Abstract is missing.
- Case Study on South Africa and Namibia: A Model for Electronic Evidence for the SADC RegionAmelia Phillips. 1-6 [doi]
- Technical Issues of Forensic Investigations in Cloud Computing EnvironmentsDominik Birk, Christoph Wegener. 1-10 [doi]
- Fuzzy Trace Validation: Toward an Offline Forensic Tracking FrameworkSaif Al-Kuwari, Stephen D. Wolthusen. 1-4 [doi]
- Protecting Digital Data Privacy in Computer Forensic ExaminationFrank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Kam-Pui Chow, Michael Y. K. Kwan, Hayson Tse, Pierre K. Y. Lai. 1-6 [doi]
- Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs ComprehensivenessNan Zhang 0004, Yong Guan, Michael Martin Losavio, Peter J. Vasquez, Robert M. Nissen, Edward B. Talbot, Vassil Roussev. 1-3 [doi]
- Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-AnalysisMichael Martin Losavio, Musa Hindi, Roman V. Yampolskiy, Deborah Wilson Keeling. 1-6 [doi]
- Building Open and Scalable Digital Forensic ToolsVassil Roussev. 1-6 [doi]
- Host Identification via USB FingerprintingLara Letaw, Joe Pletcher, Kevin R. B. Butler. 1-9 [doi]
- A Dual Cube Hashing Scheme for Solving LPP Integrity ProblemJun-bin Fang, Zoe L. Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu. 1-7 [doi]
- Firmware-assisted Memory Acquisition and Analysis tools for Digital ForensicsJiang Wang, Fengwei Zhang, Kun Sun, Angelos Stavrou. 1-5 [doi]
- Computer Forensics And Electronic Evidence - Failure of Competent Computer Forensic Analysis And Other Computer-Related Acts As Ineffective Assistance Of CounselMichael Martin Losavio, Deborah Wilson Keeling. 1-6 [doi]
- Characterizing Data Structures for Volatile ForensicsEllick Chan, Shivaram Venkataraman, Nadia Tkach, Kevin Larson, Alejandro Gutierrez, Roy H. Campbell. 1-9 [doi]
- Secure Digital Chains of EvidenceNicolai Kuntze, Carsten Rudolph. 1-8 [doi]
- Preparing for the Next Wikileaks: Making Forensics Techniques WorkRobert F. Erbacher. 1-8 [doi]