Advances in Digital Forensics IV
ADVANCES IN DIGITAL FORENSICS IV Edited by: Indrajit Ray and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...
Corporate Author: | |
---|---|
Other Authors: | , |
Language: | English |
Published: |
New York, NY :
Springer US : Imprint: Springer,
2008.
|
Edition: | 1st ed. 2008. |
Series: | IFIP Advances in Information and Communication Technology,
285 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-0-387-84927-0 |
Table of Contents:
- Themes and Issues
- When is Digital Evidence Forensically Sound?
- Applying Traditional Forensic Taxonomy to Digital Forensics
- Evidence Recovery
- Recovering Data from Failing Floppy Disks
- Extracting Evidence Using Google Desktop Search
- Evaluation of Registry Data Removal by Shredder Programs
- Evidence Integrity
- Using Boot Control to Preserve the Integrity of Evidence
- Hypothesis-Based Investigation of Digital Timestamps
- Improving Disk Sector Integrity Using K-Dimension Hashing
- Evidence Management
- Class-Aware Similarity Hashing for Data Classification
- Applying Topic Modeling to Forensic Data
- Forensic Techniques
- Forensic Analysis of Volatile Instant Messaging
- Timely Rootkit Detection During Live Response
- Network Forensics
- Identifying and Analyzing Web Server Attacks
- Forensic Web Services
- Detecting Remote Exploits Using Data Mining
- Portable Electronic Device Forensics
- Using Sensor Dirt for Toolmark Analysis of Digital Photographs
- A New Feature-Based Method for Source Camera Identification
- Data Recovery from Windows CE Based Handheld Devices
- Legal Issues Pertaining to the Use of Cell Phone Data
- Event Data Recorder Forensics
- Protection and Recovery of Railroad Event Recorder Data
- Automobile Event Data Recorder Forensics
- Novel Investigative Techniques
- Reasoning About Evidence Using Bayesian Networks
- Inferring Sources of Leaks in Document Management Systems
- Image Background Matching for Identifying Suspects
- Forensic Tools
- An Evidence Acquisition Tool for Live Systems
- Time Analysis of Hard Drive Imaging Tools
- Fusion of Steganalysis Systems Using Bayesian Model Averaging
- A Virtual Digital Forensics Laboratory.