Browse Title Index


 
Issue Title
 
Vol 10, No 3 A 3-D Stability Analysis of Lee Harvey Oswald in the Backyard Photo Abstract   PDF
Hany Farid, Srivamshi Pittala, Emily Whiting
 
Vol 6, No 1 A Case Study in Forensic Analysis of Control Abstract   PDF
Fred Cohen
 
Vol 1, No 4 A Curriculum for Teaching Information Technology Investigative Techniques for Auditors Abstract   PDF
Grover S. Kearns
 
Vol 1, No 3 A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients Abstract   PDF
Kim Morfitt, Craig Valli
 
Vol 2, No 1 A Grounded Theory Approach to Identifying and Measuring Forensic Data Acquisition Tasks Abstract   PDF
Gregory H. Carlton
 
Vol 11, No 3 A Legal Examination of Revenge Pornography and Cyber-Harassment Abstract   PDF
Thomas Lonardo, Tricia Martland, Doug White
 
Vol 11, No 3 A Research Agenda for Online Linguistic Surveillance of Threatening Messages Abstract   PDF
Brian H Spitzberg, Jean Mark Gawron
 
Vol 8, No 1 A simple experiment with Microsoft Office 2010 and Windows 7 utilizing digital forensic methodology Abstract   PDF
Gregory H. Carlton
 
Vol 9, No 4 A State-of-the-Art Review of Cloud Forensics Abstract   PDF
Sameera Abdulrahman Almulla, Youssef Iraqi, Andrew Jones
 
Vol 9, No 3 A Study of Forensic Imaging in the Absence of Write-Blockers Abstract   PDF
Gary C Kessler, Greg H Carlton
 
Vol 10, No 1 A Survey of Botnet Detection Techniques by Command and Control Infrastructure Abstract   PDF
Thomas Hyslip, Jason Pittman
 
Vol 6, No 3 A survey of contemporary enterprise storage technologies from a digital forensics perspective Abstract   PDF
Gregory H. Carlton, Joe Matsumoto
 
Vol 4, No 4 A Synopsis of Proposed Data Protection Legislation in SA Abstract   PDF
Francis S Cronjé
 
Vol 9, No 2: Special Issue: 2014 ICDF2C / SADFE Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic Abstract   PDF
Amit Kleinmann, Avishai Wool
 
Vol 5, No 1 Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage Abstract   PDF
Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz
 
Vol 1, No 1 AlphaCo: A Teaching Case on Information Technology Audit and Security Abstract   PDF
Hüseyin Tanriverdi, Jonathan Harrison, Ketan S. Mesuria, Joshua Bertsch, Po-Ling Hsiao, David Hendrawirawan
 
Vol 7, No 4 An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users Abstract   PDF
Patryk Szewczyk
 
Vol 11, No 2 An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data Abstract   PDF
Hussam Jasim Mohammed, Nathan Clarke, Fudong Li
 
Vol 9, No 2: Special Issue: 2014 ICDF2C / SADFE An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach Abstract   PDF
Frank Breitinger, Christian Rathgeb, Harald Baier
 
Vol 3, No 3 An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh Abstract   PDF
Gregory H. Carlton
 
Vol 2, No 3 An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity Abstract   PDF
Stephen D. Barnes, David P. Biros
 
Vol 7, No 1 An Overview of the Jumplist Configuration File in Windows 7 Abstract   PDF
Harjinder Singh Lallie, Parmjit Bains
 
Vol 6, No 3 Analysis of Data Remaining on Second Hand ADSL Routers Abstract   PDF
Patryk Szewczyk
 
Vol 3, No 2 Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market Abstract   PDF
Andy Jones, Craig Valli, Iain Sutherland
 
Vol 8, No 4 Analysis of Second Hand Google Mini Search Appliance Abstract   PDF
Stephen Larson
 
Vol 8, No 4 Analysis of Second Hand Google Mini Search Appliance Abstract   PDF
Stephen Parker Larson
 
Vol 9, No 2: Special Issue: 2014 ICDF2C / SADFE Audit: Automated Disk Investigation Toolkit Abstract   PDF
Umit Karabiyik, Sudhir Aggarwal
 
Vol 7, No 2 Automated Identification and Reconstruction of YouTube Video Access Abstract   PDF
Jonathan Patterson, Christopher Hargreaves
 
Vol 7, No 3 Automatic Crash Recovery Artifacts From Internet Explorer 8 And 9 Abstract   PDF
John Moran, Douglas Orr
 
Vol 8, No 2 Automating Vendor Fraud Detection in Enterprise Systems Abstract   PDF
Kishore Singh, Peter Best, Joseph Mula
 
Vol 5, No 4 Avoiding Sanctions at the E-Discovery Meet-And- Confer in Common Law Countries Abstract   PDF
Milton Luoma, Vicki Luoma
 
Vol 4, No 2 Bluetooth Hacking: A Case Study Abstract   PDF
Dennis Browning, Gary C. Kessler
 
Vol 3, No 1 Book Review: Challenges to Digital Forensic Evidence Abstract   PDF
Gary Kessler
 
Vol 2, No 3 Book Review: Computer Forensics: Principles and Practices Abstract   PDF
Jigang Liu
 
Vol 2, No 2 Book Review: Conquest in Cyberspace: National Security and Information Warfare Abstract   PDF
Gary C. Kessler
 
Vol 4, No 3 Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions Abstract   PDF
Gary Kessler
 
Vol 1, No 4 Book Review: Digital Crime and Forensic Science in Cyberspace Abstract   PDF
Gary C. Kessler
 
Vol 5, No 2 Book Review: Digital Forensic Evidence Examination (2nd ed.) Abstract   PDF
Gary Kessler
 
Vol 7, No 3 Book Review: Dispute Resolution and e-Discovery Abstract   PDF
Milton Luoma
 
Vol 3, No 3 Book Review: Guide to computer forensics and investigations (3rd ed.) Abstract   PDF
Keyu Jiang, Ruifeng Xuan
 
Vol 6, No 1 Book Review: iOS Forensic Analysis: For iPhone, iPad and iPod Touch Abstract   PDF
Christopher Schulte
 
Vol 8, No 4 Book Review: iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices Abstract   PDF
Simson Garfinkel
 
Vol 6, No 4 Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices Abstract   PDF
Schulte Christopher
 
Vol 9, No 4 Book Review: Judiciary-Friendly Forensics of Software Copyright Infringement (Vinod Polpaya Bhattathiripad) Abstract   PDF
Pedro Luís Próspero Sanchez
 
Vol 3, No 4 Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit Abstract   PDF
Gary Kessler
 
Vol 7, No 4 Book Review: Mastering Windows Network Forensics and Investigation, 2/e Abstract   PDF
John C. Ebert
 
Vol 2, No 1 Book Review: No Place To Hide Abstract   PDF
Gary Kessler
 
Vol 6, No 3 Book Review: Online Privacy: Issues in the Digital Age Abstract   PDF
Darlene M Tester
 
Vol 8, No 2 Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Abstract   PDF
Thomas Nash
 
Vol 8, No 3 Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E Abstract   PDF
Joshua Bartolomie
 
Vol 7, No 2 Book Review: System Forensics, Investigation, and Response Abstract   PDF
Nate Keith
 
Vol 9, No 1 Book Review: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics Abstract   PDF
Stephen Larson
 
Vol 3, No 2 Book Review: The dotCrime Manifesto: How to Stop Internet Crime Abstract   PDF
Gary Kessler
 
Vol 7, No 1 Book Review: The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detections Abstract   PDF
Diane Barrett
 
Vol 9, No 3 Book Review: The X-Ways Forensics Practitioner's Guide Abstract   PDF
Linda Lau
 
Vol 11, No 2 Bytewise Approximate Matching: The Good, The Bad, and The Unknown Abstract   PDF
Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili
 
Vol 7, No 1 Challenges in applying the ACPO principles in cloud forensic investigations Abstract   PDF
Harjinder Singh Lallie
 
Vol 5, No 1 Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining Abstract   PDF
Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum
 
Vol 6, No 2 Column: Every Last Byte Abstract   PDF
Simson Garfinkel
 
Vol 7, No 2 Column: Factors Affecting Data Decay Abstract   PDF
Kevin Fairbanks, Simson Garfinkel
 
Vol 6, No 4 Column: File Cabinet Forensics Abstract   PDF
Simson Garfinkel
 
Vol 6, No 1 Column: Putting the Science in Digital Forensics Abstract   PDF
Fred Cohen
 
Vol 6, No 3 Column: The Consortium of Digital Forensics Specialists (CDFS) Abstract   PDF
Christopher Kelley
 
Vol 6, No 3 Column: The Physics of Digital Information Abstract   PDF
Fred Cohen
 
Vol 7, No 1 Column: The Physics of Digital Information-Part 2 Abstract   PDF
Fred Cohen
 
Vol 7, No 3 Column: The Science of Digital Forensics: Analysis of Digital Traces Abstract   PDF
Fred Cohen
 
Vol 7, No 4 Column: The Science of Digital Forensics: Recovery of Data from Overwritten Areas of Magnetic Media Abstract   PDF
Fred Cohen
 
Vol 7, No 1 Comparing Android Applications to Find Copying Abstract   PDF
Larry Melling, Bob Zeidman
 
Vol 2, No 2 Computer Crimes: A Case Study of What Malaysia Can Learn from Others? Abstract   PDF
Janaletchumi Appudurai, Chitra Latha Ramalingam
 
Vol 5, No 2 Computer Forensic Function Testing: Media Preparation, Write Protection And Verification Abstract   PDF
Yinghua (David) Guo, Jill Slay
 
Vol 10, No 3 Computer Forensic Projects for Accountants Abstract   PDF
Grover Kearns
 
Vol 1, No 2 Computer Forensics Field Triage Process Model Abstract   PDF
Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
 
Vol 5, No 2 Computer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach Abstract   PDF
Grover Kearns
 
Vol 7, No 4 Confronting Potential Injustice with Preemptive Suppression Abstract   PDF
Robert Vose Simpson
 
Vol 4, No 1 Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis Abstract   PDF
Peter J. Best, Pall Rikhardsson, Mark Toleman
 
Vol 4, No 2 Correlating Orphaned Windows Registry Data Structures Abstract   PDF
Damir Kahved, Tahar Kechadi
 
Vol 11, No 2 Countering Noise-based Splicing Detection Using Noise Density Transfer Abstract   PDF
Thibault Julliand, Hugues Talbot, Vincent Nozick
 
Vol 10, No 4 Cyber Black Box/Event Data Recorder: Legal and Ethical Perspectives and Challenges with Digital Forensics Abstract   PDF
Michael Losavio, Pavel Sysoevich Pastukov, Svetlana Polyakova
 
Vol 10, No 4 Data Extraction on MTK-based Android Mobile Phone Forensics Abstract   PDF
Joe Kong
 
Vol 10, No 1 Data Loss Prevention Management and Control: Inside Activity Incident Monitoring, Identification, and Tracking in Healthcare Enterprise Environments Abstract   PDF
Manghui Tu
 
Vol 3, No 2 Data Mining Techniques in Fraud Detection Abstract   PDF
Rekha Bhowmik
 
Vol 3, No 4 Data recovery from PalmmsgV001 Abstract   PDF
Satheesaan Pasupatheeswaran
 
Vol 3, No 4 Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action Abstract   PDF
N. Mlitwa, Y. Kachala
 
Vol 4, No 1 Defining a Forensic Audit Abstract   PDF
Stevenson G. Smith, Larry D. Crumbley
 
Vol 1, No 3 Designing a Data Warehouse for Cyber Crimes Abstract   PDF
Il-Yeol Song, Ki Jung Lee, Xiaohua Hu, John D. Maguire, Namyoun Choi, Peter Chen
 
Vol 4, No 2 Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers Abstract   PDF
Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre
 
Vol 9, No 2: Special Issue: 2014 ICDF2C / SADFE Developing a Conceptual Framwork for Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs Abstract   PDF
Samer Al-khateeb, Nitin Agarwal
 
Vol 6, No 2 Developing a Forensic Continuous Audit Model Abstract   PDF
Grover S. Kearns
 
Vol 3, No 1 Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications Abstract   PDF
Timothy Pavlic, Jill Slay, Benjamin Turnbull
 
Vol 5, No 2 Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity Abstract   PDF
Craig Valli
 
Vol 1, No 2 Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics Abstract   PDF
John W. Bagby, John C. Ruhnka
 
Vol 1, No 2 Development of a National Repository of Digital Forensic Intelligence Abstract   PDF
Mark Weiser, David P. Biros, Greg Mosier
 
Vol 1, No 1 Development of an Ontology Based Forensic Search Mechanism: Proof of Concept Abstract   PDF
Jill Slay, Fiona Schulz
 
Vol 11, No 3 Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem Abstract   PDF
Lauren A Zezulka, Kathryn C Seigfried-Spellar
 
Vol 7, No 2 Digital Evidence Education in Schools of Law Abstract   PDF
Aaron Alva, Barbara Endicott-Popovsky
 
Vol 11, No 1 Digital Forensics In Law Enforcement: A Needs Based Analysis of Indiana Agencies Abstract   PDF   PDF
Teri A Flory
 
Vol 5, No 2 Digital Records Forensics: A New Science and Academic Program for Forensic Readiness Abstract   PDF
Luciana Duranti, Barbara Endicott-Popovsky
 
Vol 7, No 2 DNS in Computer Forensics Abstract   PDF
Neil Fowler Wright
 
Vol 2, No 4 Education Organization Baseline Control Protection and Trusted Level Security Abstract   PDF
Wasim A. Al-Hamdani
 
Vol 9, No 2: Special Issue: 2014 ICDF2C / SADFE Effects of the Factory Reset on Mobile Devices Abstract   PDF
Riqui Schwamm, Neil C. Rowe
 
1 - 100 of 234 Items 1 2 3 > >>