


default search action
International Journal of Digital Evidence, Volume 2
Volume 2, Number 1, Spring 2003
- Svein Yngvar Willassen:
Forensics and the GSM Mobile Telephone System. - John Patzakis:
New Accounting Reform Laws Push for Technology-Based Document Retention Practices. - Frank Adelstein:
MFP: The Mobile Forensic Platform.
Volume 2, Number 2, Fall 2003
- Brian D. Carrier, Eugene H. Spafford:
Getting Physical with the Digital Investigation Process. - Karen Bailey, Kevin Curran:
An Evaluation of Image Based Steganography Methods. - Jack Seward:
The Debtor's Digital Reckonings. - Peter Stephenson:
Modeling of Post-Incident Root Cause Analysis.
Volume 2, Number 3, Winter 2004
- Jason Siegfried, Christine Siedsma, Bobbie-Jo Countryman, Chester D. Hosmer:
Examining the Encryption Threat. - Robert Rowlingson:
A Ten Step Process for Forensic Readiness. - Kellep A. Charles:
Decoy Systems: A New Player in Network Security and Computer Incident Response. - Paul Alvarez:
Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis.
Volume 2, Number 4, Spring 2004
- Megan Carney, Marc Roger:
The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction. - Matthew M. Shannon:
Forensic Relative Strength Scoring: ASCII and Entropy Scoring. - Gaurav Gupta, Chandan Mazumdar, M. S. Rao:
Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.