Abstract is missing.
- Windows NT pagefile.sys Virtual Memory AnalysisMichael Gruhn. 3-18 [doi]
- Recovery of SQLite Data Using Expired IndexesFelix Ramisch, Martin Rieger. 19-25 [doi]
- Improving the Detection of Encrypted Data on Storage DevicesSimon Thurner, Marcel Grun, Sven Schmitt, Harald Baier. 26-39 [doi]
- What is Essential Data in Digital Forensic Analysis?Felix C. Freiling, Michael Gruhn. 40-48 [doi]
- Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?Sven Ossenbuhl, Jessica Steinberger, Harald Baier. 51-67 [doi]
- Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack ScenariosChristof Kier, Gerald Madlmayr, Alexander Nawratil, Michael Schafferer, Christian Schanes, Thomas Grechenig. 68-76 [doi]
- Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic ComputingAndreas Dewald. 77-82 [doi]
- Supporting Forensic Design - A Course Profile to Teach ForensicsStefan Kiltz, Jana Dittmann, Claus Vielhauer. 85-95 [doi]
- Conception of a Master Course for IT and Media Forensics Part II: Android ForensicsKnut Bellin, Reiner Creutzburg. 96-105 [doi]
- Platform Independent Malware Analysis FrameworkUlf Losche, Maik Morgenstern, Hendrik Pilz. 109-113 [doi]
- Smart Home Definition and Security ThreatsMichael Schiefer. 114-118 [doi]
- Latent Fingerprint Aging from a Hyperspectral Perspective: First Qualitative Degradation Studies Using UV/VIS SpectroscopyRonny Merkel. 121-135 [doi]