Evaluating the Forensic Image Generator Generator (Englisch)
- Neue Suche nach: Moch, Christian
- Neue Suche nach: Freiling, Felix C.
- Neue Suche nach: Moch, Christian
- Neue Suche nach: Freiling, Felix C.
In:
Digital Forensics and Cyber Crime
6
;
238-252
;
2012
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Evaluating the Forensic Image Generator Generator
-
Beteiligte:Moch, Christian ( Autor:in ) / Freiling, Felix C. ( Autor:in )
-
Erschienen in:Digital Forensics and Cyber Crime , 6 ; 238-252
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
The Role of Perception in Age EstimationMurphy, Cynthia A. et al. | 2012
- 17
-
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service ProvidersSeigfried-Spellar, Kathryn C. / Bertoline, Gary R. / Rogers, Marcus K. et al. | 2012
- 33
-
Law Enforcement 2.0: Regulating the Lawful Interception of Social MediaPeshin, Esti et al. | 2012
- 36
-
All Bot Net: A Need for Smartphone P2P AwarenessCole, Kelly A. / Silva, Ramindu L. / Mislan, Richard P. et al. | 2012
- 47
-
Results of Field Testing Mobile Phone Shielding DevicesKatz, Eric / Mislan, Richard / Rogers, Marcus / Smith, Anthony et al. | 2012
- 62
-
Windows Phone 7 from a Digital Forensics’ PerspectiveSchaefer, Thomas / Höfken, Hans / Schuba, Marko et al. | 2012
- 77
-
An Agent Based Tool for Windows Mobile ForensicsSatheesh Kumar, S. / Thomas, Bibin / Thomas, K. L. et al. | 2012
- 89
-
Forensic Extractions of Data from the Nokia N900Lohrum, Mark et al. | 2012
- 104
-
A Strategy for Testing Metadata Based Deleted File Recovery ToolsLyle, James R. et al. | 2012
- 115
-
Finding Anomalous and Suspicious Files from Directory Metadata on a Large CorpusRowe, Neil C. / Garfinkel, Simson L. et al. | 2012
- 131
-
A Novel Methodology for Malware Intrusion Attack Path ReconstructionShosha, Ahmed F. / James, Joshua I. / Gladyshev, Pavel et al. | 2012
- 141
-
Performance Issues About Context-Triggered Piecewise HashingBreitinger, Frank / Baier, Harald et al. | 2012
- 156
-
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database EnvironmentThorpe, Sean / Ray, Indrakshi / Ray, Indrajit / Grandison, Tyrone / Barbir, Abbie / France, Robert et al. | 2012
- 172
-
Yahoo! Messenger Forensics on Windows Vista and Windows 7Levendoski, Matthew / Datar, Tejashree / Rogers, Marcus et al. | 2012
- 180
-
Robust Hashing for Efficient Forensic Analysis of Image SetsSteinebach, Martin et al. | 2012
- 188
-
Tracking User Activity on Personal ComputersKeane, Anthony / O’Shaughnessy, Stephen et al. | 2012
- 197
-
The Forensic Value of the Windows 7 Jump ListBarnett, Alexander G. et al. | 2012
- 211
-
Finding Forensic Information on Creating a Folder in $LogFile of NTFSCho, Gyu-Sang / Rogers, Marcus K. et al. | 2012
- 226
-
Rescuing Digital Data from Submerged HDDYasuhira, Toshinobu / Nishimura, Kazuhiro / Koida, Tomofumi et al. | 2012
- 238
-
Evaluating the Forensic Image Generator GeneratorMoch, Christian / Freiling, Felix C. et al. | 2012
- 268
-
A Forensic Framework for Incident Analysis Applied to the Insider ThreatBlackwell, Clive et al. | 2012
- 282
-
Reasoning About a Simulated Printer Case Investigation with Forensic LucidMokhov, Serguei A. / Paquet, Joey / Debbabi, Mourad et al. | 2012