Abstract is missing.
- Measuring Evidential Weight in Digital Forensic InvestigationsRichard E. Overill, Kam-Pui Chow. 3-10 [doi]
- Challenges, Opportunities and a Framework for Web Environment ForensicsMike Mabey, Adam Doupé, Ziming Zhao 0001, Gail-Joon Ahn. 11-33 [doi]
- Internet of Things Forensics - Challenges and a Case StudySaad Alabdulsalam, Kevin Schaefer, M. Tahar Kechadi, Nhien-An Le-Khac. 35-48 [doi]
- Recovery of Forensic Artifacts from Deleted Jump ListsBhupendra Singh, Upasna Singh, Pankaj Sharma, Rajender Nath. 51-65 [doi]
- Obtaining Precision-Recall Trade-Offs in Fuzzy Searches of Large Email CorporaKyle Porter, Slobodan Petrovic. 67-85 [doi]
- Anti-Forensic Capacity and Detection Rating of Hidden Data in the Ext4 FilesystemThomas Göbel, Harald Baier. 87-110 [doi]
- Detecting Data Leakage from Hard Copy DocumentsJijnasa Nayak, Shweta Singh, Saheb Chhabra, Gaurav Gupta, Monika Gupta, Garima Gupta. 111-124 [doi]
- Information-Entropy-Based DNS Tunnel PredictionIrvin Homem, Panagiotis Papapetrou, Spyridon Dosis. 127-140 [doi]
- Collecting Network Evidence Using Constrained Approximate Search AlgorithmsAmbika Shrestha Chitrakar, Slobodan Petrovic. 141-160 [doi]
- Traffic Classification and Application Identification in Network ForensicsJan Pluskal, Ondrej Lichtner, Ondrej Rysavý. 161-181 [doi]
- Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network TrafficErwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac. 183-197 [doi]
- Hashing Incomplete and Unordered Network StreamsChao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang. 199-224 [doi]
- A Network Forensic Scheme Using Correntropy-Variation for Attack DetectionNour Moustafa, Jill Slay. 225-239 [doi]
- A Taxonomy of Cloud Endpoint Forensic ToolsAnand Kumar Mishra, Emmanuel S. Pilli, Mahesh Chandra Govil. 243-261 [doi]
- A Layered Graphical Model for Cloud Forensic Mission Attack Impact AnalysisChangwei Liu, Anoop Singhal, Duminda Wijesekera. 263-289 [doi]
- Forensic Analysis of Android Steganography AppsWenhao Chen, Yangxiao Wang, Yong Guan, Jennifer Newman, Li Lin, Stephanie Reinders. 293-312 [doi]
- Automated Vulnerability Detection in Embedded DevicesDanjun Liu, Yong Tang, Baosheng Wang, Wei Xie, Bo Yu 0008. 313-329 [doi]
- A Forensic Logging System for Siemens Programmable Logic ControllersKen Yau, Kam-Pui Chow, Siu-Ming Yiu. 331-349 [doi]
- Enhancing the Security and Forensic Capabilities of Programmable Logic ControllersChun-Fai Chan, Kam-Pui Chow, Siu-Ming Yiu, Ken Yau. 351-367 [doi]