Abstract is missing.
- Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary AnalysisKeyun Ruan, Joe Carthy. 1-21 [doi]
- Cloud Forensic Maturity ModelKeyun Ruan, Joe Carthy. 22-41 [doi]
- Identifying Remnants of Evidence in the CloudJeremy Koppen, Gerald Gent, Kevin Bryan, Lisa Cingiser DiPippo, Jillian Kramer, Marquita Moreland, Victor Fay Wolfe. 42-57 [doi]
- On Improving Authorship Attribution of Source CodeMatthew F. Tennyson. 58-65 [doi]
- Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation PurposesAhmed F. Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu, Pavel Gladyshev. 66-80 [doi]
- Measuring the Preference of Image Content for Self-reported Consumers of Child PornographyKathryn C. Seigfried-Spellar. 81-90 [doi]
- Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory StudyIbrahim M. Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi. 91-108 [doi]
- When Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law?Litska Strikwerda. 109-143 [doi]
- Research Trends in Digital Forensic Science: An Empirical Analysis of Published ResearchIbrahim M. Baggili, Afrah BaAbdallah, Deena Al-Safi, Andrew Marrington. 144-157 [doi]
- Face Recognition Based on Wavelet Transform and Adaptive Local Binary PatternAbdallah A. Mohamed, Roman V. Yampolskiy. 158-166 [doi]
- Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2Frank Breitinger, Harald Baier. 167-182 [doi]
- Investigating File Encrypted Material Using NTFS $logfileNiall McGrath, Pavel Gladyshev. 183-203 [doi]
- Finding Data in DNA: Computer Forensic Investigations of Living OrganismsMarc Beck, Eric C. Rouchka, Roman V. Yampolskiy. 204-219 [doi]
- On the Completeness of Reconstructed Data for Database ForensicsOluwasola Mary Adedayo, Martin S. Olivier. 220-238 [doi]
- BlackBerry PlayBook Backup Forensic AnalysisMohamed Al Marzougy, Ibrahim M. Baggili, Andrew Marrington. 239-252 [doi]
- ANTS ROAD: A New Tool for SQLite Data Recovery on Android DevicesLamine M. Aouad, M. Tahar Kechadi, Roberto Di Russo. 253-263 [doi]
- Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative AnalysisShahzad Saleem, Oliver Popov, Oheneba Kwame Appiah-Kubi. 264-282 [doi]
- Detection of Masqueraded Wireless Access Using 802.11 MAC Layer FingerprintsChrister Idland, Thomas Jelle, Stig F. MjĂžlsnes. 283-301 [doi]
- BREDOLAB: Shopping in the Cybercrime UnderworldDaan de Graaf, Ahmed F. Shosha, Pavel Gladyshev. 302-313 [doi]
- A Review and Comparative Study of Digital Forensic Investigation ModelsKwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 314-327 [doi]