The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG11.9 Publications - Digital Forensics (ifip11-9)
2005 (conf/ifip11-9/2005)

  1. Nicole Beebe, Jan Guynes Clark
    Dealing with Terabyte Datasets in Digital Investigations. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:3-16 [Conf]
  2. Martin S. Olivier
    Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:17-31 [Conf]
  3. Mark Davis, Gavin Manes, Sujeet Shenoi
    A Network-Based Architecture for Storing Digital Evidence. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:33-42 [Conf]
  4. Matthew Meyers, Marcus K. Rogers
    Digital Forensics: Meeting the Challenges of Scientific Evidence. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:43-50 [Conf]
  5. Michael Losavio
    Non-Technical Manipulation of Digital Data - Legal, Ethical and Social Issues. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:51-63 [Conf]
  6. Michael Hoeschele, Marcus K. Rogers
    Detecting Social Engineering. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:67-77 [Conf]
  7. Anthony Persaud, Yong Guan
    A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:79-90 [Conf]
  8. Thomas Duval, Bernard Jouga, Laurent Roger
    The Mitnick Case: How Bayes Could Have Helped. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:91-104 [Conf]
  9. Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter
    Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:105-112 [Conf]
  10. Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier
    Exploring Forensic Data with Self-Organizing Maps. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:113-123 [Conf]
  11. Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon
    Integrating Digital Forensics in Network Infrastructures. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:127-140 [Conf]
  12. Scott Redding
    Using Peer-to-Peer Technology for Network Forensics. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:141-152 [Conf]
  13. Pallavi Kahai, Mannivannan Srinivasan, Kameswara Rao Namuduri
    Forensic Profiling System. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:153-164 [Conf]
  14. Eunjong Kim, Daniel Massey, Indrajit Ray
    Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:165-176 [Conf]
  15. Tyler Moore, Anthony Meehan 0002, Gavin Manes, Sujeet Shenoi
    Using Signaling Information in Telecom Network Forensics. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:177-188 [Conf]
  16. Svein Willassen
    Forensic Analysis of Mobile Phone Internal Memory. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:191-204 [Conf]
  17. Christopher Swenson, Gavin Manes, Sujeet Shenoi
    Imaging and Analysis of GSM SIM Cards. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:205-216 [Conf]
  18. Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi
    Extracting Concealed Data from BIOS Chips. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:217-230 [Conf]
  19. Philip Craiger
    Recovering Digital Evidence from Linux Systems. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:233-244 [Conf]
  20. Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi
    Detecting Hidden Data in Ext2/Ext3 File Systems. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:245-256 [Conf]
  21. Gilbert L. Peterson
    Forensic Analysis of Digital Image Tampering. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:259-270 [Conf]
  22. Yixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao
    Content-Based Image Retrieval for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:271-282 [Conf]
  23. Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael
    Making Decisions about Legal Responses to Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:283-294 [Conf]
  24. Jill Slay, Kris Jorgensen
    Applying Filter Clusters to Reduce Search State Space. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:295-301 [Conf]
  25. Yusuf Motara, Barry Irwin
    In-Kernel Cryptographic Executable Verification. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:303-313 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002