Conferences in DBLP
(sadfe) 2005 (conf/sadfe/2005)
Preface. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:- [Conf ] Committees. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:- [Conf ] Philip Attfield United States v Gorshkov Detailed Forensics and Case Study; Expert Witness Perspective. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:3-26 [Conf ] A. Chris Bogen , David A. Dampier Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:27-39 [Conf ] Patrick S. Chen , Lawrence M. F. Tsai , Ying-Chieh Chen , George Yee Standardizing the Construction of a Digital Forensics Laboratory. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:40-47 [Conf ] Tom Wilsdon , Jill Slay Digital Forensics: Exploring Validation, Verification and Certification. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:48-55 [Conf ] C. Abe , I. L. Lin , T. H. Lan , Tzong-Chen Wu Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:56-68 [Conf ] Stephen C. Schroeder How to be a Digital Forensic Expert Witness. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:69-88 [Conf ] Jacob Zimmermann , Andrew Clark , George M. Mohay , Fabien Pouget , Marc Dacier The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:89-104 [Conf ] Fabio Casadei , Antonio Savoldi , Paolo Gubian SIMbrush: an Open Source Tool for GSM and UMTS Forensics Analysis. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:105-119 [Conf ] P. T. Chen , C. S. Laih , Fabien Pouget , Marc Dacier Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:120-134 [Conf ] Ajantha Herath , Prasantha Samarasinghe , J. Herath , Susantha Herath Computer Forensics, Information Security and Law: A Case Study. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:135-141 [Conf ] Charles W. Adams Legal Requirements for the Use of Keystroke Loggers. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:142-154 [Conf ] George M. Mohay Technical Challenges and Directions for Digital Forensics. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:155-164 [Conf ] S. Aggarwal , P. Henry , L. Kermes , Judie Mulholland Evidence Handling in Proactive Cyberstalking Investigations: The PAPA Approach. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:165-176 [Conf ] Michael Martin Losavio The Law of Possession of Digital Objects: Dominion and Control Issues for Digital Forensics Investigations and Prosecutions. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:177-186 [Conf ] K. P. Chow , C. F. Chong , Pierre K. Y. Lai , Lucas Chi Kwong Hui , Kevin K. H. Pun , Wai Wan Tsang , H. W. Chan Digital Evidence Search Kit. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:187-194 [Conf ] S. Aggarwal , Mike Burmester , P. Henry , L. Kermes , Judie Mulholland Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:195-205 [Conf ] Lyta Penna , Andrew Clark , George M. Mohay Challenges of Automating the Detection of Paedophile Activity on the Internet. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:206-222 [Conf ] I-Chuan Chang Bor-Wen Hsu , Chi-Sung Laih A DCT Quantization-Based Image Authentication System for Digital Forensics. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:223-235 [Conf ] Seokhee Lee , Hyunsang Kim , Sangjin Lee , Jongin Lim Digital evidence collection process in integrity and memory information gathering. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:236-247 [Conf ] Dario V. Forte , Cristiano Maruti , Michele R. Vetturi , Michele Zambelli SecSyslog: an Approach to Secure Logging Based on Covert Channels. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:248-263 [Conf ] Dun-Yu Hsiao , Soo-Chang Pei Detecting Digital Tampering by Blur Estimation. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:264-278 [Conf ]