Abstract is missing.
- Detecting Data Leakage from Pod Slurping Based Attacks on a Windows XP PlatformTheodoros Kavallaris, Vasilios Katos. 1-8 [doi]
- A fast scheme for recovery of deleted files with evidential recording for digital forensicsKenan Kalajdzic, Ahmed Patel. 9-19 [doi]
- A Simulation of Logical Traffic Isolation Using Differentiated ServicesInnocentia Zamaswazi Dlamini, Martin Olivier, Marthie Grobler. 20-32 [doi]
- Real-world Detection of Polymorphic AttacksMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. 33-41 [doi]
- Towards Requirements for a Case Preparation Support System Based on Digital EvidenceMaximilian Bielecki, Gerald Quirchmayr. 42-52 [doi]
- Processing Algorithms for Components within a Forensic Evidence Management SystemKweku Kwakye Arthur, Martin S. Olivier. 53-62 [doi]
- Diversity Networks in Digital InvestigationsPeter M. Bednar, Vasilios Katos. 63-71 [doi]
- Modelling Live Forensic AcquisitionMarthie Lessing, Basie von Solms. 72-80 [doi]
- Social Network Visualization for Forensic Investigation of E-mailJohn Haggerty, David J. Lamb, Mark John Taylor. 81-92 [doi]
- XBRL-Trail --- A model for introducing digital forensic readiness to XBRLDirk Kotze, Martin S. Olivier. 93-104 [doi]
- Data Hiding in the SWF Format and Spreading through Social Network ServicesAlexandros Zaharis, Adamantini Martini, Christos Ilioudis. 105-114 [doi]
- Reverse-Wipe Data on a Storage MediumGrigorios Fragkos. 115-119 [doi]