Digital Forensics as a Surreal Narrative (Englisch)
- Neue Suche nach: Pollitt, M.
- Neue Suche nach: Pollitt, M.
- Neue Suche nach: Peterson, Gilbert A.
- Neue Suche nach: Shenoi, Sujeet
In:
IFIP WG 11.9 International Conference on Digital Forensics; Advances in digital forensics V
306
;
3-16
;
2009
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Digital Forensics as a Surreal Narrative
-
Beteiligte:
-
Kongress:5th, IFIP WG 11.9 International Conference on Digital Forensics; Advances in digital forensics V ; 2009 ; Orlando, FL
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer-Verlag
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:14 pages
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Digital Forensics as a Surreal NarrativePollitt, M. et al. | 2009
- 17
-
Digital Forensic Research: The Good, the Bad and the UnaddressedBeebe, N. et al. | 2009
- 37
-
Towards a Formalization of Digital ForensicsSlay, J. / Lin, Y.-C. / Turnbull, B. / Beckett, J. / Lin, P. et al. | 2009
- 51
-
Bulk Email ForensicsCohen, F. et al. | 2009
- 69
-
Analyzing the Impact of a Virtual Machine on a Host MachineDorn, G. / Marberry, C. / Conrad, S. / Craiger, P. et al. | 2009
- 83
-
Temporal Analysis of Windows MRU Registry KeysZhu, Y. / Gladyshev, P. / James, J. et al. | 2009
- 95
-
Using DCT Features for Printing Technique and Copy DetectionSchulze, C. / Schreyer, M. / Stahl, A. / Breuel, T. et al. | 2009
- 107
-
Source Camera Identification Using Support Vector MachinesWang, B. / Kong, X. / You, X. et al. | 2009
- 119
-
Forensic Analysis of the Sony PlayStation PortableConrad, S. / Rodriguez, C. / Marberry, C. / Craiger, P. et al. | 2009
- 133
-
Implementing Boot Control for Windows VistaAshino, Y. / Fujita, K. / Furusawa, M. / Uehara, T. / Sasaki, R. et al. | 2009
- 143
-
A Forensic Framework for Handling Information Privacy IncidentsReddy, K. / Venter, H. et al. | 2009
- 159
-
Tracking Contraband Files Transmitted Using BitTorrentSchrader, K. / Mullins, B. / Peterson, G. / Mills, R. et al. | 2009
- 175
-
A Model for Foxy Peer-to-Peer Network InvestigationsIeong, R. / Lai, P. / Chow, K.-P. / Law, F. / Kwan, M. / Tse, K. et al. | 2009
- 187
-
Detecting Fraud in Internet Auction SystemsPeng, Y. / Zhang, L. / Guan, Y. et al. | 2009
- 201
-
A Cloud Computing Platform for Large-Scale Forensic ComputingRoussev, V. / Wang, L. / Richard, G. / Marziale, L. et al. | 2009
- 215
-
Password Cracking Using Sony PlayStationsKleinhans, H. / Butts, J. / Shenoi, S. et al. | 2009
- 231
-
A Cost-Effective Model for Digital Forensic InvestigationsOverill, R. / Kwan, M. / Chow, K.-P. / Lai, P. / Law, F. et al. | 2009
- 241
-
Analysis of the Digital Evidence Presented in the Yahoo! CaseKwan, M. / Chow, K.-P. / Lai, P. / Law, F. / Tse, H. et al. | 2009
- 255
-
Assessing the Legal Risks in Network Forensic ProbingLosavio, M. / Nasraoui, O. / Thacker, V. / Marean, J. / Miles, N. / Yampolskiy, R. / Imam, I. et al. | 2009
- 267
-
A Survey of the Legal Issues Facing Digital Forensic ExpertsLiles, S. / Rogers, M. / Hoebich, M. et al. | 2009
- 277
-
An Extended Model for E-Discovery OperationsBillard, D. et al. | 2009
- 291
-
Concept Mapping for Digital Forensic InvestigationsTanner, A. / Dampier, D. et al. | 2009
- 301
-
System Support for Forensic InferenceGehani, A. / Kirchner, F. / Shankar, N. et al. | 2009