Abstract is missing.
- FindEvasion: An Effective Environment-Sensitive Malware Detection System for the CloudXiaoqi Jia, Guangzhe Zhou, Qingjia Huang, Weijuan Zhang, Donghai Tian. 3-17 [doi]
- Real-Time Forensics Through Endpoint VisibilityPeter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl. 18-32 [doi]
- On Locky Ransomware, Al Capone and BrexitJohn Macrae, Virginia N. L. Franqueira. 33-45 [doi]
- Finding and Rating Personal Names on Drives for Forensic NeedsNeil C. Rowe. 49-63 [doi]
- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic ReadinessDominik Ernsberger, R. Adeyemi Ikuesan, Hein S. Venter, Alf Zugenmaier. 64-79 [doi]
- Open Source Forensics for a Multi-platform Drone SystemThomas Edward Allen Barton, M. A. Hannan Bin Azhar. 83-96 [doi]
- A Novel File Carving Algorithm for EVTX LogsMing Xu, Jinkai Sun, Ning Zheng 0001, Tong Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang. 97-105 [doi]
- Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic EvidenceKonstantia Barmpatsalou, Tiago Cruz, Edmundo Monteiro, Paulo Simões 0001. 106-114 [doi]
- Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power SectorAsif Iqbal, Mathias Ekstedt, Hanan Alobaidli. 117-129 [doi]
- A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper GraphJianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu. 130-143 [doi]
- Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter TreesDavid Lillis, Frank Breitinger, Mark Scanlon. 144-157 [doi]
- Approxis: A Fast, Robust, Lightweight and Approximate Disassembler Considered in the Field of Memory ForensicsLorenz Liebler, Harald Baier. 158-172 [doi]
- Memory Forensics and the Macintosh OS X Operating SystemCharles B. Leopard, Neil C. Rowe, Michael R. McCarrin. 175-180 [doi]
- Sketch-Based Modeling and Immersive Display Techniques for Indoor Crime Scene PresentationPu Ren, Mingquan Zhou, Jin Liu, Yachun Fan, Wenshuo Zhao, Wuyang Shui. 181-194 [doi]
- An Overview of the Usage of Default PasswordsBrandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim M. Baggili. 195-203 [doi]
- Automation of MitM Attack on Wi-Fi NetworksMartin Vondrácek, Jan Pluskal, Ondrej Rysavý. 207-220 [doi]
- SeEagle: Semantic-Enhanced Anomaly Detection for Securing EagleWu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu. 221-227 [doi]
- Coriander: A Toolset for Generating Realistic Android Digital Evidence DatasetsIrvin Homem. 228-233 [doi]