Digital Forensics and Cyber Crime

4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers

  • Marcus Rogers
  • Kathryn C. Seigfried-Spellar

Table of contents

  1. Front Matter
  2. Cloud Investigations

    1. Keyun Ruan, Joe Carthy
      Pages 22-41
    2. Jeremy Koppen, Gerald Gent, Kevin Bryan, Lisa DiPippo, Jillian Kramer, Marquita Moreland et al.
      Pages 42-57
  3. Malware

    1. Matthew F. Tennyson
      Pages 58-65
  4. Behavioral

    1. Ahmed F. Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu, Pavel Gladyshev
      Pages 66-80
    2. Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi
      Pages 91-108
  5. Law

  6. New Developments in Digital Forensics

    1. Ibrahim Baggili, Afrah BaAbdallah, Deena Al-Safi, Andrew Marrington
      Pages 144-157
    2. Abdallah Mohamed, Roman V. Yampolskiy
      Pages 158-166
    3. Niall McGrath, Pavel Gladyshev
      Pages 183-203
    4. Marc B. Beck, Eric C. Rouchka, Roman V. Yampolskiy
      Pages 204-219
    5. Oluwasola Mary Adedayo, Martin S. Olivier
      Pages 220-238
  7. Mobile Device Forensics

    1. Mohamed Al Marzougy, Ibrahim Baggili, Andrew Marrington
      Pages 239-252
    2. Lamine M. Aouad, Tahar M. Kechadi, Roberto Di Russo
      Pages 253-263
    3. Shahzad Saleem, Oliver Popov, Oheneba Kwame Appiah-Kubi
      Pages 264-282
    4. Christer Idland, Thomas Jelle, Stig F. Mjølsnes
      Pages 283-301
  8. Cybercrime Investigations

    1. Daan de Graaf, Ahmed F. Shosha, Pavel Gladyshev
      Pages 302-313

About these proceedings

Introduction

This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA. The 20 papers in this volume are grouped in the following topical sections: cloud investigation; malware; behavioral; law; mobile device forensics; and cybercrime investigations.

Keywords

algorithms cloud computing database forensics encryption mobile devices

Editors and affiliations

  • Marcus Rogers
    • 1
  • Kathryn C. Seigfried-Spellar
    • 2
  1. 1.Center for Education and Research in Information Assurance and SecurityPurdue UniversityLafayetteUSA
  2. 2.The University of AlabamaTuscaloosaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-39891-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-39890-2
  • Online ISBN 978-3-642-39891-9
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • About this book