The SCEAS System
Navigation Menu

Conferences in DBLP

(sadfe)
2005 (conf/sadfe/2005)


  1. Preface. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:- [Conf]

  2. Committees. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:- [Conf]
  3. Philip Attfield
    United States v Gorshkov Detailed Forensics and Case Study; Expert Witness Perspective. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:3-26 [Conf]
  4. A. Chris Bogen, David A. Dampier
    Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:27-39 [Conf]
  5. Patrick S. Chen, Lawrence M. F. Tsai, Ying-Chieh Chen, George Yee
    Standardizing the Construction of a Digital Forensics Laboratory. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:40-47 [Conf]
  6. Tom Wilsdon, Jill Slay
    Digital Forensics: Exploring Validation, Verification and Certification. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:48-55 [Conf]
  7. C. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu
    Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:56-68 [Conf]
  8. Stephen C. Schroeder
    How to be a Digital Forensic Expert Witness. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:69-88 [Conf]
  9. Jacob Zimmermann, Andrew Clark, George M. Mohay, Fabien Pouget, Marc Dacier
    The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:89-104 [Conf]
  10. Fabio Casadei, Antonio Savoldi, Paolo Gubian
    SIMbrush: an Open Source Tool for GSM and UMTS Forensics Analysis. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:105-119 [Conf]
  11. P. T. Chen, C. S. Laih, Fabien Pouget, Marc Dacier
    Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:120-134 [Conf]
  12. Ajantha Herath, Prasantha Samarasinghe, J. Herath, Susantha Herath
    Computer Forensics, Information Security and Law: A Case Study. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:135-141 [Conf]
  13. Charles W. Adams
    Legal Requirements for the Use of Keystroke Loggers. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:142-154 [Conf]
  14. George M. Mohay
    Technical Challenges and Directions for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:155-164 [Conf]
  15. S. Aggarwal, P. Henry, L. Kermes, Judie Mulholland
    Evidence Handling in Proactive Cyberstalking Investigations: The PAPA Approach. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:165-176 [Conf]
  16. Michael Martin Losavio
    The Law of Possession of Digital Objects: Dominion and Control Issues for Digital Forensics Investigations and Prosecutions. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:177-186 [Conf]
  17. K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan
    Digital Evidence Search Kit. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:187-194 [Conf]
  18. S. Aggarwal, Mike Burmester, P. Henry, L. Kermes, Judie Mulholland
    Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:195-205 [Conf]
  19. Lyta Penna, Andrew Clark, George M. Mohay
    Challenges of Automating the Detection of Paedophile Activity on the Internet. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:206-222 [Conf]
  20. I-Chuan Chang Bor-Wen Hsu, Chi-Sung Laih
    A DCT Quantization-Based Image Authentication System for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:223-235 [Conf]
  21. Seokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim
    Digital evidence collection process in integrity and memory information gathering. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:236-247 [Conf]
  22. Dario V. Forte, Cristiano Maruti, Michele R. Vetturi, Michele Zambelli
    SecSyslog: an Approach to Secure Logging Based on Covert Channels. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:248-263 [Conf]
  23. Dun-Yu Hsiao, Soo-Chang Pei
    Detecting Digital Tampering by Blur Estimation. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:264-278 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002