Abstract is missing.
- On a Scientific Theory of Digital ForensicsMartin Olivier. 3-24 [doi]
- Data Privacy Perceptions About Digital Forensic Investigations in IndiaRobin Verma, Jayaprakash Govindaraj, Gaurav Gupta. 25-45 [doi]
- A Framework for Assessing the Core Capabilities of a Digital Forensic OrganizationAhmed Almarzooqi, Andrew Jones. 47-65 [doi]
- Optimizing Short Message Text Sentiment Analysis for Mobile Device ForensicsOluwapelumi Aboluwarin, Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas. 69-87 [doi]
- Impact of User Data Privacy Management Controls on Mobile Device InvestigationsPanagiotis Andriotis, Theo Tryfonas. 89-105 [doi]
- Analyzing Mobile Device Ads to Identify UsersJayaprakash Govindaraj, Robin Verma, Gaurav Gupta. 107-126 [doi]
- A Forensic Methodology for Analyzing Nintendo 3DS DevicesHuw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos, Mikhaila Burgess. 127-143 [doi]
- Reconstructing Interactions with Rich Internet Applications from HTTP TracesSara Baghbanzadeh, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Seyed M. Mirtaheri, Muhammad Faheem 0002, Iosif-Viorel Onut. 147-164 [doi]
- Reconstructing Tabbed Browser Sessions Using Metadata AssociationsSriram Raghavan, S. V. Raghavan. 165-188 [doi]
- A Probabilistic Network Forensic Model for Evidence AnalysisChangwei Liu, Anoop Singhal, Duminda Wijesekera. 189-210 [doi]
- API-Based Forensic Acquisition of Cloud DrivesVassil Roussev, Andres Barreto, Irfan Ahmed. 213-235 [doi]
- The Cloud Storage Ecosystem - A New Business Model for Internet Piracy?Raymond Chan, Kam-Pui Chow, Vivien P. S. Chan, Michael Y. K. Kwan. 237-255 [doi]
- Windows 8.x Facebook and Twitter Metro App ArtifactsSwasti Bhushan Deb. 259-279 [doi]
- Profiling Flash Mob Organizers in Web Discussion ForumsVivien P. S. Chan, Kam-Pui Chow, Raymond Chan. 281-293 [doi]
- Enhancing Image Forgery Detection Using 2-D Cross ProductsSongpon Teerakanok, Tetsutaro Uehara. 297-310 [doi]
- Forensic Authentication of Bank ChecksRajesh Kumar, Gaurav Gupta. 311-322 [doi]
- Data Type Classification: Hierarchical Class-to-Type ModelingNicole Beebe, Lishu Liu, Minghe Sun. 325-343 [doi]
- Secure File Deletion for Solid State DrivesBhupendra Singh, Ravi Saharan, Gaurav Somani, Gaurav Gupta. 345-362 [doi]
- A Tool for Volatile Memory Acquisition from Android DevicesHaiyu Yang, Jianwei Zhuge, Huiming Liu, Wei Liu. 365-378 [doi]
- Advanced Automated Disk Investigation ToolkitUmit Karabiyik, Sudhir Aggarwal. 379-396 [doi]