Abstract is missing.
- Some Challenges in Digital ForensicsEugene H. Spafford. 1-9
- AFF: An Open Extensible Format for Disk ImagingSimson L. Garfinkel, David J. Malan, Karl-Alexander Dubec, Christopher C. Stevens, Cecile Pham. 13-27
- File System Support for Digital Evidence BagsGolden G. Richard III, Vassil Roussev. 29-40
- Remote Upload of Evidence over Mobile Ad Hoc NetworksIndrajit Ray. 41-54
- Applying Machine Trust Models to Forensic InvestigationsMarika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier. 55-65
- Exploring Big Haystacks: Data Mining and Knowledge ManagementMark Pollitt, Anthony Whitledge. 67-76
- Countering Hostile Forensic TechniquesScott Piper, Mark Davis, Sujeet Shenoi. 79-90
- Using PLSI-U to Detect Insider Threats from Email TrafficJames S. Okolica, Gilbert L. Peterson, Robert F. Mills. 91-103
- Collusion Detection Using Multimedia FingerprintsAnthony G. Persaud, Yong Guan. 105-118
- Authorship Attribution for Electronic DocumentsPatrick Juola. 119-130
- Linking Individuals to Digital InformationShelly Seier, David Greer, Gavin Manes. 131-140
- Use-Misuse Case Driven Analysis of Positive Train ControlMark Hartong, Rajni Goel, Duminda Wijesekera. 141-155
- Mac OS X ForensicsPhilip Craiger, Paul Burke. 159-170
- Detecting Data Concealment Programs Using File System AnalysisMark Davis, Richard Kennedy, Kristina Pyles, Amanda Strickler, Sujeet Shenoi. 171-183
- Assessing Trace Evidence Left by Secure Deletion ProgramsPaul Burke, Philip Craiger. 185-195
- On the Reliability of Network Eavesdropping ToolsEric Cronin, Micah Sherr, Matt Blaze. 199-213
- Active Traffic Capture for Network ForensicsMarco Slaviero, Anna Granova, Martin S. Olivier. 215-228
- Logical Traffic Isolation Using Differentiated ServicesTinus Strauss, Martin S. Olivier, Derrick G. Kourie. 229-237
- Passive Detection of NAT Routers and Client CountingKenneth Straka, Gavin Manes. 239-246
- Analysis of Web Proxy LogsBennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter. 247-258
- GSM Cell Site ForensicsChristopher Swenson, Tyler Moore, Sujeet Shenoi. 259-272
- An Architecture for SCADA Network ForensicsTim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi. 273-285
- Identifying Digital Cameras Using CFA InterpolationSevinc Bayram, Husrev T. Sencar, Nasir D. Memon. 289-299
- Forensic Analysis of BIOS ChipsPavel Gershteyn, Mark Davis, Sujeet Shenoi. 301-314
- A Training Tool for Internet Crimes Against Children CasesSudhir Aggarwal, Bob Breeden, Peter Henry, Judie Mulholland. 317-330
- Process Flow Diagrams for Training and OperationsJacobus Venter. 331-342
- A Control Framework for Digital ForensicsSebastiaan H. von Solms, C. P. Louwrens, Colette Reekie, Talania Grobler. 343-355
- Criminal Regulation of Anti-Forensic Tools in JapanTetsuya Ishii. 357-364