Sean S. E. Thorpe, I. Ray, I. Ray, Tyrone Grandison, A. Barbir, R. France
{"title":"Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment","authors":"Sean S. E. Thorpe, I. Ray, I. Ray, Tyrone Grandison, A. Barbir, R. France","doi":"10.1007/978-3-642-35515-8_13","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_13","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rescuing Digital Data from Submerged HDD","authors":"T. Yasuhira, Kazuhiro Nishimura, Tomofumi Koida","doi":"10.1007/978-3-642-35515-8_19","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_19","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132985449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tracking User Activity on Personal Computers","authors":"Anthony Keane, S. O’Shaughnessy","doi":"10.1007/978-3-642-35515-8_16","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_16","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Forensic Image Generator Generator","authors":"Christian Moch, F. Freiling","doi":"10.1007/978-3-642-35515-8_20","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_20","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121786270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"All Bot Net: A Need for Smartphone P2P Awareness","authors":"K. Cole, R. L. Silva, Richard P. Mislan","doi":"10.1007/978-3-642-35515-8_4","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_4","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116516170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Methodology for Malware Intrusion Attack Path Reconstruction","authors":"Ahmed F. Shosha, Joshua James, P. Gladyshev","doi":"10.1007/978-3-642-35515-8_11","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_11","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Issues About Context-Triggered Piecewise Hashing","authors":"Frank Breitinger, Harald Baier","doi":"10.1007/978-3-642-35515-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_12","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Windows Phone 7 from a Digital Forensics' Perspective","authors":"Thomas Schaefer, Hans Höfken, Marko Schuba","doi":"10.1007/978-3-642-35515-8_6","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_6","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123284634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kathryn C. Seigfried-Spellar, G. Bertoline, M. Rogers
{"title":"Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers","authors":"Kathryn C. Seigfried-Spellar, G. Bertoline, M. Rogers","doi":"10.1007/978-3-642-35515-8_2","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_2","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Forensic Information on Creating a Folder in $LogFile of NTFS","authors":"Gyusang Cho, M. Rogers","doi":"10.1007/978-3-642-35515-8_18","DOIUrl":"https://doi.org/10.1007/978-3-642-35515-8_18","url":null,"abstract":"","PeriodicalId":156487,"journal":{"name":"International ICST Conference on Digital Forensics & Cyber Crime","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}