index - Advances in Digital Forensics XI Access content directly
   


Full Text Documents

20

Search


Table of Contents
Advances in Digital Forensics XI
Gilbert Peterson, Sujeet Shenoi (Eds.)
Front Matter

THEMES AND ISSUES


A TALE OF TWO TRACES – DIPLOMATICS AND FORENSICS
Fred Cohen
3-27
NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS
Segen Tewelde, Stefan Gruner, Martin Olivier
29-43
USING YIN’S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS
Oluwasayo Oyelami, Martin Olivier
45-59
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS
Min Yang, Kam-Pui Chow
61-76

INTERNET CRIME INVESTIGATIONS


A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS
Chen Zhao, Yong Guan
79-95
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM
Xiao-Xi Fan, Kam-Pui Chow, Fei Xu
97-113
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM
Fei Xu, Ken Yau, Ping Zhang, Kam-Pui Chow
115-128
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS
Changwei Liu, Anoop Singhal, Duminda Wijesekera
129-145

FORENSIC TECHNIQUES


CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY
Dae Glendowne, Cody Miller, Wesley Mcgrew, David Dampier
149-161
DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASES
Werner Hauger, Martin Olivier
163-177
USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING
Peter Fruhwirt, Peter Kieseberg, Edgar Weippl
179-194
IDENTIFYING PASSWORDS STORED ON DISK
Shiva Houshmand, Sudhir Aggarwal, Umit Karabiyik
195-213
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS
Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Junbin Fang, Xiamu Niu, Qi Han, Xianyan Wu
215-231

MOBILE DEVICE FORENSICS


FORENSIC-READY SECURE iOS APPS FOR JAILBROKEN iPHONES
Jayaprakash Govindaraj, Rashmi Mata, Robin Verma, Gaurav Gupta
235-249
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM
Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Irwin King
251-267

CLOUD FORENSICS


A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT
Shams Zawoad, Ragib Hasan
271-285
LOCATING AND TRACKING DIGITAL OBJECTS IN THE CLOUD
Philip Trenwith, Hein Venter
287-301

FORENSIC TOOLS


A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS
Shariq Murtuza, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta
305-320
CRITERIA FOR VALIDATING SECURE WIPING TOOLS
Muhammad Zareen, Baber Aslam, Monis Akhlaq
321-339
DO DATA LOSS PREVENTION SYSTEMS REALLY WORK?
Sara Ghorbanian, Glenn Fryklund, Stefan Axelsson
341-357

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/