Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
Gilbert Peterson, Sujeet Shenoi, Springer-Verlag GmbH (Publisher)
The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, File system Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques.
Print Book, English, 2016
Softcover reprint of the original 1st ed. 2013 View all formats and editions
Springer Berlin Springer, Berlin, 2016
XX, 398 Seiten in 1 Teil 92 Illustrationen 23.5 x 16 cm, 0 g
9783662514443, 3662514443
958467769
Erscheint auch als
History, Historiography and the Hermeneutics of the Hard.- Protecting Third Party Privacy in Digital Forensic Investigations.- On the Scientific Maturity of Digital Forensics Research.- Cognitive Approaches for Digital Forensic Readiness Planning.- A Harmonized Process Model for Digital Forensic Investigation Readiness.- Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model.- Reducing the Time Required for Hashing Operations.- Hash-Based File Content Identification Using Distributed Systems.- Creating Super Timelines in Windows Investigations.- Using a Goal-Driven Approach in the Investigation of a Questioned Contract.- File Fragment Analysis Using Normalized Compression Distance.- Quantifying Windows File Slack Size and Stability.- Automating Video File Carving and Content Identification.- Data Recovery from Proprietary-Formatted CCTV Hard Disks.- Creating Integrated Evidence Graphs for Network Forensics.- A Generic Bayesian Belief Model for Similar Cyber Crimes.- An Empirical Study Profiling Internet Pirates.- Real-Time Covert Timing Channel Detection in Networked Virtual Environments.- Impact of Cloud Computing on Digital Forensic Investigations.- Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments.- Comparison of the Data Recovery Function of Forensic Tools.- Security Analysis and Decryption of FileVault 2.- Detecting Counterfeit Currency and Identifying its Source.- Towards Active Linguistic Authentication.