Conferences in DBLP
Nicole Beebe , Jan Guynes Clark Dealing with Terabyte Datasets in Digital Investigations. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:3-16 [Conf ] Martin S. Olivier Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:17-31 [Conf ] Mark Davis , Gavin Manes , Sujeet Shenoi A Network-Based Architecture for Storing Digital Evidence. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:33-42 [Conf ] Matthew Meyers , Marcus K. Rogers Digital Forensics: Meeting the Challenges of Scientific Evidence. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:43-50 [Conf ] Michael Losavio Non-Technical Manipulation of Digital Data - Legal, Ethical and Social Issues. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:51-63 [Conf ] Michael Hoeschele , Marcus K. Rogers Detecting Social Engineering. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:67-77 [Conf ] Anthony Persaud , Yong Guan A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:79-90 [Conf ] Thomas Duval , Bernard Jouga , Laurent Roger The Mitnick Case: How Bayes Could Have Helped. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:91-104 [Conf ] Rut Laubscher , Cobus Rabe , Martin S. Olivier , Jan H. P. Eloff , H. S. Venter Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf ] Bennie Fei , Jan H. P. Eloff , H. S. Venter , Martin S. Olivier Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf ] Kulesh Shanmugasundaram , Hervé Brönnimann , Nasir D. Memon Integrating Digital Forensics in Network Infrastructures. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:127-140 [Conf ] Scott Redding Using Peer-to-Peer Technology for Network Forensics. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:141-152 [Conf ] Pallavi Kahai , Mannivannan Srinivasan , Kameswara Rao Namuduri Forensic Profiling System. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:153-164 [Conf ] Eunjong Kim , Daniel Massey , Indrajit Ray Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:165-176 [Conf ] Tyler Moore , Anthony Meehan 0002 , Gavin Manes , Sujeet Shenoi Using Signaling Information in Telecom Network Forensics. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:177-188 [Conf ] Svein Willassen Forensic Analysis of Mobile Phone Internal Memory. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:191-204 [Conf ] Christopher Swenson , Gavin Manes , Sujeet Shenoi Imaging and Analysis of GSM SIM Cards. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:205-216 [Conf ] Pavel Gershteyn , Mark Davis , Gavin Manes , Sujeet Shenoi Extracting Concealed Data from BIOS Chips. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:217-230 [Conf ] Philip Craiger Recovering Digital Evidence from Linux Systems. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:233-244 [Conf ] Scott Piper , Mark Davis , Gavin Manes , Sujeet Shenoi Detecting Hidden Data in Ext2/Ext3 File Systems. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:245-256 [Conf ] Gilbert L. Peterson Forensic Analysis of Digital Image Tampering. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:259-270 [Conf ] Yixin Chen , Vassil Roussev , Golden G. Richard III , Yun Gao Content-Based Image Retrieval for Digital Forensics. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:271-282 [Conf ] Leisheng Peng , Thomas C. Wingfield , Duminda Wijesekera , Emily Frye , Randall Jackson , James Bret Michael Making Decisions about Legal Responses to Cyber Attacks. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:283-294 [Conf ] Jill Slay , Kris Jorgensen Applying Filter Clusters to Reduce Search State Space. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:295-301 [Conf ] Yusuf Motara , Barry Irwin In-Kernel Cryptographic Executable Verification. [Citation Graph (0, 0)][DBLP ] IFIP Int. Conf. Digital Forensics, 2005, pp:303-313 [Conf ]