Forensics in Telecommunications, Information, and Multimedia

Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers

Editors:

ISBN: 978-3-642-23601-3 (Print) 978-3-642-23602-0 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-13

    On Achieving Encrypted File Recovery

  3. No Access

    Book Chapter

    Pages 14-27

    Behavior Clustering for Anomaly Detection

  4. No Access

    Book Chapter

    Pages 28-39

    A Novel Inequality-Based Fragmented File Carving Technique

  5. No Access

    Book Chapter

    Pages 40-52

    Using Relationship-Building in Event Profiling for Digital Forensic Investigations

  6. No Access

    Book Chapter

    Pages 53-65

    A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space

  7. No Access

    Book Chapter

    Pages 66-78

    An Efficient Searchable Encryption Scheme and Its Application in Network Forensics

  8. No Access

    Book Chapter

    Pages 79-89

    Attacks on BitTorrent – An Experimental Study

  9. No Access

    Book Chapter

    Pages 90-98

    Network Connections Information Extraction of 64-Bit Windows 7 Memory Images

  10. No Access

    Book Chapter

    Pages 99-109

    RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow

  11. No Access

    Book Chapter

    Pages 110-121

    Investigating the Implications of Virtualization for Digital Forensics

  12. No Access

    Book Chapter

    Pages 122-130

    Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System

  13. No Access

    Book Chapter

    Pages 131-140

    A Stream Pattern Matching Method for Traffic Analysis

  14. No Access

    Book Chapter

    Pages 141-158

    Fast in-Place File Carving for Digital Forensics

  15. No Access

    Book Chapter

    Pages 159-167

    Live Memory Acquisition through FireWire

  16. No Access

    Book Chapter

    Pages 168-178

    Digital Forensic Analysis on Runtime Instruction Flow

  17. No Access

    Book Chapter

    Pages 179-184

    Enhance Information Flow Tracking with Function Recognition

  18. No Access

    Book Chapter

    Pages 185-192

    A Privilege Separation Method for Security Commercial Transactions

  19. No Access

    Book Chapter

    Pages 193-199

    Data Recovery Based on Intelligent Pattern Matching

  20. No Access

    Book Chapter

    Pages 200-206

    Study on Supervision of Integrity of Chain of Custody in Computer Forensics

  21. No Access

    Book Chapter

    Pages 207-223

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

previous Page of 2