Journal: J. Digital Forensic Practice

Volume 2, Issue 4

161 -- 171Jonathan Matusitz, Elizabeth Minei. Cyberterrorism: Its Effects on Health-Related Infrastructures
172 -- 174Mark Pollitt. The Good, the Bad, the Unaddressed
175 -- 182S. Santhosh Baboo, P. Vinod Bhattathiripad. Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques
196 -- 208Vincent Urias, Curtis Hash, Lorie M. Liebrock. Consideration of Issues for Parallel Digital Forensics of RAID Systems
209 -- 220Wayne Liu, Sudhir Aggarwal, Zhenhai Duan. Incorporating Accountability into Internet E-mail

Volume 2, Issue 3

108 -- 112Jesse D. Kornblum. Auditing Hash Sets: Lessons Learned from ::::Jurassic Park::::
113 -- 116Gavin Wylie Manes, James Johnson, Alex Barclay, Michael Harvey, Elizabeth Downing, John Hale. Issues and Techniques for Redacting PDF Files
117 -- 131Seyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi. Automated Windows Memory File Extraction for Cyber Forensics Investigation
132 -- 139Abdelrahman Desoky. Nostega: A Novel Noiseless Steganography Paradigm
140 -- 156David Glen Ferguson. Redefining File Slack in Microsoft® NTFS
157 -- 158Mark Pollitt. Managing Expectations
159 -- 160Samuel Liles. Software Forensics. By Robert Slade

Volume 2, Issue 2

57 -- 61Ronald E. Kaplan. Computer Forensics - What Is It Good For?
62 -- 73Mark Pollitt, Kara L. Nance, Brian Hay, Ronald C. Dodge, Philip Craiger, Paul Burke, Christopher Marberry, Bryan Brubaker. Virtualization and Digital Forensics: A Research and Education Agenda
74 -- 82Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn. A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon
83 -- 94Scott Inch. A Simple Image Hiding Technique: What You May Be Missing
95 -- 104Yoginder S. Dandass, Nathan Joseph Necaise, Sherry Reede Thomas. An Empirical Analysis of Disk Sector Hashes for Data Carving
105 -- 106Mark Pollitt. Blue Skies and Storm Clouds

Volume 2, Issue 1

1 -- 12Ewa Huebner, Derek Bem. Forensic Extraction of EFS-Encrypted Files in Live System Investigation
13 -- 16Victor Limongelli. Digital Evidence: Findings of Reliability, Not Presumptions
17 -- 26Jonathan Matusitz. Postmodernism and Networks of Cyberterrorists
27 -- 36Abdelrahman Desoky, Mohamed Younis. Graphstega: Graph Steganography Methodology
37 -- 42John H. Riley Jr.. Windows Directory Entries for 8.3 Names in VFAT File Systems
43 -- 53Gary C. Kessler. On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
54 -- 56Mark Pollitt. Digital Orange Juice