Abstract is missing.
- Fonts for ForensicsFred Cohen. 3-12 [doi]
- Steganography and Visual Cryptography in Computer ForensicsGeorge Abboud, Jeffrey S. Marean, Roman V. Yampolskiy. 25-32 [doi]
- Formal Digital Investigation of Anti-forensic AttacksSlim Rekhis, Noureddine Boudriga. 33-44 [doi]
- A Platform Independent Process Model for Smartphones Based on InvariantsF. Chevonne Thomas Dancer, David A. Dampier. 56-60 [doi]
- Assessment of Virtualization as a Sensor TechniqueJulia Narvaez, Chiraag Uday Aval, Barbara Endicott-Popovsky, Christian Seifert, Ashish Malviya, Doug Nordwall. 61-65 [doi]
- Methods of Information Hiding and Detection in File SystemsJeremy Davis, Joe MacLean, David Dampier. 66-69 [doi]
- Knowledge Sharing and Reuse in Digital ForensicsJingshan Huang, Alec Yasinsac, Patrick J. Hayes. 73-78 [doi]
- Digital Records Forensics: Ensuring Authenticity and Trustworthiness of Evidence Over TimeAdam Jansen. 84-88 [doi]
- Applying Digital Forensics in the Future Internet Enterprise Systems - European SME s PerspectiveSyed Naqvi, Gautier Dallons, Christophe Ponsard. 89-93 [doi]
- Global Analysis of Drive File TimesNeil C. Rowe, Simson L. Garfinkel. 97-108 [doi]
- Explorative Visualization of Log Data to Support Forensic Analysis and Signature DevelopmentSebastian Schmerl, Michael Vogel, René Rietz, Hartmut König. 109-118 [doi]
- Security Digital EvidenceJennifer Richter, Nicolai Kuntze, Carsten Rudolph. 119-130 [doi]
- Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National LevelAyaz Khan, Uffe Kock Wiil, Nasrullah Memon. 133-140 [doi]
- Digital System, Evidence & Forensics Issues in Correctional EnvironmentsNatalie Armstrong, Michael Losavio, Deborah Keeling. 141-149 [doi]
- Computer Forensics Investigators or Private Investigators: Who Is Investigating the Drive?Amelia Phillips, Kara L. Nance. 150-157 [doi]