An Investigative Framework for Incident Analysis (English)
Free access
- New search for: Blackwell, Clive
- New search for: Blackwell, Clive
In:
Advances in Digital Forensics VII
1
;
23-34
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:An Investigative Framework for Incident Analysis
-
Contributors:Blackwell, Clive ( author )
-
Published in:Advances in Digital Forensics VII , 1 ; 23-34IFIP Advances in Information and Communication Technology ; 361, 1 ; 23-34
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:12 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
The State of the Science of Digital Evidence ExaminationCohen, Fred / Lowrie, Julie / Preston, Charles et al. | 2011
- 23
-
An Investigative Framework for Incident AnalysisBlackwell, Clive et al. | 2011
- 35
-
Cloud ForensicsRuan, Keyun / Carthy, Joe / Kechadi, Tahar / Crosbie, Mark et al. | 2011
- 49
-
Searching Massive Data Streams Using Multipattern Regular ExpressionsStewart, Jon / Uckelman, Joel et al. | 2011
- 65
-
Fast Content-Based File Type IdentificationAhmed, Irfan / Lhee, Kyung-Suk / Shin, Hyun-Jung / Hong, Man-Pyo et al. | 2011
- 77
-
Case-Based Reasoning in Live ForensicsHoelz, Bruno / Ralha, Celia / Mesquita, Frederico et al. | 2011
- 89
-
Assembling Metadata for Database ForensicsBeyers, Hector / Olivier, Martin / Hancke, Gerhard et al. | 2011
- 101
-
Forensic Leak Detection for Business Process ModelsAccorsi, Rafael / Wonnemann, Claus et al. | 2011
- 115
-
Analyzing Stylometric Approaches to Author ObfuscationJuola, Patrick / Vescovi, Darren et al. | 2011
- 129
-
Detecting Fraud Using Modified Benford AnalysisWinter, Christian / Schneider, Markus / Yannikos, York et al. | 2011
- 143
-
Detecting Collusive Fraud in Enterprise Resource Planning SystemsIslam, Asadul / Corney, Malcolm / Mohay, George / Clark, Andrew / Bracher, Shane / Raub, Tobias / Flegel, Ulrich et al. | 2011
- 155
-
Analysis of Back-Doored Phishing KitsMcCalley, Heather / Wardman, Brad / Warner, Gary et al. | 2011
- 169
-
Identifying Malware Using Cross-Evidence CorrelationFlaglien, Anders / Franke, Katrin / Arnes, Andre et al. | 2011
- 183
-
Detecting Mobile Spam Botnets Using Artificial immune SystemsVural, Ickin / Venter, Hein et al. | 2011
- 195
-
An FPGA System for Detecting Malicious DNS Network TrafficThomas, Brennon / Mullins, Barry / Peterson, Gilbert / Mills, Robert et al. | 2011
- 209
-
Router and Interface Marking for Network ForensicsPilli, Emmanuel / Joshi, Ramesh / Niyogi, Rajdeep et al. | 2011
- 221
-
Extracting Evidence Related to VoIP CallsIrwin, David / Slay, Jill et al. | 2011
- 231
-
Sensitivity Analysis of Bayesian Networks Used in Forensic InvestigationsKwan, Michael / Overill, Richard / Chow, Kam-Pui / Tse, Hayson / Law, Frank / Lai, Pierre et al. | 2011
- 245
-
Steganographic Techniques for Hiding Data in SWF FilesFouche, Mark-Anthony / Olivier, Martin et al. | 2011
- 257
-
Evaluating Digital Forensic Options for the Apple iPadHay, Andrew / Krill, Dennis / Kuhar, Benjamin / Peterson, Gilbert et al. | 2011
- 275
-
Forensic Analysis of Plug ComputersConrad, Scott / Dorn, Greg / Craiger, Philip et al. | 2011