search action
Digital Forensics 2010: Hong Kong, China
- Kam-Pui Chow, Sujeet Shenoi:
Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers. IFIP Advances in Information and Communication Technology 337, Springer 2010, ISBN 978-3-642-15505-5
Themes and Issues
- Mark Pollitt:
A History of Digital Forensics. 3-15 - Fred Cohen:
Toward a Science of Digital Forensic Evidence Examination. 17-35 - Kenny Wang:
Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet. 37-48 - Frankie Li, Hilton Chan, Kam-Pui Chow, Pierre K. Y. Lai:
An Analysis of the Green Dam Youth Escort Software. 49-62
Forensic Techniques
- Scott Conrad, Greg Dorn, Philip Craiger:
Forensic Analysis of a PlayStation 3 Console. 65-76 - Yuandong Zhu, Joshua James, Pavel Gladyshev:
A Consistency Study of the Windows Registry. 77-90 - Saif M. Al-Kuwari, Stephen D. Wolthusen:
Forensic Tracking and Mobility Prediction in Vehicular Networks. 91-105 - Sipho Ngobeni, Hein S. Venter, Ivan Burke:
A Forensic Readiness Model for Wireless Networks. 107-117
Internet Crime Investigations
- Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Jantje A. M. Silomon, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai:
Evaluation of Evidence in Internet Auction Fraud Investigations. 121-132 - Murat Gunestas, Murad Mehmet, Duminda Wijesekera:
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services. 133-150 - Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law:
Identifying First Seeders in Foxy Peer-to-Peer Networks. 151-168
Live Forensics
- Antonio Savoldi, Paolo Gubian, Isao Echizen:
Uncertainty in Live Forensics. 171-184 - Frank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Benjamin Tang, Pierre K. Y. Lai, Kam-Pui Chow, Ricci S. C. Ieong, Michael Y. K. Kwan, Wing-Kai Hon, Lucas Chi Kwong Hui:
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics. 185-194 - James S. Okolica, Gilbert L. Peterson:
A Compiled Memory Analysis Tool. 195-204
Advanced Forensice Techniques
- Vassil Roussev:
Data Fingerprinting with Similarity Digests. 207-226 - Bradley L. Schatz, Michael Cohen:
Refining Evidence Containers for Provenance and Accurate Data Representation. 227-242 - Vrizlynn L. L. Thing:
Virtual Expansion of Rainbow Tables. 243-256 - Kumiko Tadano, Masahiro Kawato, Ryo Furukawa, Fumio Machida, Yoshiharu Maeno:
Digital Watermarking of Virtual Machine Images. 257-268 - Yuki Nakayama, Seiji Shibaguchi, Ken-ichi Okada:
A Visualization System for Analyzing Information Leakage. 269-282
Forensic Tools
- Ying Yang, Kam-Pui Chow, Lucas Chi Kwong Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen:
Forensic Analysis of Popular Chinese Internet Applications. 285-295 - Yinghua Guo, Jill Slay:
Data Recovery Function Testing for Digital Forensic Tools. 297-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.