Abstract is missing.
- A Tale of Two Traces - Diplomatics and ForensicsFred Cohen. 3-27 [doi]
- Notions of Hypothesis in Digital ForensicsSegen Tewelde, Stefan Gruner, Martin Olivier. 29-43 [doi]
- Using Yin's Approach to Case Studies as a Paradigm for Conducting ExaminationsOluwasayo Oyelami, Martin Olivier. 45-59 [doi]
- An Information Extraction Framework for Digital Forensic InvestigationsMin Yang, Kam-Pui Chow. 61-76 [doi]
- A Graph-Based Investigation of Bitcoin TransactionsChen Zhao, Yong Guan. 79-95 [doi]
- Profiling and Tracking a Cyberlocker Link Sharer in a Public Web ForumXiao-Xi Fan, Kam-Pui Chow, Fei Xu. 97-113 [doi]
- A Privacy-Preserving Encryption Scheme for an Internet Realname Registration SystemFei Xu, Ken Yau, Ping Zhang, Kam-Pui Chow. 115-128 [doi]
- A Logic-Based Network Forensic Model for Evidence AnalysisChangwei Liu, Anoop Singhal, Duminda Wijesekera. 129-145 [doi]
- Characteristics of Malicious DLLs in Windows MemoryDae Glendowne, Cody Miller, Wesley McGrew, David A. Dampier. 149-161 [doi]
- Determining Trigger Involvement During Forensic Attribution in DatabasesWerner K. Hauger, Martin S. Olivier. 163-177 [doi]
- Using Internal MySQL/InnoDB B-Tree Index Navigation for Data HidingPeter Fruüwirt, Peter Kieseberg, Edgar R. Weippl. 179-194 [doi]
- Identifying Passwords Stored on DiskShiva Houshmand, Sudhir Aggarwal, Umit Karabiyik. 195-213 [doi]
- Fragmented JPEG File Recovery Using Pseudo HeadersYanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Jun-bin Fang, Xiamu Niu, Qi Han, Xianyan Wu. 215-231 [doi]
- Forensic-Ready Secure iOS Apps for Jailbroken iPhonesJayaprakash Govindaraj, Rashmi Mata, Robin Verma, Gaurav Gupta. 235-249 [doi]
- A Framework for Describing Multimedia Circulation in a Smartphone EcosystemPanagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Irwin King. 251-267 [doi]
- A Trustworthy Cloud Forensics EnvironmentShams Zawoad, Ragib Hasan. 271-285 [doi]
- Locating and Tracking Digital Objects in the CloudPhilip M. Trenwith, Hein S. Venter. 287-301 [doi]
- A Tool for Extracting Static and Volatile Forensic Artifacts of Windows 8.x AppsShariq Murtuza, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta. 305-320 [doi]
- Criteria for Validating Secure Wiping ToolsMuhammad Sharjeel Zareen, Baber Aslam, Monis Akhlaq. 321-339 [doi]
- Do Data Loss Prevention Systems Really Work?Sara Ghorbanian, Glenn Fryklund, Stefan Axelsson. 341-357 [doi]