Abstract is missing.
- On Achieving Encrypted File RecoveryXiaodong Lin, Chenxi Zhang, Theodora Dule. 1-13 [doi]
- Behavior Clustering for Anomaly DetectionXudong Zhu, Hui Li, Zhijing Liu. 14-27 [doi]
- A Novel Inequality-Based Fragmented File Carving TechniqueHwei-Ming Ying, Vrizlynn L. L. Thing. 28-39 [doi]
- Using Relationship-Building in Event Profiling for Digital Forensic InvestigationsLynn Margaret Batten, Lei Pan. 40-52 [doi]
- A Novel Forensics Analysis Method for Evidence Extraction from Unallocated SpaceZhenxing Lei, Theodora Dule, Xiaodong Lin. 53-65 [doi]
- An Efficient Searchable Encryption Scheme and Its Application in Network ForensicsXiaodong Lin, Rongxing Lu, Kevin Foxton, Xuemin (Sherman) Shen. 66-78 [doi]
- Attacks on BitTorrent - An Experimental StudyMarti Ksionsk, Ping Ji, Weifeng Chen. 79-89 [doi]
- Network Connections Information Extraction of 64-Bit Windows 7 Memory ImagesLianhai Wang, Lijuan Xu, Shuhui Zhang. 90-98 [doi]
- RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer OverflowYong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng. 99-109 [doi]
- Investigating the Implications of Virtualization for Digital ForensicsZheng Song, Bo Jin, Yinghong Zhu, Yongqing Sun. 110-121 [doi]
- Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating SystemLijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong. 122-130 [doi]
- A Stream Pattern Matching Method for Traffic AnalysisCan Mo, Hui Li, Hui Zhu. 131-140 [doi]
- Fast in-Place File Carving for Digital ForensicsXinyan Zha, Sartaj Sahni. 141-158 [doi]
- Live Memory Acquisition through FireWireLei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou. 159-167 [doi]
- Digital Forensic Analysis on Runtime Instruction FlowJuanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo. 168-178 [doi]
- Enhance Information Flow Tracking with Function RecognitionKan Zhou, Shiqiu Huang, Zhengwei Qi, Jian Gu, Beijun Shen. 179-184 [doi]
- A Privilege Separation Method for Security Commercial TransactionsYasha Chen, Jun Hu, Xinmao Gai, Yu Sun. 185-192 [doi]
- Data Recovery Based on Intelligent Pattern MatchingJunkai Yi, Shuo Tang, Hui Li. 193-199 [doi]
- Study on Supervision of Integrity of Chain of Custody in Computer ForensicsYi Wang. 200-206 [doi]
- On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent VehiclesSaif Al-Kuwari, Stephen D. Wolthusen. 207-223 [doi]
- Research and Review on Computer ForensicsHong Guo, Bo Jin, Daoli Huang. 224-233 [doi]
- Text Content Filtering Based on Chinese Character Reconstruction from RadicalsWenlei He, Gongshen Liu, Jun Luo, Jiuchuan Lin. 234-240 [doi]
- Disguisable Symmetric Encryption Schemes for an Anti-forensics PurposeNing Ding, Dawu Gu, Zhiqiang Liu. 241-255 [doi]
- Digital Signatures for e-Government - A Long-Term Security ArchitecturePrzemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski. 256-270 [doi]
- SQL Injection Defense Mechanisms for IIS+ASP+MSSQL Web ApplicationsBeihua Wu. 271-276 [doi]
- On Different Categories of Cybercrime in ChinaAidong Xu, Yan Gong, Yongquan Wang, Nayan Ai. 277-281 [doi]
- Face and Lip Tracking for Person IdentificationYing Zhang. 282-286 [doi]
- An Anonymity Scheme Based on Pseudonym in P2P NetworksHao Peng, Songnian Lu, Jianhua Li, Aixin Zhang, Dandan Zhao. 287-293 [doi]
- Research on the Application Security Isolation ModelLei Gong, Yong Zhao, Jianhua Liao. 294-300 [doi]
- Analysis of Telephone Call Detail Records Based on Fuzzy Decision TreeLiping Ding, Jian Gu, Yongji Wang, JingZheng Wu. 301-311 [doi]