researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Digital Forensic Practice
Home
Index
Info
Volume
Volume
2
, Issue
4
161
--
171
Jonathan Matusitz
,
Elizabeth Minei
.
Cyberterrorism: Its Effects on Health-Related Infrastructures
172
--
174
Mark Pollitt
.
The Good, the Bad, the Unaddressed
175
--
182
S. Santhosh Baboo
,
P. Vinod Bhattathiripad
.
Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques
196
--
208
Vincent Urias
,
Curtis Hash
,
Lorie M. Liebrock
.
Consideration of Issues for Parallel Digital Forensics of RAID Systems
209
--
220
Wayne Liu
,
Sudhir Aggarwal
,
Zhenhai Duan
.
Incorporating Accountability into Internet E-mail
Volume
2
, Issue
3
108
--
112
Jesse D. Kornblum
.
Auditing Hash Sets: Lessons Learned from ::::Jurassic Park::::
113
--
116
Gavin Wylie Manes
,
James Johnson
,
Alex Barclay
,
Michael Harvey
,
Elizabeth Downing
,
John Hale
.
Issues and Techniques for Redacting PDF Files
117
--
131
Seyed Mahmood Hejazi
,
Mourad Debbabi
,
Chamseddine Talhi
.
Automated Windows Memory File Extraction for Cyber Forensics Investigation
132
--
139
Abdelrahman Desoky
.
Nostega: A Novel Noiseless Steganography Paradigm
140
--
156
David Glen Ferguson
.
Redefining File Slack in Microsoft® NTFS
157
--
158
Mark Pollitt
.
Managing Expectations
159
--
160
Samuel Liles
.
Software Forensics. By Robert Slade
Volume
2
, Issue
2
57
--
61
Ronald E. Kaplan
.
Computer Forensics - What Is It Good For?
62
--
73
Mark Pollitt
,
Kara L. Nance
,
Brian Hay
,
Ronald C. Dodge
,
Philip Craiger
,
Paul Burke
,
Christopher Marberry
,
Bryan Brubaker
.
Virtualization and Digital Forensics: A Research and Education Agenda
74
--
82
Jack Wesley Riley
,
David A. Dampier
,
Rayford B. Vaughn
.
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon
83
--
94
Scott Inch
.
A Simple Image Hiding Technique: What You May Be Missing
95
--
104
Yoginder S. Dandass
,
Nathan Joseph Necaise
,
Sherry Reede Thomas
.
An Empirical Analysis of Disk Sector Hashes for Data Carving
105
--
106
Mark Pollitt
.
Blue Skies and Storm Clouds
Volume
2
, Issue
1
1
--
12
Ewa Huebner
,
Derek Bem
.
Forensic Extraction of EFS-Encrypted Files in Live System Investigation
13
--
16
Victor Limongelli
.
Digital Evidence: Findings of Reliability, Not Presumptions
17
--
26
Jonathan Matusitz
.
Postmodernism and Networks of Cyberterrorists
27
--
36
Abdelrahman Desoky
,
Mohamed Younis
.
Graphstega: Graph Steganography Methodology
37
--
42
John H. Riley Jr.
.
Windows Directory Entries for 8.3 Names in VFAT File Systems
43
--
53
Gary C. Kessler
.
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
54
--
56
Mark Pollitt
.
Digital Orange Juice