Showing results 1 to 15 of 15
Title | Author(s) | Issue Date | |
---|---|---|---|
Analysis of the digital evidence presented in the Yahoo! case Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | ||
Analyzing storage media of digital camera Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
BTM - An automated rule-based BT monitoring system for piracy detection Proceeding/Conference:International Conference on Internet Monitoring and Protection, ICIMP 2007 | 2007 | ||
Consistency Issue on Live Systems Forensics Proceeding/Conference:Proceedings of Future Generation Communication and Networking, FGCN 2007 | 2007 | ||
An efficient bloom filter based solution for multiparty private matching Proceeding/Conference:Proceedings of The 2006 International Conference on Security and Management, SAM'06 | 2006 | ||
Identifying static and dynamic volatile memory data from multiple dumps for live forensics Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics | 2010 | ||
Improving disk sector integrity using 3-dimension hashing scheme Proceeding/Conference:International Conference on Future Generation Communication and Networking (FGCN 2007) Proceedings | 2007 | ||
Maintaining hard disk integrity with digital legal professional privilege (LPP) data Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Memory acquisition: A 2-Take approach Proceeding/Conference:Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | 2009 | ||
A model for foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2009 | ||
Modeling the initial stage of a file sharing process on a BitTorrent network Journal:Peer-to-Peer Networking and Applications | 2014 | ||
Protecting digital legal professional privilege LPP data Proceeding/Conference:Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008 | 2008 | ||
The rules of time on NTFS file system Proceeding/Conference:Proceedings - SADFE 2007: Second International Workshop on Systematic Approaches to Digital Forensic Engineering | 2007 | ||
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010 | 2010 | ||
Software pirates: a criminal investigation Proceeding/Conference:Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2012 | 2012 |