Abstract is missing.
- Digital Forensics as a Surreal NarrativeMark Pollitt. 3-15 [doi]
- Digital Forensic Research: The Good, the Bad and the UnaddressedNicole Beebe. 17-36 [doi]
- Towards a Formalization of Digital ForensicsJill Slay, Yi-Chi Lin, Benjamin Turnbull, Jason Beckett, Paul Lin. 37-47 [doi]
- Bulk Email ForensicsFred Cohen. 51-67 [doi]
- Analyzing the Impact of a Virtual Machine on a Host MachineGreg Dorn, Christopher Marberry, Scott Conrad, Philip Craiger. 69-81 [doi]
- Temporal Analysis of Windows MRU Registry KeysYuandong Zhu, Pavel Gladyshev, Joshua James. 83-93 [doi]
- Using DCT Features for Printing Technique and Copy DetectionChristian Schulze, Marco Schreyer, Armin Stahl, Thomas M. Breuel. 95-106 [doi]
- Source Camera Identification Using Support Vector MachinesBo Wang, Xiangwei Kong, Xingang You. 107-118 [doi]
- Forensic Analysis of the Sony Playstation PortableScott Conrad, Carlos Rodriguez, Christopher Marberry, Philip Craiger. 119-129 [doi]
- Implementing Boot Control for Windows VistaYuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsutaro Uehara, Ryoichi Sasaki. 133-141 [doi]
- A Forensic Framework for Handling Information Privacy IncidentsKamil Reddy, Hein S. Venter. 143-155 [doi]
- Tracking Contraband Files Transmitted Using BittorrentKarl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills. 159-173 [doi]
- A Model for Foxy Peer-to-Peer Network InvestigationsRicci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Kenneth Tse. 175-186 [doi]
- Detecting Fraud in Internet Auction SystemsYanlin Peng, Linfeng Zhang, Yong Guan. 187-198 [doi]
- A Cloud Computing Platform for Large-Scale Forensic ComputingVassil Roussev, Liqiang Wang, Golden G. Richard III, Lodovico Marziale. 201-214 [doi]
- Password Cracking Using Sony PlaystationsHugo Kleinhans, Jonathan Butts, Sujeet Shenoi. 215-227 [doi]
- A Cost-Effective Model for Digital Forensic InvestigationsRichard E. Overill, Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law. 231-240 [doi]
- Analysis of the Digital Evidence Presented in the Yahoo! CaseMichael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law, Hayson Tse. 241-252 [doi]
- Assessing the Legal Risks in Network Forensic ProbingMichael Losavio, Olfa Nasraoui, Vincent Thacker, Jeffrey S. Marean, Nick Miles, Roman V. Yampolskiy, Ibrahim N. Imam. 255-266 [doi]
- A Survey of the Legal Issues Facing Digital Forensic ExpertsSydney Liles, Marcus Rogers, Marianne Hoebich. 267-276 [doi]
- An Extended Model for E-Discovery OperationsDavid Billard. 277-287 [doi]
- Concept Mapping for Digital Forensic InvestigationsApril Tanner, David Dampier. 291-300 [doi]
- System Support for Forensic InferenceAshish Gehani, Florent Kirchner, Natarajan Shankar. 301-316 [doi]