Legal Issues.- Calibration Testing Of Network Tap Devices.- On the Legality of Analyzing Telephone Call Records.- Survey of Law Enforcement Perceptions Regarding Digital Evidence.- Insider Threat Detection.- Insider Threat Analysis Using Information-Centric Modeling.- An Integrated System for Insider Threat Detection.- Rootkit Detection.- Analysis of Tools for Detecting Rootkits and Hidden Processes.- A Method for Detecting Linux Kernel Module Rootkits.- Authorship Attribution.- Future Trends in Authorship Attribution.- The Keyboard Dilemma and Authorship Identification.- Forensic Techniques.- Factors Affecting One-Way Hashing of CD-R Media.- Disk Drive I/O Commands and Write Blocking.- A New Process Model for Text String Searching.- Detecting Steganography Using Multi-Class Classification.- Redacting Digital Information from Electronic Devices.- File System Forensics.- In-Place File Carving.- File System Journal Forensics.- Network Forensics.- Using Search Engines to Acquire Network Forensic Evidence.- A Framework for Investigating Railroad Accidents.- Portable Electronic Device Forensics.- Forensic Analysis of Xbox Consoles.- Super-Resolution Video Analysis for Forensic Investigations.- Evidence Analysis and Management.- Specializing CRISP-DM for Evidence Mining.- Applying The Biba Integrity Model to Evidence Management.- Formal Methods.- Investigating Computer Attacks Using Attack Trees.- Attack Patterns: A New Forensic and Design Tool.
![]() |
Ask a Question About this Product More... |
![]() |