Volume 3,
Number 1,
March 2006
Volume 3,
Number 2,
June 2006
Editorial
Book reviews
Volume 3,
Number 3,
September 2006
Volume 3,
Supplement 1,
2006
The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06)
- Frank Adelstein:
The proceedings of the Sixth Annual Digital Forensic Research Workshop (DFRWS '06).
1-2
Electronic Edition (link) BibTeX
- James R. Lyle:
A strategy for testing hardware write block devices.
3-9
Electronic Edition (link) BibTeX
- Andreas Schuster:
Searching for processes and threads in Microsoft Windows memory dumps.
10-16
Electronic Edition (link) BibTeX
- Nitin Khanna, Aravind K. Mikkilineni, Anthony F. Martone, Gazi N. Ali, George T.-C. Chiu, Jan P. Allebach, Edward J. Delp:
A survey of forensic characterization methods for physical devices.
17-28
Electronic Edition (link) BibTeX
- Ricci S. C. Ieong:
FORZA - Digital forensics investigation framework that incorporate legal issues.
29-36
Electronic Edition (link) BibTeX
- Ashley Brinson, Abigail Robinson, Marcus Rogers:
A cyber forensics ontology: Creating a new approach to studying cyber forensics.
37-43
Electronic Edition (link) BibTeX
- Ryan Harris:
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem.
44-49
Electronic Edition (link) BibTeX
- Wouter Alink, R. A. F. Bhoedjang, Peter A. Boncz, Arjen P. de Vries:
XIRAF - XML-based indexing and querying for digital forensics.
50-58
Electronic Edition (link) BibTeX
- Philip Turner:
Selective and intelligent imaging using digital evidence bags.
59-64
Electronic Edition (link) BibTeX
- Sangwon Lee, David A. Shamma, Bruce Gooch:
Detecting false captioning using common-sense reasoning.
65-70
Electronic Edition (link) BibTeX
- Simson L. Garfinkel:
Forensic feature extraction and cross-drive analysis.
71-81
Electronic Edition (link) BibTeX
- Vassil Roussev, Yixin Chen, Timothy Bourg, Golden G. Richard III:
md5bloom: Forensic filesystem hashing revisited.
82-90
Electronic Edition (link) BibTeX
- Jesse D. Kornblum:
Identifying almost identical files using context triggered piecewise hashing.
91-97
Electronic Edition (link) BibTeX
- Bradley Schatz, George M. Mohay, Andrew Clark:
A correlation method for establishing provenance of timestamps in digital evidence.
98-107
Electronic Edition (link) BibTeX
- Sundararaman Jeyaraman, Mikhail J. Atallah:
An empirical study of automatic event reconstruction systems.
108-115
Electronic Edition (link) BibTeX
- Marcus K. Rogers, Kate Seigfried, Kirti Tidke:
Self-reported computer criminal behavior: A psychological analysis.
116-120
Electronic Edition (link) BibTeX
- Brian D. Carrier, Eugene H. Spafford:
Categories of digital investigation analysis techniques based on the computer history model.
121-130
Electronic Edition (link) BibTeX
Volume 3,
Number 4,
December 2006
Book Reviews
- Peter Sommer:
Thomas Porter, editor, Practical VOIP Security, Syngress Publishing Inc., ISBN 1597490601.
244
Electronic Edition (link) BibTeX
- Peter Sommer:
Edward Wilding, Information Risk and Security, Gower Publishing, ISBN 0-566-08685-9.
244-245
Electronic Edition (link) BibTeX
- Nena Lim:
J. Anastasi, The new forensics: investigating corporate fraud and the theft of intellectual property, John Wiley & Sons, New Jersey (2003).
245-246
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:56:36 2009
by Michael Ley (ley@uni-trier.de)