default search action
Digital Investigation, Volume 8
Volume 8, Number 1, July 2011
- Eoghan Casey:
Responding to a data breach: A little knowledge is a dangerous thing. 1-2
- Stefan Vömel, Felix C. Freiling:
A survey of main memory acquisition and analysis techniques for the windows operating system. 3-22 - George Grispos, Tim Storer, William Bradley Glisson:
A comparison of forensic evidence recovery techniques for a windows mobile smart phone. 23-36 - Eoghan Casey, Adrien Cheval, Jong Yeon Lee, David Oxley, Yong Jun Song:
Forensic acquisition and analysis of palm webOS on mobile devices. 37-47 - Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Forensic investigation of OOXML format documents. 48-55 - Yun-Sheng Yen, I-Long Lin, Bo-Lin Wu:
A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence. 56-67 - Zhili Chen, Liusheng Huang, Wei Yang:
Detection of substitution-based linguistic steganography by relative frequency analysis. 68-77 - Na Cheng, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Author gender identification from text. 78-88
Volume 8, Number Supplement, August 2011
- Wietse Z. Venema:
Eleventh Annual DFRWS Conference. S1-S2 - Clay Shields, Ophir Frieder, Mark Maloof:
A system for the proactive, continuous, and efficient collection of digital forensic evidence. S3-S13 - Timothy Vidas, Chengye Zhang, Nicolas Christin:
Toward a general collection methodology for Android devices. S14-S24 - Khawla Al-Wehaibi, Tim Storer, William Bradley Glisson:
Augmenting password recovery with online profiling. S25-S33 - Vassil Roussev:
An evaluation of forensic similarity hashes. S34-S41 - Hajime Inoue, Frank Adelstein, Robert A. Joyce:
Visualization in testing a volatile memory forensic tool. S42-S51 - Andrew Marrington, Ibrahim M. Baggili, George M. Mohay, Andrew J. Clark:
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines. S52-S61 - Junghoon Oh, SeungBong Lee, Sangjin Lee:
Advanced evidence collection and analysis of web browser activity. S62-S70 - Jonathan Grier:
Detecting data theft using stochastic forensics. S71-S77 - Robert Beverly, Simson L. Garfinkel, Greg Cardwell:
Forensic carving of network packets and associated data structures. S78-S89 - Bilal Shebaro, Jedidiah R. Crandall:
Privacy-preserving network flow recording. S90-S100 - Michael I. Cohen, Darren Bilby, Germano Caronni:
Distributed forensics and incident response in the enterprise. S101-S110 - Christopher King, Timothy Vidas:
Empirical analysis of solid state disk data retention when used with contemporary operating systems. S111-S117 - James S. Okolica, Gilbert L. Peterson:
Extracting the windows clipboard from physical memory. S118-S124 - Ralf D. Brown:
Reconstructing corrupt DEFLATEd files. S125-S131
Volume 8, Number 2, November 2011
- Eoghan Casey:
A unified voice: The need for an international digital forensic convention. 89-91
- Consortium of Digital Forensic Specialists: Shape the future of your profession. 92-93
- Zeno J. M. H. Geradts:
ENFSI Forensic IT Working group. 94-95 - Susan Ballou, Rhesa G. Gilliland:
Emerging paper standards in computer forensics. 96-97 - Peter Sommer:
Certification, registration and assessment of digital forensic experts: The UK experience. 98-105 - Elisabetta Allegra, Roberto Di Pietro, Mauro La Noce, Valerio Ruocco, Nino Vincenzo Verde:
Cross-border co-operation and education in digital investigations: A European perspective. 106-113 - Jason Beckett, Jill Slay:
Scientific underpinnings and background to standards and accreditation in digital forensics. 114-121 - Anders Flaglien, Aleksander Mallasvik, Magnus Mustorp, André Årnes:
Storage and exchange formats for digital evidence. 122-128 - Eoghan Casey, Geoff Fellows, Matthew Geiger, Gerasimos Stellatos:
The growing impact of full disk encryption on digital forensics. 129-134 - Paul Owen, Paula Thomas:
An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines. 135-140 - Angus M. Marshall:
Standards, regulation & quality in digital investigations: The state we are in. 141-144
Volume 8, Numbers 3-4, February 2012
- Eoghan Casey:
Editorial - Cutting the Gordian knot: Defining requirements for trustworthy tools. 145-146
- Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youssef, Francis Fortin:
Mining criminal networks from unstructured text documents. 147-160 - Simson L. Garfinkel:
Digital forensics XML and the DFXML toolset. 161-174 - Joe Sylve, Andrew Case, Lodovico Marziale, Golden G. Richard III:
Acquisition and analysis of volatile memory from android devices. 175-184 - Matthew Tart, Iain Brodie, Nicholas Gleed, James Matthews:
Historic cell site analysis - Overview of principles and survey methodologies. 185-193 - Antonio Savoldi, Mario Piccinelli, Paolo Gubian:
A statistical method for detecting on-disk wiped areas. 194-214 - S. Devi Mahalakshmi, K. Vijayalakshmi, Priyadharsini Selvaraj:
Digital image forgery detection and estimation by exploring basic image manipulations. 215-225 - Hany Farid, Mary J. Bravo:
Perceptual discrimination of computer generated and photographic faces. 226-235
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.