Abstract is missing.
- Preface [doi]
- Committees [doi]
- United States v Gorshkov Detailed Forensics and Case Study; Expert Witness PerspectivePhilip Attfield. 3-26 [doi]
- Unifying Computer Forensics Modeling Approaches: A Software Engineering PerspectiveA. Chris Bogen, David A. Dampier. 27-39 [doi]
- Standardizing the Construction of a Digital Forensics LaboratoryPatrick S. Chen, Lawrence M. F. Tsai, Ying-Chieh Chen, George Yee. 40-47 [doi]
- Digital Forensics: Exploring Validation, Verification and CertificationTom Wilsdon, Jill Slay. 48-55 [doi]
- Establishment of the Standard Operating Procedure (SOP) for Gathering Digital EvidenceC. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu. 56-68 [doi]
- How to be a Digital Forensic Expert WitnessStephen C. Schroeder. 69-88 [doi]
- The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet TrafficJacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier. 89-104 [doi]
- SIMbrush: an Open Source Tool for GSM and UMTS Forensics AnalysisFabio Casadei, Antonio Savoldi, Paolo Gubian. 105-119 [doi]
- Comparative Survey of Local Honeypot Sensors to Assist Network ForensicsPei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier. 120-134 [doi]
- Computer Forensics, Information Security and Law: A Case StudyAjantha Herath, Prasantha Samarasinghe, J. Herath, Susantha Herath. 135-141 [doi]
- Legal Requirements for the Use of Keystroke LoggersCharles W. Adams. 142-154 [doi]
- Technical Challenges and Directions for Digital ForensicsGeorge M. Mohay. 155-164 [doi]
- Evidence Handling in Proactive Cyberstalking Investigations: The PAPA ApproachSudhir Aggarwal, Peter Henry, Leo Kermes, Judie Mulholland. 165-176 [doi]
- The Law of Possession of Digital Objects: Dominion and Control Issues for Digital Forensics Investigations and ProsecutionsMichael Martin Losavio. 177-186 [doi]
- Digital Evidence Search KitK. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan. 187-194 [doi]
- Anti-Cyberstalking: The Predator and Prey Alert (PAPA) SystemSudhir Aggarwal, Mike Burmester, Peter Henry, Leo Kermes, Judie Mulholland. 195-205 [doi]
- Challenges of Automating the Detection of Paedophile Activity on the InternetLyta Penna, Andrew Clark, George M. Mohay. 206-222 [doi]
- A DCT Quantization-Based Image Authentication System for Digital ForensicsI-Chuan Chang Bor-Wen Hsu, Chi-Sung Laih. 223-235 [doi]
- Digital evidence collection process in integrity and memory information gatheringSeokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim. 236-247 [doi]
- SecSyslog: an Approach to Secure Logging Based on Covert ChannelsDario V. Forte, Cristiano Maruti, Michele R. Vetturi, Michele Zambelli. 248-263 [doi]
- Detecting Digital Tampering by Blur EstimationDun-Yu Hsiao, Soo-Chang Pei. 264-278 [doi]