default search action
Digital Investigation, Volume 6
Volume 6, Numbers 1-2, September 2009
- Eoghan Casey:
Digital forensics: Coming of age. 1-2
- Andy Jones:
Lessons not learned on data disposal. 3-7 - Yuandong Zhu, Joshua James, Pavel Gladyshev:
A comparative methodology for the reconstruction of digital events using windows restore points. 8-15 - Jungheum Park, Sangjin Lee:
Forensic investigation of Microsoft PowerPoint files. 16-24 - Rachel Zax, Frank Adelstein:
FAUST: Forensic artifacts of uninstalled steganography tools. 25-38 - Bruce J. Nikkel:
Forensic analysis of GPT disks and GUID partition tables. 39-47 - Wiger van Houten, Zeno J. M. H. Geradts:
Source video camera identification for multiply compressed videos originating from YouTube. 48-60 - David Byers, Nahid Shahmehri:
A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1. 61-70 - Lei Pan, Lynn Margaret Batten:
Robust performance testing for digital forensic tools. 71-81 - A. D. Irons, P. Stephens, R. Ian Ferguson:
Digital Investigation as a distinct discipline: A pedagogic perspective. 82-90
- Peter F. R. Forster:
Photoshop CS3 for forensics professionals. 91
Volume 6, Number Supplement, September 2009
- Simson L. Garfinkel, Paul F. Farrell Jr., Vassil Roussev, George W. Dinolt:
Bringing science to digital forensics with standardized forensic corpora. S2-S11 - Yinghua Guo, Jill Slay, Jason Beckett:
Validation and verification of computer forensic software tools - Searching Function. S12-S22 - Damir Kahvedzic, M. Tahar Kechadi:
DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge. S23-S33 - Daniel Ayers:
A second generation computer forensic analysis system. S34-S42 - Kathryn Watkins, Mike McWhorte, Jeff Long, Bill Hill:
Teleporter: An analytically and forensically sound duplicate transfer system. S43-S47 - Brian Neil Levine, Marc Liberatore:
DEX: Digital evidence provenance supporting reproducibility and comparison. S48-S56 - Michael Cohen, Simson L. Garfinkel, Bradley L. Schatz:
Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. S57-S68 - Yuandong Zhu, Pavel Gladyshev, Joshua James:
Using shellbag information to reconstruct user activities. S69-S77 - Jens Olsson, Martin Boldt:
Computer forensic timeline visualization tool. S78-S87 - Husrev T. Sencar, Nasir D. Memon:
Identification and recovery of JPEG files with missing fragments. S88-S98 - Nicole Lang Beebe, Sonia D. Stacy, Dane Stuckey:
Digital forensic implications of ZFS. S99-S107 - Kibom Kim, Sangseo Park, Taejoo Chang, Cheolwon Lee, Sungjai Baek:
Lessons learned from the construction of a Korean software reference data set for digital forensics. S108-S113 - Vrizlynn L. L. Thing, Hwei-Ming Ying:
A novel time-memory trade-off method for password recovery. S114-S120 - Seyed Mahmood Hejazi, Chamseddine Talhi, Mourad Debbabi:
Extraction of forensically sensitive information from windows physical memory. S121-S131 - Carsten Maartmann-Moe, Steffen E. Thorkildsen, André Årnes:
The persistence of memory: Forensic identification and extraction of cryptographic keys. S132-S140
Volume 6, Numbers 3-4, May 2010
- Eoghan Casey:
Digital dust: Evidence in every nook and cranny. 93-94
- Joseph R. Rabaiotti, Christopher James Hargreaves:
Using a software exploit to image RAM on an embedded system. 95-103 - Konstantinos Xynos, Simon Harries, Iain Sutherland, Gareth Davies, Andrew Blyth:
Xbox 360: A digital forensic investigation of the hard disk drive. 104-111 - Richard P. Mislan, Eoghan Casey, Gary C. Kessler:
The growing need for on-scene triage of mobile devices. 112-124 - Ivo Pooters:
Full user data acquisition from Symbian smart phones. 125-135 - Eoghan Casey, Michael Bann, John Doyle:
Introduction to Windows Mobile Forensics. 136-146 - C. Klaver:
Windows Mobile advanced forensics. 147-167 - Kevin Jonkers:
The forensic use of mobile phone flasher boxes. 168-178 - Onno van Eijk, Mark Roeloffs:
Forensic acquisition and analysis of the Random Access Memory of TomTom GPS navigation systems. 179-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.