Abstract is missing.
- Dealing with the Problem of CybercrimeAli Alkaabi, George M. Mohay, Adrian McCullagh, Nicholas Chantler. 1-18 [doi]
- Software Piracy Forensics: The Need for Further Developing AFCS. Santhosh Baboo, P. Vinod Bhattathiripad. 19-26 [doi]
- A Simple Cost-Effective Framework for iPhone Forensic AnalysisMohammad Iftekhar Husain, Ibrahim M. Baggili, Ramalingam Sridhar. 27-37 [doi]
- Detecting Intermediary Hosts by TCP Latency MeasurementsGurvinder Singh, Martin Eian, Svein Yngvar Willassen, Stig Fr. MjĂžlsnes. 38-54 [doi]
- Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWirePavel Gladyshev, Afrah Almansoori. 55-64 [doi]
- Towards More Secure Biometric Readers for Effective Digital Forensic InvestigationZouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim M. Baggili, Saad Amin. 65-77 [doi]
- Defining a Standard for Reporting Digital Evidence Items in Computer Forensic ToolsHamda Bariki, Mariam Hashmi, Ibrahim M. Baggili. 78-95 [doi]
- Signature Based Detection of User Events for Post-mortem Forensic AnalysisJoshua James, Pavel Gladyshev, Yuandong Zhu. 96-109 [doi]
- Protecting Digital Evidence Integrity by Using Smart CardsShahzad Saleem, Oliver Popov. 110-119 [doi]
- An Architecture for the Forensic Analysis of Windows System ArtifactsNoor Hashim, Iain Sutherland. 120-128 [doi]
- An IP Traceback Model for Network ForensicsEmmanuel S. Pilli, Ramesh Chandra Joshi, Rajdeep Niyogi. 129-136 [doi]
- Forensic Data CarvingDigambar Povar, V. K. Bhadran. 137-148 [doi]
- Semantic Modelling of Digital Forensic EvidenceDamir Kahvedzic, M. Tahar Kechadi. 149-156 [doi]