The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG11.9 Publications - Digital Forensics (ifip11-9)
2007 (conf/ifip11-9/2007)


  1. Calibration Testing Of Network Tap Devices. [Citation Graph (, )][DBLP]


  2. On the Legality of Analyzing Telephone Call Records. [Citation Graph (, )][DBLP]


  3. Survey of Law Enforcement Perceptions Regarding Digital Evidence. [Citation Graph (, )][DBLP]


  4. Insider Threat Analysis Using Information-Centric Modeling. [Citation Graph (, )][DBLP]


  5. An Integrated System for Insider Threat Detection. [Citation Graph (, )][DBLP]


  6. Analysis of Tools for Detecting Rootkits and Hidden Processes. [Citation Graph (, )][DBLP]


  7. A Method for Detecting Linux Kernel Module Rootkits. [Citation Graph (, )][DBLP]


  8. Future Trends in Authorship Attribution. [Citation Graph (, )][DBLP]


  9. The Keyboard Dilemma and Authorship Identification. [Citation Graph (, )][DBLP]


  10. Factors Affecting One-Way Hashing of CD-R Media. [Citation Graph (, )][DBLP]


  11. Disk Drive I/O Commands and Write Blocking. [Citation Graph (, )][DBLP]


  12. A New Process Model for Text String Searching. [Citation Graph (, )][DBLP]


  13. Detecting Steganography Using Multi-Class Classification. [Citation Graph (, )][DBLP]


  14. Redacting Digital Information from Electronic Devices. [Citation Graph (, )][DBLP]


  15. In-Place File Carving. [Citation Graph (, )][DBLP]


  16. File System Journal Forensics. [Citation Graph (, )][DBLP]


  17. Using Search Engines to Acquire Network Forensic Evidence. [Citation Graph (, )][DBLP]


  18. A Framework for Investigating Railroad Accidents. [Citation Graph (, )][DBLP]


  19. Forensic Analysis of Xbox Consoles. [Citation Graph (, )][DBLP]


  20. Super-Resolution Video Analysis for Forensic Investigations. [Citation Graph (, )][DBLP]


  21. Specializing CRISP-DM for Evidence Mining. [Citation Graph (, )][DBLP]


  22. Applying The Biba Integrity Model to Evidence Management. [Citation Graph (, )][DBLP]


  23. Investigating Computer Attacks Using Attack Trees. [Citation Graph (, )][DBLP]


  24. Attack Patterns: A New Forensic and Design Tool. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002