index - Advances in Digital Forensics VI Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Advances in Digital Forensics VI
Kam-Pui Chow, Sujeet Shenoi
Front Matter

THEMES AND ISSUES


A History of Digital Forensics
Mark Pollitt
3-15
Toward a Science of Digital Forensic Evidence Examination
Fred Cohen
17-35
Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet
Kenny Wang
37-48
An Analysis of the Green Dam Youth Escort Software
Frankie Li, Hilton Chan, Kam-Pui Chow, Pierre Lai
49-62

FORENSIC TECHNIQUES


Forensic Analysis of a PlayStation 3 Console
Scott Conrad, Greg Dorn, Philip Craiger
65-76
A Consistency Study of the Windows Registry
Yuandong Zhu, Joshua James, Pavel Gladyshev
77-90
Forensic Tracking and Mobility Prediction in Vehicular Networks
Saif Al-Kuwari, Stephen Wolthusen
91-105
A Forensic Readiness Model for Wireless Networks
Sipho Ngobeni, Hein Venter, Ivan Burke
107-117

INTERNET CRIME INVESTIGATIONS


Evaluation of Evidence in Internet Auction Fraud Investigations
Michael Kwan, Richard Overill, Kam-Pui Chow, Jantje Silomon, Hayson Tse, Frank Law, Pierre Lai
121-132
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services
Murat Gunestas, Murad Mehmet, Duminda Wijesekera
133-150
Identifying First Seeders in Foxy Peer-to-Peer Networks
Ricci Ieong, Pierre Lai, Kam-Pui Chow, Michael Kwan, Frank Law
151-168

LIVE FORENSICS


Uncertainty in Live Forensics
Antonio Savoldi, Paolo Gubian, Isao Echizen
171-184
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics
Frank Law, Patrick Chan, Siu-Ming Yiu, Benjamin Tang, Pierre Lai, Kam-Pui Chow, Ricci Ieong, Michael Kwan, Wing-Kai Hon, Lucas Hui
185-194
A Compiled Memory Analysis Tool
James Okolica, Gilbert Peterson
195-204

ADVANCED FORENSIC TECHNIQUES


Data Fingerprinting with Similarity Digests
Vassil Roussev
207-226
Refining Evidence Containers for Provenance and Accurate Data Representation
Bradley Schatz, Michael Cohen
227-242
Virtual Expansion of Rainbow Tables
Vrizlynn Thing
243-256
Digital Watermarking of Virtual Machine Images
Kumiko Tadano, Masahiro Kawato, Ryo Furukawa, Fumio Machida, Yoshiharu Maeno
257-268
A Visualization System for Analyzing Information Leakage
Yuki Nakayama, Seiji Shibaguchi, Kenichi Okada
269-282

FORENSIC TOOLS


Forensic Analysis of Popular Chinese Internet Applications
Ying Yang, Kam-Pui Chow, Lucas Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen
285-295
Data Recovery Function Testing for Digital Forensic Tools
Yinghua Guo, Jill Slay
297-311