Abstract is missing.
- File Fragment Classification-The Case for Specialized ApproachesVassil Roussev, Simson L. Garfinkel. 3-14 [doi]
- Snapshot Filtering Based on Resource-Usage ProfilesFrank Adelstein, Carla Marceau. 15-21 [doi]
- Analysing Access Control SpecificationsChristian W. Probst, René Rydhof Hansen. 22-33 [doi]
- Digital Device & Forensics Concerns in Jails, Prisons and Supervisory EnvironmentsNatalie Armstrong, Michael Losavio, Deborah W. Keeling. 34-35 [doi]
- A Distributed Triage Model for Digital Forensic Services to State and Local Law EnforcementMichael Losavio, Deborah Keeling, Adel Said Elmaghraby. 36-37 [doi]
- Using JavaTM to Design Forensically Resistant ApplicationsCedric J. Jeannot, Ibrahim N. Imam, Adel Said Elmaghraby. 38-41 [doi]
- Two Models of Digital Forensic ExaminationFred Cohen. 42-53 [doi]
- High Assurance Digital Forensics: A Panelist s PerspectiveSteven J. Greenwald. 54-61 [doi]
- A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc NetworksSlim Rekhis, Noureddine Boudriga. 62-72 [doi]
- Automating Disk Forensic Processing with SleuthKit, XML and PythonSimson L. Garfinkel. 73-84 [doi]
- OleDetectionRobert F. Erbacher, Jason Daniels, Steena Dominica Steven Monteiro. 85-96 [doi]
- Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure SecurityJean West, Ulf Lindqvist Peter J. Vasquez, Michael Losavio, Sean Peisert. 97-98 [doi]