default search action
Journal of Digital Forensic Practice, Volume 2
Volume 2, Number 1, 2008
- Ewa Huebner, Derek Bem:
Forensic Extraction of EFS-Encrypted Files in Live System Investigation. 1-12 - Victor Limongelli:
Digital Evidence: Findings of Reliability, Not Presumptions. 13-16 - Jonathan Matusitz:
Postmodernism and Networks of Cyberterrorists. 17-26 - Abdelrahman Desoky, Mohamed F. Younis:
Graphstega: Graph Steganography Methodology. 27-36 - John H. Riley Jr.:
Windows Directory Entries for 8.3 Names in VFAT File Systems. 37-42 - Gary C. Kessler:
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners. 43-53 - Mark Pollitt:
Digital Orange Juice. 54-56
Volume 2, Number 2, 2008
- Ronald E. Kaplan:
Computer Forensics - What Is It Good For? 57-61 - Mark Pollitt, Kara L. Nance, Brian Hay, Ronald C. Dodge, Philip Craiger, Paul Burke, Christopher Marberry, Bryan Brubaker:
Virtualization and Digital Forensics: A Research and Education Agenda. 62-73 - Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn:
A Comparison of Forensic Hard Drive Imagers: A Time Analysis Comparison Between the ICS Image MASSter-Solo III and the Logicube Talon. 74-82 - Scott Inch:
A Simple Image Hiding Technique: What You May Be Missing. 83-94 - Yoginder S. Dandass, Nathan Joseph Necaise, Sherry Reede Thomas:
An Empirical Analysis of Disk Sector Hashes for Data Carving. 95-104 - Mark Pollitt:
Blue Skies and Storm Clouds. 105-106
Volume 2, Number 3, 2008
- Jesse D. Kornblum:
Auditing Hash Sets: Lessons Learned from Jurassic Park. 108-112 - Gavin Wylie Manes, James Johnson, Alex Barclay, Michael Harvey, Elizabeth Downing, John Hale:
Issues and Techniques for Redacting PDF Files. 113-116 - Seyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi:
Automated Windows Memory File Extraction for Cyber Forensics Investigation. 117-131 - Abdelrahman Desoky:
Nostega: A Novel Noiseless Steganography Paradigm. 132-139 - David Glen Ferguson:
Redefining File Slack in Microsoft® NTFS. 140-156 - Mark Pollitt:
Managing Expectations. 157-158 - Samuel Liles:
Software Forensics. By Robert Slade. 159-160
Volume 2, Number 4, 2008
- Jonathan Matusitz, Elizabeth Minei:
Cyberterrorism: Its Effects on Health-Related Infrastructures. 161-171 - Mark Pollitt:
The Good, the Bad, the Unaddressed. 172-174 - S. Santhosh Baboo, P. Vinod Bhattathiripad:
Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques. 175-182 - Lucas Donato:
An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations. 183-195 - Vincent Urias, Curtis Hash, Lorie M. Liebrock:
Consideration of Issues for Parallel Digital Forensics of RAID Systems. 196-208 - Wayne Liu, Sudhir Aggarwal, Zhenhai Duan:
Incorporating Accountability into Internet E-mail. 209-220
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.