
Digital Investigation, Volume 4
Volume 4, Number 1, March 2007
- Eoghan Casey
:
Digital evidence maps - A sign of the times. 1-2 - Andy Spruill, Chris Pavan:
Tackling the U3 trend with computer forensics. 7-12 - Sarah Hilley:
Anti-forensics with a small army of exploits. 13-15 - Claire LaVelle, Almudena Konrad:
FriendlyRoboCopy: A GUI to RoboCopy for computer forensic investigators. 16-23 - Jesse D. Kornblum:
Using every part of the buffalo in Windows memory analysis. 24-29 - Philip Turner:
Applying a forensic approach to incident response, network investigation and system administration using Digital Evidence Bags. 30-35 - Mike Dickson:
An examination into Trillian basic 3.x contact identification. 36-45
- H. Wolfe:
Krishna Sankar, Sri Sundaralingam, Andrew Balinsky and Darrin Miller, Cisco Wireless LAN Security, Cisco Press (2005) ISBN 1-58705-154-0 419 pp. 46 - H. Wolfe:
Paul L. Piccard, Brian Baskin, Craig Edwards, George Spillman and Marcus H. Sachs, Securing IM and P2P Applications for the Enterprise, Syngress Publishing Inc. (2006) ISBN 1-59749-017-2 454 pp. 46-47
Volume 4, Number 2, June 2007
- Eoghan Casey
:
What does "forensically sound" really mean? 49-50 - Bruce J. Nikkel:
An introduction to investigating IPv6 networks. 59-67 - Jason Solomon, Ewa Huebner, Derek Bem, Magdalena Szezynska:
User data persistence in physical memory. 68-72 - Wouter S. van Dongen:
Forensic artefacts left by Windows Live Messenger 8.0. 73-87 - Golden G. Richard III, Vassil Roussev, Lodovico Marziale:
Forensic discovery auditing of digital evidence containers. 88-97 - Christopher Malinowski, Richard Noble:
Hashing and data integrity: Reliability of hashing and granularity size reduction. 98-104
Volume 4, Numbers 3-4, September - December 2007
- Eoghan Casey
:
Attacks against forensic analysis. 105-106 - Sarah Hilley:
News. 107-110 - Sarah Hilley:
News. 110-112 - Nicko van Someren:
RIPA part III - The intricacies of decryption. 113-115 - Geoff Fellows:
NTFS volume mounts, directory junctions and $Reparse. 116-118 - Michael I. Cohen:
Advanced carving techniques. 119-128 - Ewa Huebner, Derek Bem, Frans A. Henskens
, Mark Wallis:
Persistent systems techniques in forensic acquisition of memory. 129-137 - Wouter S. van Dongen:
Forensic artefacts left by Pidgin Messenger 2.0. 138-145 - M. N. A. Khan, Chris R. Chatwin, Rupert C. D. Young:
A framework for post-event timeline reconstruction using neural networks. 146-157 - James S. Okolica, Gilbert L. Peterson
, Robert F. Mills:
Using Author Topic to detect insider threats from email traffic. 158-164 - Kris Harms:
Corrigendum to "Forensic analysis of System Restore points in Microsoft Windows XP" [Digit Investig 3 (3) (2006) 151-158]. 165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.