The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG11.9 Publications - Digital Forensics (ifip11-9)
2008 (conf/ifip11-9/2008)


  1. When is Digital Evidence Forensically Sound? [Citation Graph (, )][DBLP]


  2. Applying Traditional Forensic Taxonomy to Digital Forensics. [Citation Graph (, )][DBLP]


  3. Recovering Data from Failing Floppy Disks. [Citation Graph (, )][DBLP]


  4. Extracting Evidence Using Google Desktop Search. [Citation Graph (, )][DBLP]


  5. Evaluation of Registry Data Removal by Shredder Programs. [Citation Graph (, )][DBLP]


  6. Using Boot Control to Preserve the Integrity of Evidence. [Citation Graph (, )][DBLP]


  7. Hypothesis-Based Investigation of Digital Timestamps. [Citation Graph (, )][DBLP]


  8. Improving Disk Sector Integrity Using K-Dimension Hashing. [Citation Graph (, )][DBLP]


  9. Class-Aware Similarity Hashing for Data Classification. [Citation Graph (, )][DBLP]


  10. Applying Topic Modeling to Forensic Data. [Citation Graph (, )][DBLP]


  11. Forensic Analysis of Volatile Instant Messaging. [Citation Graph (, )][DBLP]


  12. Timely Rootkit Detection During Live Response. [Citation Graph (, )][DBLP]


  13. Identifying and Analyzing Web Server Attacks. [Citation Graph (, )][DBLP]


  14. Forensic Web Services. [Citation Graph (, )][DBLP]


  15. Detecting Remote Exploits Using Data Mining. [Citation Graph (, )][DBLP]


  16. Using Sensor Dirt for Toolmark Analysis of Digital Photographs. [Citation Graph (, )][DBLP]


  17. A New Feature-Based Method for Source Camera Identification. [Citation Graph (, )][DBLP]


  18. Data Recovery from Windows CE Based Handheld Devices. [Citation Graph (, )][DBLP]


  19. Legal Issues Pertaining to the Use of Cell Phone Data. [Citation Graph (, )][DBLP]


  20. Protection and Recovery of Railroad Event Recorder Data. [Citation Graph (, )][DBLP]


  21. Automobile Event Data Recorder Forensics. [Citation Graph (, )][DBLP]


  22. Reasoning About Evidence Using Bayesian Networks. [Citation Graph (, )][DBLP]


  23. Inferring Sources of Leaks in Document Management Systems. [Citation Graph (, )][DBLP]


  24. Image Background Matching for Identifying Suspects. [Citation Graph (, )][DBLP]


  25. An Evidence Acquisition Tool for Live Systems. [Citation Graph (, )][DBLP]


  26. Time Analysis of Hard Drive Imaging Tools. [Citation Graph (, )][DBLP]


  27. Fusion of Steganalysis Systems Using Bayesian Model Averaging. [Citation Graph (, )][DBLP]


  28. A Virtual Digital Forensics Laboratory. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002