Abstract is missing.
- The State of the Science of Digital Evidence ExaminationFrederick Cohen, Julie Lowrie, Charles Preston. 3-21 [doi]
- An Investigative Framework for Incident AnalysisClive Blackwell. 23-34 [doi]
- Cloud ForensicsKeyun Ruan, Joe Carthy, M. Tahar Kechadi, Mark Crosbie. 35-46 [doi]
- Searching Massive Data Streams Using Multipattern Regular ExpressionsJon Stewart, Joel Uckelman. 49-63 [doi]
- Fast Content-Based File Type IdentificationIrfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong. 65-75 [doi]
- Case-Based Reasoning in Live ForensicsBruno W. P. Hoelz, Célia Ghedini Ralha, Frederico Mesquita. 77-88 [doi]
- Assembling Metadata for Database ForensicsHector Beyers, Martin S. Olivier, Gerhard P. Hancke. 89-99 [doi]
- Forensic Leak Detection for Business Process ModelsRafael Accorsi, Claus Wonnemann. 101-113 [doi]
- Analyzing Stylometric Approaches to Author ObfuscationPatrick Juola, Darren Vescovi. 115-125 [doi]
- Detecting Fraud Using Modified Benford AnalysisChristian Winter, Markus Schneider 0002, York Yannikos. 129-141 [doi]
- Detecting Collusive Fraud in Enterprise Resource Planning SystemsAsadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel. 143-153 [doi]
- Analysis of Back-Doored Phishing KitsHeather McCalley, Brad Wardman, Gary Warner. 155-168 [doi]
- Identifying Malware Using Cross-Evidence CorrelationAnders Flaglien, Katrin Franke, André Årnes. 169-182 [doi]
- Detecting Mobile Spam Botnets Using Artificial immune SystemsIckin Vural, Hein S. Venter. 183-192 [doi]
- An FPGA System for Detecting Malicious DNS Network TrafficBrennon Thomas, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills. 195-207 [doi]
- Router and Interface Marking for Network ForensicsEmmanuel S. Pilli, Ramesh Chandra Joshi, Rajdeep Niyogi. 209-220 [doi]
- Extracting Evidence Related to VoIP CallsDavid Irwin, Jill Slay. 221-228 [doi]
- Sensitivity Analysis of Bayesian Networks Used in Forensic InvestigationsMichael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai. 231-243 [doi]
- Steganographic Techniques for Hiding Data in SWF FilesMark-Anthony Fouche, Martin S. Olivier. 245-255 [doi]
- Evaluating Digital Forensic Options for the Apple iPadAndrew Hay, Dennis Krill, Benjamin Kuhar, Gilbert L. Peterson. 257-273 [doi]
- Forensic Analysis of Plug ComputersScott Conrad, Greg Dorn, Philip Craiger. 275-287 [doi]