The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG11.9 Publications - Digital Forensics (ifip11-9)
2006 (conf/ifip11-9/2006)


  1. Some Challenges in Digital Forensics. [Citation Graph (, )][DBLP]


  2. AFF: An Open Extensible Format for Disk Imaging. [Citation Graph (, )][DBLP]


  3. File System Support for Digital Evidence Bags. [Citation Graph (, )][DBLP]


  4. Remote Upload of Evidence over Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  5. Applying Machine Trust Models to Forensic Investigations. [Citation Graph (, )][DBLP]


  6. Exploring Big Haystacks: Data Mining and Knowledge Management. [Citation Graph (, )][DBLP]


  7. Countering Hostile Forensic Techniques. [Citation Graph (, )][DBLP]


  8. Using PLSI-U to Detect Insider Threats from Email Traffic. [Citation Graph (, )][DBLP]


  9. Collusion Detection Using Multimedia Fingerprints. [Citation Graph (, )][DBLP]


  10. Authorship Attribution for Electronic Documents. [Citation Graph (, )][DBLP]


  11. Linking Individuals to Digital Information. [Citation Graph (, )][DBLP]


  12. Use-Misuse Case Driven Analysis of Positive Train Control. [Citation Graph (, )][DBLP]


  13. Mac OS X Forensics. [Citation Graph (, )][DBLP]


  14. Detecting Data Concealment Programs Using File System Analysis. [Citation Graph (, )][DBLP]


  15. Assessing Trace Evidence Left by Secure Deletion Programs. [Citation Graph (, )][DBLP]


  16. On the Reliability of Network Eavesdropping Tools. [Citation Graph (, )][DBLP]


  17. Active Traffic Capture for Network Forensics. [Citation Graph (, )][DBLP]


  18. Logical Traffic Isolation Using Differentiated Services. [Citation Graph (, )][DBLP]


  19. Passive Detection of NAT Routers and Client Counting. [Citation Graph (, )][DBLP]


  20. Analysis of Web Proxy Logs. [Citation Graph (, )][DBLP]


  21. GSM Cell Site Forensics. [Citation Graph (, )][DBLP]


  22. An Architecture for SCADA Network Forensics. [Citation Graph (, )][DBLP]


  23. Identifying Digital Cameras Using CFA Interpolation. [Citation Graph (, )][DBLP]


  24. Forensic Analysis of BIOS Chips. [Citation Graph (, )][DBLP]


  25. A Training Tool for Internet Crimes Against Children Cases. [Citation Graph (, )][DBLP]


  26. Process Flow Diagrams for Training and Operations. [Citation Graph (, )][DBLP]


  27. A Control Framework for Digital Forensics. [Citation Graph (, )][DBLP]


  28. Criminal Regulation of Anti-Forensic Tools in Japan. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002