Abstract is missing.
- A Novel Skin Tone Detection Algorithm for Contraband Image AnalysisAbhishek Choudhury, Marcus K. Rogers, William Blair Gillam, Keith Watson. 3-9  [doi]
 - Combining Physical and Digital Evidence in Vehicle EnvironmentsDennis K. Nilsson, Ulf Larson. 10-14  [doi]
 - Towards the Virtual Memory Space Reconstruction for Windows Live Forensic PurposesAntonio Savoldi, Paolo Gubian. 15-22  [doi]
 - Cognitive-Maps Based Investigation of Digital Security IncidentsSlim Rekhis, Jihène Krichène, Noureddine Boudriga. 25-40  [doi]
 - SÃDI - Statistical Analysis for Data Type IdentificationSarah J. Moody, Robert F. Erbacher. 41-54  [doi]
 - Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog ModelSteena Dominica Steven Monteiro, Robert F. Erbacher. 57-68  [doi]
 - Finding the Evidence in Tamper-Evident LogsDaniel Sandler, Kyle Derr, Scott A. Crosby, Dan S. Wallach. 69-75  [doi]
 - Implications of Attorney Experiences with Digital Forensics and Electronic Evidence in the United StatesMichael Losavio, Deborah W. Keeling, Adel Elmaghraby, George Higgins, John Shutt. 79-90  [doi]
 - Protecting Digital Legal Professional Privilege (LPP) DataFrank Y. W. Law, Pierre K. Y. Lai, Zoe L. Jiang, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, C. F. Chong. 91-101  [doi]
 - Computer Forensics in ForensisSean Peisert, Matt Bishop, Keith Marzullo. 102-122  [doi]
 - Legal Issues Pertaining to the Development of Digital Forensic ToolsCharles W. Adams. 123-132  [doi]
 - Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband MaterialOlfa Nasraoui, Deborah W. Keeling, Adel Elmaghraby, George Higgins, Michael Losavio. 135-140  [doi]
 - A Research Configuration for a Digital Network Forensic LabJeffrey S. Marean, Mike Losavio, Ibrahim N. Imam. 141-142  [doi]
 - Network Forensics: Network Data and State Seizures in the United StatesMichael Losavio, Deborah W. Keeling, Adel Elmaghraby, George Higgins, John Shutt. 143  [doi]
 - Multidimensional Correlation of Software Source CodeRobert Zeidman. 144-156  [doi]