Skip to Main content Skip to Navigation
   


Full Text Documents

17

Search


Table of Contents
Advances in Digital Forensics XVI
Gilbert Peterson, Sujeet Shenoi
Front Matter

Themes and Issues


Digital Forensics and the Big Data Deluge — Some Concerns Based on Ramsey Theory
Martin Olivier
3-23
Identity and Sufficiency of Digital Evidence
Michael Losavio
25-36

Forensic Techniques


Interactive Temporal Digital Forensic Event Analysis
Nikolai Adderley, Gilbert Peterson
39-55
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors
Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang
57-72
A Novel Approach for Generating Synthetic Datasets for Digital Forensics
Thomas Göbel, Thomas Schäfer, Julien Hachenberger, Jan Türr, Harald Baier
73-93
Detecting Attacks on a Water Treatment System Using Oneclass Support Vector Machines
Ken Yau, Kam-Pui Chow, Siu-Ming Yiu
95-108

Filesystem Forensics


A Digital Media Similarity Measure for Triage of Digital Forensic Evidence
Myeong Lim, James Jones
111-135
Resident Data Pattern Analysis Using Sector Clustering for Storage Drive Forensics
Nitesh Bharadwaj, Upasna Singh, Gaurav Gupta
137-157

Cloud Forensics


Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments
Changwei Liu, Anoop Singhal, Duminda Wijesekera
161-180
A Taxonomy of Hypervisor Forensic Tools
Anand Mishra, Mahesh Govil, Emmanuel Pilli
181-199

Social Media Forensics


Public Opinion Monitoring for Proactive Crime Detection Using Named Entity Recognition
Wencan Wu, Kam-Pui Chow, Yonghao Mai, Jun Zhang
203-214
Retrieving E-Dating Application Artifacts from iPhone Backups
Ranul Thantilage, Nhien-An Le-Khac
215-230

Multimedia Forensics


Target Identity Attacks on Facial Recognition Systems
Saheb Chhabra, Naman Banati, Gaurav Gupta, Garima Gupta
233-252
Electric Network Frequency Based Audio Forensics Using Convolutional Neural Networks
Maoyu Mao, Zhongcheng Xiao, Xiangui Kang, Xiang Li and Liang Xiao
253-270

Novel Applications


Insider Threat Detection Using Multi-autoencoder Filtering and Unsupervised Learning
Yichen Wei, Kam-Pui Chow, Siu-Ming Yiu
273-290
Detecting Local Machine Data Leakage in Real Time
Jingcheng Liu, Yaping Zhang, Yuze Li, Yongheng Jia, Yao Chen, Jin Cao
291-308

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/