Abstract is missing.
- When is Digital Evidence Forensically Sound?Rodney McKemmish. 3-15 [doi]
- Applying Traditional Forensic Taxonomy to Digital ForensicsMark Pollitt. 17-26 [doi]
- Recovering Data from Failing Floppy DisksFrederick Cohen, Charles Preston. 29-41 [doi]
- Extracting Evidence Using Google Desktop SearchTimothy Pavlic, Jill Slay, Benjamin Turnbull. 43-50 [doi]
- Evaluation of Registry Data Removal by Shredder ProgramsHarry Velupillai, Pontjho Mokhonoana. 51-58 [doi]
- Using Boot Control to Preserve the Integrity of EvidenceKeisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryoichi Sasaki. 61-74 [doi]
- Hypothesis-Based Investigation of Digital TimestampsSvein Willassen. 75-86 [doi]
- Improving Disk Sector Integrity Using K-Dimension HashingZoe L. Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu. 87-98 [doi]
- Class-Aware Similarity Hashing for Data ClassificationVassil Roussev, Golden G. Richard III, Lodovico Marziale. 101-113 [doi]
- Applying Topic Modeling to Forensic DataAlta de Waal, Jacobus Venter, Etienne Barnard. 115-126 [doi]
- Forensic Analysis of Volatile Instant MessagingMatthew Kiley, Shira Dankner, Marcus Rogers. 129-138 [doi]
- Timely Rootkit Detection During Live ResponseDaniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson. 139-148 [doi]
- Identifying and Analyzing Web Server AttacksChristian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch. 151-161 [doi]
- Forensic Web ServicesMurat Gunestas, Duminda Wijesekera, Anoop Singhal. 163-176 [doi]
- Detecting Remote Exploits Using Data MiningMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu. 177-189 [doi]
- Using Sensor Dirt for Toolmark Analysis of Digital PhotographsMartin S. Olivier. 193-206 [doi]
- A New Feature-Based Method for Source Camera IdentificationFanjie Meng, Xiangwei Kong, Xingang You. 207-218 [doi]
- Data Recovery from Windows CE Based Handheld DevicesAntonio Savoldi, Paolo Gubian. 219-230 [doi]
- Legal Issues Pertaining to the Use of Cell Phone DataCharles Adams, Anthony Whitledge, Sujeet Shenoi. 231-243 [doi]
- Protection and Recovery of Railroad Event Recorder DataMark Hartong, Rajni Goel, Duminda Wijesekera. 247-260 [doi]
- Automobile Event Data Recorder ForensicsNathan Singleton, Jeremy S. Daily, Gavin Manes. 261-272 [doi]
- Reasoning About Evidence Using Bayesian NetworksMichael Kwan, Kam-Pui Chow, Frank Law, Pierre Lai. 275-289 [doi]
- Inferring Sources of Leaks in Document Management SystemsMadhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya. 291-306 [doi]
- Image Background Matching for Identifying SuspectsPaul Fogg, Gilbert L. Peterson, Michael Veth. 307-321 [doi]
- An Evidence Acquisition Tool for Live SystemsRenico Koen, Martin S. Olivier. 325-334 [doi]
- Time Analysis of Hard Drive Imaging ToolsJack Wesley Riley, David A. Dampier, Rayford B. Vaughn. 335-344 [doi]
- Fusion of Steganalysis Systems Using Bayesian Model AveragingBenjamin Rodriguez, Gilbert L. Peterson, Kenneth Bauer. 345-355 [doi]
- A Virtual Digital Forensics LaboratoryPhilip Craiger, Paul Burke, Christopher Marberry, Mark Pollitt. 357-365 [doi]