{"title":"BlackBerry PlayBook Backup Forensic Analysis","authors":"Mohamed Al Marzougy, I. Baggili, A. Marrington","doi":"10.1007/978-3-642-39891-9_15","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_15","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132320366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Data in DNA: Computer Forensic Investigations of Living Organisms","authors":"Marc Beck, E. Rouchka, Roman V Yampolskiy","doi":"10.1007/978-3-642-39891-9_13","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_13","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123404530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the Preference of Image Content for Self-reported Consumers of Child Pornography","authors":"Kathryn C. Seigfried-Spellar","doi":"10.1007/978-3-642-39891-9_6","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125780248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating File Encrypted Material Using NTFS $logfile","authors":"N. McGrath, P. Gladyshev","doi":"10.1007/978-3-642-39891-9_12","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132730786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed F. Shosha, Joshua James, Alan Hannaway, Chen-Ching Liu, P. Gladyshev
{"title":"Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes","authors":"Ahmed F. Shosha, Joshua James, Alan Hannaway, Chen-Ching Liu, P. Gladyshev","doi":"10.1007/978-3-642-39891-9_5","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_5","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115354704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Completeness of Reconstructed Data for Database Forensics","authors":"O. M. Adedayo, M. Olivier","doi":"10.1007/978-3-642-39891-9_14","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_14","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review and Comparative Study of Digital Forensic Investigation Models","authors":"Kwaku Kyei, P. Zavarsky, Dale Lindskog, Ron Ruhl","doi":"10.1007/978-3-642-39891-9_20","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_20","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130021274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lamine M. Aouad, Mohand Tahar Kechadi, Roberto Di Russo
{"title":"ANTS ROAD: A New Tool for SQLite Data Recovery on Android Devices","authors":"Lamine M. Aouad, Mohand Tahar Kechadi, Roberto Di Russo","doi":"10.1007/978-3-642-39891-9_16","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_16","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints","authors":"Christer Idland, Thomas Jelle, S. F. Mjølsnes","doi":"10.1007/978-3-642-39891-9_18","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_18","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis","authors":"S. Saleem, O. Popov, Ohene Appiah-Kubi","doi":"10.1007/978-3-642-39891-9_17","DOIUrl":"https://doi.org/10.1007/978-3-642-39891-9_17","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}