Abstract is missing.
- Conditional Weighted Transaction Aggregation for Credit Card Fraud DetectionWee-Yong Lim, Amit Sachan, Vrizlynn L. L. Thing. 3-16 [doi]
- Using Fraud Trees to Analyze Internet Credit Card FraudClive Blackwell. 17-29 [doi]
- Automated Analysis of Underground MarketplacesAleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar R. Weippl. 31-42 [doi]
- An Exploratory Profiling Study of Online Auction FraudstersVivien P. S. Chan, Kam-Pui Chow, Michael Y. K. Kwan, Guy Fong, Michael Hui, Jemy Tang. 43-56 [doi]
- Web User Profiling Based on Browsing Behavior AnalysisXiao-Xi Fan, Kam-Pui Chow, Fei Xu. 57-71 [doi]
- Validation Rules for Enhanced Foxy P2P Network InvestigationsRicci S. C. Ieong, Kam-Pui Chow. 73-83 [doi]
- Windows Event Forensic ProcessQuang Do, Ben Martini, Jonathan Looi, Yu Wang, Kim-Kwang Raymond Choo. 87-100 [doi]
- Schema Reconstruction in Database ForensicsOluwasola Mary Adedayo, Martin S. Olivier. 101-116 [doi]
- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data CorpusCarolina Zarate, Simson Garfinkel, Aubin Heffernan, Scott Horras, Kyle Gorak. 117-132 [doi]
- Similarity Hashing Based on Levenshtein DistancesFrank Breitinger, Georg Ziroff, Steffen Lange, Harald Baier. 133-147 [doi]
- Using Approximate Matching to Reduce the Volume of Digital DataFrank Breitinger, Christian Winter, York Yannikos, Tobias Fink, Michael Seefried. 149-163 [doi]
- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision FusionAriel Stolerman, Alex Fridman, Rachel Greenstadt, Patrick Brennan, Patrick Juola. 165-183 [doi]
- Breaking the Closed-World Assumption in Stylometric Authorship AttributionAriel Stolerman, Rebekah Overdorf, Sadia Afroz, Rachel Greenstadt. 185-205 [doi]
- Preserving Dates and Timestamps for Incident Handling in Android SmartphonesRobin Verma, Jayaprakash Govindaraj, Gaurav Gupta. 209-225 [doi]
- An Open Source Toolkit for iOS Filesystem ForensicsAhmad Raza Cheema, Mian Muhammad Waseem Iqbal, Waqas Ali. 227-235 [doi]
- Smartphones as Distributed Witnesses for Digital ForensicsHeloise Pieterse, Martin Olivier. 237-251 [doi]
- Smartphone Message Sentiment AnalysisPanagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas. 253-265 [doi]
- Forensic Analysis of the TomTom Navigation ApplicationNhien-An Le-Khac, Mark Roeloffs, Tahar Kechadi. 267-276 [doi]
- Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage ToolIbrahim M. Baggili, Andrew Marrington, Yasser Jafar. 279-295 [doi]
- Towards Fully Automated Digital Alibis with Social InteractionStefanie Beyer, Martin Mulazzani, Sebastian Schrittwieser, Markus Huber, Edgar Weippl. 297-307 [doi]
- Data Corpora for Digital Forensics Education and ResearchYork Yannikos, Lukas Graner, Martin Steinebach, Christian Winter. 309-325 [doi]
- Educating the Next Generation of Cyberforensic ProfessionalsMark Pollitt, Philip Craiger. 327-335 [doi]