Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, A. Rybalchenko, M. Steinebach
{"title":"Towards a Process Model for Hash Functions in Digital Forensics","authors":"Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, A. Rybalchenko, M. Steinebach","doi":"10.1007/978-3-319-14289-0_12","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis","authors":"M. Watney","doi":"10.1007/978-3-319-14289-0_10","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_10","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121037544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic Artifacts of the flareGet Download Manager","authors":"Prachi Goel, B. Mehtre","doi":"10.1007/978-3-319-14289-0_3","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_3","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FaceHash: Face Detection and Robust Hashing","authors":"M. Steinebach, Huajian Liu, York Yannikos","doi":"10.1007/978-3-319-14289-0_8","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_8","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taxonomy of Data Fragment Classification Techniques","authors":"R. Poisel, Marlies Rybnicek, S. Tjoa","doi":"10.1007/978-3-319-14289-0_6","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes","authors":"D. Gupta, B. Mehtre","doi":"10.1007/978-3-319-14289-0_17","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_17","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asif Iqbal, Hanan Al Obaidli, A. Marrington, I. Baggili
{"title":"Amazon Kindle Fire HD Forensics","authors":"Asif Iqbal, Hanan Al Obaidli, A. Marrington, I. Baggili","doi":"10.1007/978-3-319-14289-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic Decryption of FAT BitLocker Volumes","authors":"P. S. Subair, C. Balan, S. Dija, K. L. Thomas","doi":"10.1007/978-3-319-14289-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-14289-0_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Improving Authorship Attribution of Source Code","authors":"Matthew F. Tennyson","doi":"10.1007/978-3-642-39891-9_4","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern","authors":"Abdallah A. Mohamed, Roman V Yampolskiy","doi":"10.1007/978-3-642-39891-9_10","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_10","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}