Advances in Digital Forensics VIII

8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-33961-5 (Print) 978-3-642-33962-2 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. THEMES AND ISSUES

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-17

      On the Creation of Reliable Digital Evidence

    3. No Access

      Book Chapter

      Pages 19-34

      Managing Terabyte-Scale Investigations with Similarity Digests

    4. No Access

      Book Chapter

      Pages 35-47

      Visualizing Information in Digital Forensics

  3. FORENSIC TECHNIQUES

    1. Front Matter

      Pages 49-49

    2. No Access

      Book Chapter

      Pages 51-65

      XML Conversion of the Windows Registry for Forensic Processing and Distribution

    3. No Access

      Book Chapter

      Pages 67-82

      Context-Based File Block Classification

    4. No Access

      Book Chapter

      Pages 83-97

      A New Approach for Creating Forensic Hashsets

    5. No Access

      Book Chapter

      Pages 99-113

      Reasoning about Evidence using Bayesian Networks

    6. No Access

      Book Chapter

      Pages 115-126

      Data Visualization for Social Network Forensics

  4. MOBILE PHONE FORENSICS

    1. Front Matter

      Pages 127-127

    2. No Access

      Book Chapter

      Pages 129-142

      Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones

    3. No Access

      Book Chapter

      Pages 143-157

      Comparing Sources of Location Data from Android Smartphones

    4. No Access

      Book Chapter

      Pages 159-166

      An Open Framework for Smartphone Evidence Acquisition

  5. CLOUD FORENSICS

    1. Front Matter

      Pages 167-167

    2. No Access

      Book Chapter

      Pages 169-185

      Finding File Fragments in the Cloud

    3. No Access

      Book Chapter

      Pages 187-200

      Isolating Instances in Cloud Forensics

    4. No Access

      Book Chapter

      Pages 201-212

      Key Terms for Service Level Agreements to Support Cloud Forensics

  6. NETWORK FORENSICS

    1. Front Matter

      Pages 213-213

    2. No Access

      Book Chapter

      Pages 215-230

      Evidence Collection in Peer-to-Peer Network Investigations

    3. No Access

      Book Chapter

      Pages 231-245

      Validation of Rules Used in Foxy Peer-to-Peer Network Investigations

    4. No Access

      Book Chapter

      Pages 247-259

      A Log File Digital Forensic Model

    5. No Access

      Book Chapter

      Pages 261-270

      Implementing Forensic Readiness Using Performance Monitoring Tools

  7. ADVANCED FORENSIC TECHNIQUES

    1. Front Matter

      Pages 271-271

    2. No Access

      Book Chapter

      Pages 273-287

      Reconstruction in Database Forensics

    3. No Access

      Book Chapter

      Pages 289-301

      Data Hiding Techniques for Database Environments

previous Page of 2