


default search action
WDFIA 2011: London, UK
- Nathan L. Clarke, Theodore Tryfonas:
6th International Workshop on Digital Forensics and Incident Analysis, WDFIA 2011, London, UK, July 7-8, 2011. Proceedings. Plymouth University, UK 2011, ISBN 978-1-84102-285-7 - Andrew Tabona, William Bradley Glisson:
Exploring solutions put forth to solve computer forensic investigations of large storage media. 1-16 - Madeleine Adrienne Bihina Bella, Martin Olivier, Jan H. P. Eloff:
Proposing a Digital Operational Forensic Investigation Process . 17-32 - Paul Sant, Moniphia Orlease Hewling:
Digital Forensics: The need for Integration. 33-43 - Ian Mitchell:
A Formal Logic for Digital Investigations: A Case Study using BPB modifications. 44-54 - Alexandros Zaharis, Adamantini Martini, Theodore Tryfonas, Christos Ilioudis, George Pangalos:
Reconstructive Steganalysis by Source Bytes Lead Digit Distribution Examination. 55-68 - Balan Chelliah, Divya S. Vidyadharan, Dija Sulekha, Kakkassery Lazar Thomas:
Combating Information Hiding Using Forensic Methodology. 69-75 - Daniel Jones:
Forensic Analysis of Navman GPS Devices. 76-80 - Ahmed Patel, Kenan Kalajdzic:
Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. 81-92 - Theodoros Spyridopoulos, Vasilios Katos:
Towards a forensically ready cloud storage service. 93-107 - Francois Mouton, Hein S. Venter:
Requirements for wireless sensor networks in order to achieve digital forensic readiness. 108-121 - Robert Hegarty, Madjid Merabti, Qi Shi, Robert Askwith:
A Signature Detection Scheme for Distributed Storage. 122-132 - George Magklaras, Steven Furnell, Maria Papadaki:
LUARM – An audit engine for insider misuse detection. 133-148 - Yongjian Hu, Chang-Tsun Li, Changhui Zhou, Xufeng Lin:
Issues on Selecting Image Features for Robust Source Camera Identification. 149-159 - Alexander John Karran, John Haggerty, David J. Lamb, Mark John Taylor, David Llewellyn-Jones:
A Social Network Discovery Model for Digital Forensics Investigations. 160-170

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.