Digital Forensics and Cyber Crime

Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers

Editors:

ISBN: 978-3-642-35514-1 (Print) 978-3-642-35515-8 (Online)
Download Book (10,673 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (23 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cybercrime Investigations

    1. Book Chapter

      Pages 1-16

      The Role of Perception in Age Estimation

    2. Book Chapter

      Pages 17-32

      Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers

    3. Book Chapter

      Pages 33-35

      Law Enforcement 2.0: Regulating the Lawful Interception of Social Media

  3. Mobile Device Forensics

    1. Book Chapter

      Pages 36-46

      All Bot Net: A Need for Smartphone P2P Awareness

    2. Book Chapter

      Pages 47-61

      Results of Field Testing Mobile Phone Shielding Devices

    3. Book Chapter

      Pages 62-76

      Windows Phone 7 from a Digital Forensics’ Perspective

    4. Book Chapter

      Pages 77-88

      An Agent Based Tool for Windows Mobile Forensics

    5. Book Chapter

      Pages 89-103

      Forensic Extractions of Data from the Nokia N900

  4. New Developments in Digital Forensics

    1. Book Chapter

      Pages 104-114

      A Strategy for Testing Metadata Based Deleted File Recovery Tools

    2. Book Chapter

      Pages 115-130

      Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus

    3. Book Chapter

      Pages 131-140

      A Novel Methodology for Malware Intrusion Attack Path Reconstruction

    4. Book Chapter

      Pages 141-155

      Performance Issues About Context-Triggered Piecewise Hashing

  5. Short Papers

    1. Book Chapter

      Pages 156-171

      Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment

    2. Book Chapter

      Pages 172-179

      Yahoo! Messenger Forensics on Windows Vista and Windows 7

    3. Book Chapter

      Pages 180-187

      Robust Hashing for Efficient Forensic Analysis of Image Sets

    4. Book Chapter

      Pages 188-196

      Tracking User Activity on Personal Computers

  6. Digital Forensics Techniques

    1. Book Chapter

      Pages 197-210

      The Forensic Value of the Windows 7 Jump List

    2. Book Chapter

      Pages 211-225

      Finding Forensic Information on Creating a Folder in $LogFile of NTFS

    3. Book Chapter

      Pages 226-237

      Rescuing Digital Data from Submerged HDD

  7. Digital Forensics Education

    1. Book Chapter

      Pages 238-252

      Evaluating the Forensic Image Generator Generator

previous Page of 2