Abstract is missing.
- History, Historiography and the Hermeneutics of the Hard DriveMark Pollitt. 3-17 [doi]
- Protecting Third Party Privacy in Digital Forensic InvestigationsWynand van Staden. 19-31 [doi]
- On the Scientific Maturity of Digital Forensics ResearchMartin Olivier, Stefan Gruner. 33-49 [doi]
- Cognitive Approaches for Digital Forensic Readiness PlanningAntonio Pooe, Les Labuschagne. 53-66 [doi]
- A Harmonized Process Model for Digital Forensic Investigation ReadinessAleksandar Valjarevic, Hein S. Venter. 67-82 [doi]
- Evaluation of the Semi-automated Crime-Specific Digital Triage Process ModelGary Cantrell, David A. Dampier. 83-98 [doi]
- Reducing the Time Required for Hashing OperationsFrank Breitinger, Kaloyan Petrov. 101-117 [doi]
- Hash-Based File Content Identification Using Distributed SystemsYork Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi. 119-134 [doi]
- Creating Super Timelines in Windows InvestigationsStephen Esposito, Gilbert Peterson. 135-144 [doi]
- Log File Analysis with Context-Free GrammarsGregory Bosman, Stefan Gruner. 145-152 [doi]
- Using a Goal-Driven Approach in the Investigation of a Questioned ContractClive Blackwell, Shareeful Islam, Benjamin Aziz. 153-167 [doi]
- File Fragment Analysis Using Normalized Compression DistanceStefan Axelsson, Kamran Ali Bajwa, Mandhapati Venkata Srikanth. 171-182 [doi]
- Quantifying Windows File Slack Size and StabilityMartin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar Weippl. 183-193 [doi]
- Automating Video File Carving and Content IdentificationYork Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter. 195-212 [doi]
- Data Recovery from Proprietary Formatted Cctv Hard DisksAswami Ariffin, Jill Slay, Kim-Kwang Raymond Choo. 213-223 [doi]
- Creating Integrated Evidence Graphs for Network ForensicsChangwei Liu, Anoop Singhal, Duminda Wijesekera. 227-241 [doi]
- A Generic Bayesian Belief Model for Similar Cyber CrimesHayson Tse, Kam-Pui Chow, Michael Y. K. Kwan. 243-255 [doi]
- An Empirical Study Profiling Internet PiratesPierre K. Y. Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien P. S. Chan. 257-272 [doi]
- Real-Time Covert Timing Channel Detection in Networked Virtual EnvironmentsAnyi Liu, Jim X. Chen, Harry Wechsler. 273-288 [doi]
- Impact of Cloud Computing on Digital Forensic InvestigationsStephen O'Shaughnessy, Anthony Keane. 291-303 [doi]
- Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud EnvironmentsIrfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III, Vassil Roussev. 305-328 [doi]
- Comparison of the Data Recovery Function of Forensic ToolsJoe Buchanan-Wollaston, Tim Storer, William Bradley Glisson. 331-347 [doi]
- Security Analysis and Decryption of Filevault 2Omar Choudary, Felix Gröbert, Joachim Metz. 349-363 [doi]
- Detecting Counterfeit Currency and Identifying Its SourceAnkit Sarkar, Robin Verma, Gaurav Gupta. 367-384 [doi]
- Towards Active Linguistic AuthenticationPatrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt. 385-398 [doi]