Abstract is missing.
- A History of Digital ForensicsMark Pollitt. 3-15 [doi]
- Toward a Science of Digital Forensic Evidence ExaminationFred Cohen. 17-35 [doi]
- An Analysis of the Green Dam Youth Escort SoftwareFrankie Li, Hilton Chan, Kam-Pui Chow, Pierre K. Y. Lai. 49-62 [doi]
- Forensic Analysis of a PlayStation 3 ConsoleScott Conrad, Greg Dorn, Philip Craiger. 65-76 [doi]
- A Consistency Study of the Windows RegistryYuandong Zhu, Joshua James, Pavel Gladyshev. 77-90 [doi]
- Forensic Tracking and Mobility Prediction in Vehicular NetworksSaif Al-Kuwari, Stephen D. Wolthusen. 91-105 [doi]
- A Forensic Readiness Model for Wireless NetworksSipho Ngobeni, Hein S. Venter, Ivan Burke. 107-117 [doi]
- Evaluation of Evidence in Internet Auction Fraud InvestigationsMichael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Jantje A. M. Silomon, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai. 121-132 [doi]
- Detecting Ponzi and Pyramid Business Schemes in Choreographed Web ServicesMurat Gunestas, Murad Mehmet, Duminda Wijesekera. 133-150 [doi]
- Identifying First Seeders in Foxy Peer-to-Peer NetworksRicci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law. 151-168 [doi]
- Uncertainty in Live ForensicsAntonio Savoldi, Paolo Gubian, Isao Echizen. 171-184 [doi]
- Identifying Volatile Data from Multiple Memory Dumps in Live ForensicsFrank Y. W. Law, Patrick Chan, Siu-Ming Yiu, Benjamin Tang, Pierre K. Y. Lai, Kam-Pui Chow, Ricci S. C. Ieong, Michael Y. K. Kwan, Wing-Kai Hon, Lucas Chi Kwong Hui. 185-194 [doi]
- A Compiled Memory Analysis ToolJames S. Okolica, Gilbert L. Peterson. 195-204 [doi]
- Data Fingerprinting with Similarity DigestsVassil Roussev. 207-226 [doi]
- Refining Evidence Containers for Provenance and Accurate Data RepresentationBradley Schatz, Michael Cohen. 227-242 [doi]
- Virtual Expansion of Rainbow TablesVrizlynn L. L. Thing. 243-256 [doi]
- Digital Watermarking of Virtual Machine ImagesKumiko Tadano, Masahiro Kawato, Ryo Furukawa, Fumio Machida, Yoshiharu Maeno. 257-268 [doi]
- A Visualization System for Analyzing Information LeakageYuki Nakayama, Seiji Shibaguchi, Ken-ichi Okada. 269-282 [doi]
- Forensic Analysis of Popular Chinese Internet ApplicationsYing Yang, Kam-Pui Chow, Lucas Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen. 285-295 [doi]
- Data Recovery Function Testing for Digital Forensic ToolsYinghua Guo, Jill Slay. 297-311 [doi]