Abstract is missing.
- Dealing with Terabyte Datasets in Digital InvestigationsNicole Beebe, Jan Guynes Clark. 3-16
- Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in FlocksMartin S. Olivier. 17-31
- A Network-Based Architecture for Storing Digital EvidenceMark Davis, Gavin Manes, Sujeet Shenoi. 33-42
- Digital Forensics: Meeting the Challenges of Scientific EvidenceMatthew Meyers, Marcus K. Rogers. 43-50
- Non-Technical Manipulation of Digital Data - Legal, Ethical and Social IssuesMichael Losavio. 51-63
- Detecting Social EngineeringMichael D. Hoeschele, Marcus K. Rogers. 67-77
- A Framework for Email Investigation - Automated Information Extraction and Linkage DiscoveryAnthony G. Persaud, Yong Guan. 79-90
- The Mitnick Case: How Bayes Could Have HelpedThomas Duval, Bernard Jouga, Laurent Roger. 91-104
- Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming AssessmentRut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter. 105-112
- Exploring Forensic Data with Self-Organizing MapsBennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier. 113-123
- Integrating Digital Forensics in Network InfrastructuresKulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon. 127-140
- Using Peer-to-Peer Technology for Network ForensicsScott Redding. 141-152
- Forensic Profiling SystemPallavi Kahai, Mannivannan Srinivasan, Kameswara Rao Namuduri. 153-164
- Global Internet Routing Forensics: Validation of BGP Paths Using ICMP TracebackEunjong Kim, Daniel Massey, Indrajit Ray. 165-176
- Using Signaling Information in Telecom Network ForensicsTyler Moore, Anthony Meehan 0002, Gavin Manes, Sujeet Shenoi. 177-188
- Forensic Analysis of Mobile Phone Internal MemorySvein Willassen. 191-204
- Imaging and Analysis of GSM SIM CardsChristopher Swenson, Gavin Manes, Sujeet Shenoi. 205-216
- Extracting Concealed Data from BIOS ChipsPavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi. 217-230
- Recovering Digital Evidence from Linux SystemsPhilip Craiger. 233-244
- Detecting Hidden Data in Ext2/Ext3 File SystemsScott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi. 245-256
- Forensic Analysis of Digital Image TamperingGilbert L. Peterson. 259-270
- Content-Based Image Retrieval for Digital ForensicsYixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao. 271-282
- Making Decisions about Legal Responses to Cyber AttacksLeisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael. 283-294
- Applying Filter Clusters to Reduce Search State SpaceJill Slay, Kris Jorgensen. 295-301
- In-Kernel Cryptographic Executable VerificationYusuf Motara, Barry Irwin. 303-313