Abstract is missing.
- The Role of Perception in Age EstimationCynthia A. Murphy. 1-16 [doi]
- Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service ProvidersKathryn C. Seigfried-Spellar, Gary R. Bertoline, Marcus K. Rogers. 17-32 [doi]
- Law Enforcement 2.0: Regulating the Lawful Interception of Social MediaEsti Peshin. 33-35 [doi]
- All Bot Net: A Need for Smartphone P2P AwarenessKelly A. Cole, Ramindu L. Silva, Richard P. Mislan. 36-46 [doi]
- Results of Field Testing Mobile Phone Shielding DevicesEric Katz, Richard Mislan, Marcus Rogers, Anthony Smith. 47-61 [doi]
- Windows Phone 7 from a Digital Forensics' PerspectiveThomas Schaefer, Hans Höfken, Marko Schuba. 62-76 [doi]
- An Agent Based Tool for Windows Mobile ForensicsS. Satheesh Kumar, Bibin Thomas, K. L. Thomas. 77-88 [doi]
- Forensic Extractions of Data from the Nokia N900Mark Lohrum. 89-103 [doi]
- A Strategy for Testing Metadata Based Deleted File Recovery ToolsJames R. Lyle. 104-114 [doi]
- Finding Anomalous and Suspicious Files from Directory Metadata on a Large CorpusNeil C. Rowe, Simson L. Garfinkel. 115-130 [doi]
- A Novel Methodology for Malware Intrusion Attack Path ReconstructionAhmed F. Shosha, Joshua James, Pavel Gladyshev. 131-140 [doi]
- Performance Issues About Context-Triggered Piecewise HashingFrank Breitinger, Harald Baier. 141-155 [doi]
- Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database EnvironmentSean S. E. Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert B. France. 156-171 [doi]
- Yahoo! Messenger Forensics on Windows Vista and Windows 7Matthew Levendoski, Tejashree Datar, Marcus Rogers. 172-179 [doi]
- Robust Hashing for Efficient Forensic Analysis of Image SetsMartin Steinebach. 180-187 [doi]
- Tracking User Activity on Personal ComputersAnthony Keane, Stephen O'Shaughnessy. 188-196 [doi]
- The Forensic Value of the Windows 7 Jump ListAlexander G. Barnett. 197-210 [doi]
- Finding Forensic Information on Creating a Folder in $LogFile of NTFSGyu-Sang Cho, Marcus K. Rogers. 211-225 [doi]
- Rescuing Digital Data from Submerged HDDToshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida. 226-237 [doi]
- Evaluating the Forensic Image Generator GeneratorChristian Moch, Felix C. Freiling. 238-252 [doi]
- Forensic Extractions of Data from the Nokia N900Mark Lohrum. 253-267 [doi]
- A Forensic Framework for Incident Analysis Applied to the Insider ThreatClive Blackwell. 268-281 [doi]
- Reasoning About a Simulated Printer Case Investigation with Forensic LucidSerguei A. Mokhov, Joey Paquet, Mourad Debbabi. 282-296 [doi]