Abstract is missing.
- Robust Copy-Move Forgery Detection Based on Dual-TransformMunkhbaatar Doyoddorj, Kyung Hyune Rhee. 3-16 [doi]
- Forensic Decryption of FAT BitLocker VolumesP. Shabana Subair, C. Balan, S. Dija, K. L. Thomas. 17-29 [doi]
- Forensic Artifacts of the flareGet Download ManagerPrachi Goel, Babu M. Mehtre. 30-38 [doi]
- Amazon Kindle Fire HD ForensicsAsif Iqbal 0003, Hanan Al Obaidli, Andrew Marrington, Ibrahim M. Baggili. 39-50 [doi]
- Resurrection: A Carver for Fragmented FilesMartin Lambertz, Rafael Uetz, Elmar Gerhards-Padilla. 51-66 [doi]
- Taxonomy of Data Fragment Classification TechniquesRainer Poisel, Marlies Rybnicek, Simon Tjoa. 67-85 [doi]
- Identifying Forensically Uninteresting Files Using a Large CorpusNeil C. Rowe. 86-101 [doi]
- FaceHash: Face Detection and Robust HashingMartin Steinebach, Huajian Liu, York Yannikos. 102-115 [doi]
- Regulating Social Network Services for Lawful InterceptionEsti Peshin. 119-129 [doi]
- Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A SynopsisMurdoch Watney. 130-143 [doi]
- Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital InvestigationsJoshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyhsev. 147-169 [doi]
- Towards a Process Model for Hash Functions in Digital ForensicsFrank Breitinger, Huajian Liu, Christian Winter 0001, Harald Baier, Alexey Rybalchenko, Martin Steinebach. 170-186 [doi]
- An Automated Link Analysis Solution Applied to Digital Forensic InvestigationsFergal Brennan, Martins Udris, Pavel Gladyshev. 189-206 [doi]
- Computer Profiling for Preliminary Forensic ExaminationAndrew Marrington, Farkhund Iqbal, Ibrahim M. Baggili. 207-220 [doi]
- Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDEJoshua I. James, Ahmed F. Shosha, Pavel Gladyshev. 223-236 [doi]
- Cloud Forensic Readiness: FoundationsLucia De Marco, M. Tahar Kechadi, Filomena Ferrucci. 237-244 [doi]
- Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics ModesDeepak Gupta, Babu M. Mehtre. 247-251 [doi]