Abstract is missing.
- Calibration Testing Of Network Tap DevicesBarbara Endicott-Popovsky, Brian Chee, Deborah A. Frincke. 3-19 [doi]
- On the Legality of Analyzing Telephone Call RecordsChristopher Swenson, Charles Adams, Anthony Whitledge, Sujeet Shenoi. 21-39 [doi]
- Survey of Law Enforcement Perceptions Regarding Digital EvidenceM. Rogers, K. Scarborough, K. Frakes, C. San Martin. 41-52 [doi]
- Insider Threat Analysis Using Information-Centric ModelingDuc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. Pramanik, Ramkumar Chinchani, Sunu Mathew. 55-73 [doi]
- An Integrated System for Insider Threat DetectionDaniel A. Ray, Phillip G. Bradford. 75-86 [doi]
- Analysis of Tools for Detecting Rootkits and Hidden ProcessesAdam D. Todd, J. Benson, G. L. Peterson, T. Franz, M. Stevens, Richard A. Raines. 89-105 [doi]
- A Method for Detecting Linux Kernel Module RootkitsDoug Wampler, James Graham. 107-116 [doi]
- Future Trends in Authorship AttributionPatrick Juola. 119-132 [doi]
- The Keyboard Dilemma and Authorship IdentificationCarole E. Chaski. 133-146 [doi]
- Factors Affecting One-Way Hashing of CD-R MediaChristopher Marberry, Philip Craiger. 149-161 [doi]
- Disk Drive I/O Commands and Write BlockingJames R. Lyle, Steven Mead, Kelsey Rider. 163-177 [doi]
- A New Process Model for Text String SearchingNicole Beebe, Glenn B. Dietrich. 179-191 [doi]
- Detecting Steganography Using Multi-Class ClassificationBenjamin Rodriguez, Gilbert L. Peterson. 193-204 [doi]
- Redacting Digital Information from Electronic DevicesAlex Barclay, L. Watson, David Greer, John Hale, Gavin Manes. 205-214 [doi]
- In-Place File CarvingGolden G. Richard III, Vassil Roussev, Lodovico Marziale. 217-230 [doi]
- File System Journal ForensicsChristopher Swenson, Raquel Phillips, Sujeet Shenoi. 231-244 [doi]
- Using Search Engines to Acquire Network Forensic EvidenceRobert McGrew 0002, Rayford B. Vaughn. 247-253 [doi]
- A Framework for Investigating Railroad AccidentsMark Hartong, Rajni Goel, Duminda Wijesekera. 255-265 [doi]
- Forensic Analysis of Xbox ConsolesPaul Burke, Philip Craiger. 269-280 [doi]
- Super-Resolution Video Analysis for Forensic InvestigationsAshish Gehani, John H. Reif. 281-299 [doi]
- Specializing CRISP-DM for Evidence MiningJacobus Venter, Alta de Waal, Cornelius Willers. 303-315 [doi]
- Applying The Biba Integrity Model to Evidence ManagementKweku K. Arthur, Martin S. Olivier, Hein S. Venter. 317-327 [doi]
- Investigating Computer Attacks Using Attack TreesNayot Poolsapassit, Indrajit Ray. 331-343 [doi]
- Attack Patterns: A New Forensic and Design ToolEduardo B. Fernández, Juan C. Pelaez, María M. Larrondo-Petrie. 345-357 [doi]