Abstract is missing.
- New Challenges for IT-Security Research in ITC (Keynote)Udo Helmbrecht. 13-14
- Incident Management and Forensics Put in Context (Invited)Jack Cole. 15-16
- Investigations and Prosecution in Cases of Computer Crime (Invited)Fred-Mario Silberbach. 17-26
- Network Infrastructure Forensics (Invited)Felix F. X. Lindner. 27-40
- Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed EnvironmentsThomas Richard McEvoy, Stephen D. Wolthusen. 55-72
- File Type Analysis Using Signal Processing Techniques and Machine Learning vs. File Unix Utility for Forensic AnalysisSerguei A. Mokhov, Mourad Debbabi. 73-86
- Attacking Test and Online Forensics in IPv6 NetworksLiu Wu, Duan Hai-Xin, Lin Tao, Li Xing, Wu Jian-Ping. 87-106
- Live Forensic Acquisition as Alternative to Traditional Forensic ProcessMarthie Lessing. 107-124
- Reconstructing People s Lives: A Case Study in Teaching Forensic ComputingFelix C. Freiling, Thorsten Holz, Martin Mink. 125-142
- Network Flow Security BaseliningTsvetomir Tsvetanov, Stanislav Simeonov. 143-156
- Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering AlgorithmsMeng-Da Wu, Stephen D. Wolthusen. 157-172
- Building a State Tracing Linux KernelChakravarthy Gundabattula, Vinay G. Vaidya. 173-196
- Formally Specifying Operational Semantics and Language Constructs of Forensic LucidSerguei A. Mokhov, Joey Paquet, Mourad Debbabi. 197-216