Abstract is missing.
- Forewarned is Forearmed: Indicators for Evaluating Information Security Incident ManagementKarin Bernsmed, Inger Anne Tøndel. 3-14 [doi]
- Identifying a Shared Mental Model Among Incident RespondersRobert Floodeen, John Haller, Brett C. Tjaden. 15-25 [doi]
- A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power IndustryMaria B. Line. 26-32 [doi]
- mvHash-B - A New Approach for Similarity Preserving HashingFrank Breitinger, Knut Petter Astebol, Harald Baier, Christoph Busch. 33-44 [doi]
- Selective Imaging RevisitedJohannes Stüttgen, Andreas Dewald, Felix C. Freiling. 45-58 [doi]
- Developing a Cloud Computing Based Approach for Forensic Analysis Using OCRMatthias Trojahn, Lei Pan, Fabian Schmidt. 59-68 [doi]
- On Bayesian Trust and Risk Forecasting for Compound SystemsStefan Rass, Sebastian Kurowski. 69-82 [doi]
- Anti-forensics: The Next Step in Digital Forensics Tool TestingMartin Wundram, Felix C. Freiling, Christian Moch. 83-97 [doi]
- Forensic Application-Fingerprinting Based on File System MetadataSven Kalber, Andreas Dewald, Felix C. Freiling. 98-112 [doi]
- Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer ApplicationRobert Altschaffel, Robert Clausing, Christian Kraetzer, Tobias Hoppe, Stefan Kiltz, Jana Dittmann. 113-121 [doi]
- Visualizing Indicators of Rootkit Infections in Memory ForensicsStefan Vömel, Hermann Lenz. 122-139 [doi]