Journal: J. Digital Forensic Practice

Volume 1, Issue 4

265 -- 273Thijs Bosschert. Battling Anti-Forensics: Beating the U3 Stick
275 -- 282Paul Burke, Philip Craiger. Xbox Forensics
283 -- 284Mark Pollitt. Byte/Counterbyte
285 -- 289Fredesvinda Insa. The Admissibility of Electronic Evidence in Court (A.E.E.C.): Fighting against High-Tech Crime - Results of a European Study
291 -- 296Michael Losavio, Deborah Wilson, Adel Elmaghraby. Prevalence, Use, and Evidentiary Issues of Digital Evidence of Cellular Telephone Consumer and Small-Scale Digital Devices
297 -- 307Christopher Marberry, Philip Craiger. CD-R Acquisition Hashes Affected by Write Options
309 -- 313Aaron Smith. Describing and Categorizing Disk-Avoiding Anti-Forensics Tools
315 -- 323Timothy M. Vidas. The Acquisition and Analysis of Random Access Memory
325 -- 326Nicole Beebe, Gary C. Kessler. A Review of: ::::Real Digital Forensics: Computer Security and Incident Response::::. By Keith J. Jones, Richard Bejtlich, and Curtis W. Rose

Volume 1, Issue 3

151 -- 152Judie Mulholland. Message from the Guest Editor
157 -- 164Erin Kenneally. Enabling the Enablers: An Identity Fraud Solution for Law Enforcement
165 -- 177Robert Lyda, James Hamrock. Exploring Investigative Methods for Identifying and Profiling Serial Bots
179 -- 192Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel. Warkitting: The Drive-by Subversion of Wireless Home Routers
193 -- 199Craig M. McRae, Robert Wesley McGrew, Rayford B. Vaughn. Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams
203 -- 222Bob Breeden, Mike Cantey, Brett Cureton, Clifford Stokes, Peter Henry, Judie Mulholland, Wayne Sprague, Jim Watson. The Phlorida Autopsy Report
223 -- 229J. Philip Craiger, Paul Burke, Christopher Marberry. Open Source Tools for Phishing Investigations
231 -- 243Bob Radvanovsky. Analyzing Spoofed E-mail Headers
245 -- 260Aaron Emigh. The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond
261 -- 262Peter Henry. A Review of: ::::Phishing Exposed: Uncover Secrets from the Dark Side::::. By Lance James ::::Phishing: Cutting the Identity Theft Line::::. By Rachel Lininger and Russell Dean Uines

Volume 1, Issue 2

73 -- 74Judie Mulholland. Message from the Guest Editor
75 -- 76Peter Cassidy. Statement of Support Anti-Phishing Working Group (APWG)
77 -- 82Patrick Cain. Using XML to Support Robust Information Sharing: An IODEF Automated Approach
83 -- 97Anthony Y. Fu, Xiaotie Deng, Liu Wenyin. REGAP: A Tool for Unicode-Based Web Identity Fraud Detection
99 -- 101Susan Grant. The National Consumers League s Call for Action
103 -- 114John S. Quarterman. PhishScope: Tracking Phish Server Clusters
115 -- 129Gregg Tally, David Sames, Thomas Chen, Chris Colleran, David Jevans, Kevin Omiliak, Rod Rasmussen. The Phisherman Project: Creating a Comprehensive Data Collection to Combat Phishing Attacks
131 -- 142Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz. Badvertisements: Stealthy Click-Fraud with Unwitting Accessories
147 -- 149Thomas Chen, Peter Henry. A Review of: ::::Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft::::. By Markus Jakobsson and Steven Myers, Editors

Volume 1, Issue 1

1 -- 2Peter Stephenson. Trends
3 -- 11Alan E. Brill, Mark Pollitt, Carrie Morgan Whitcomb. The Evolution of Computer Forensic Best Practices: An Update on Programs and Publications
13 -- 17Michael Losavio, Julia Adams, Marc Rogers. Gap Analysis: Judicial Experience and Perception of Electronic Evidence
19 -- 26Eric Van Buskirk, Vincent T. Liu. Digital Evidence: Challenging the Presumption of Reliability
27 -- 36John E. Kerivan. Heuristic Security-Testing Methods
37 -- 41Angela Orebaugh. Proactive Forensics
43 -- 46Anthony Nelson. ISO 27001 as a Support to Digital Forensics
47 -- 56Chet Hosmer. Discovering Hidden Evidence
57 -- 65Wei Ren. Modeling Network Forensics Behavior
67 -- 68Mark Pollitt. Exploration
69 -- 70Scott L. Ksander, William B. Gillam, Marcus K. Rogers. Ultrablock Forensic Card Reader