skip to main content
Skip header Section
Digital Evidence and Computer CrimeMarch 2004
Publisher:
  • Academic Press, Inc.
  • 6277 Sea Harbor Drive Orlando, FL
  • United States
ISBN:978-0-12-163104-8
Published:01 March 2004
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Mishra M, Jain N and Kumar A (2023). Reviewing Image Data: Detecting Forgery Using a Robust Forensic Method, SN Computer Science, 4:6, Online publication date: 8-Nov-2023.
  2. ACM
    Amer N and Al-Halabi Y Android Forensics Tools and Security Mechanism Proceedings of the Fourth International Conference on Engineering & MIS 2018, (1-6)
  3. ACM
    Alrajeh D, Pasquale L and Nuseibeh B On evidence preservation requirements for forensic-ready systems Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (559-569)
  4. Schramp R (2017). Live transportation and RAM acquisition proficiency test, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 20:C, (44-53), Online publication date: 1-Mar-2017.
  5. Colombini C and Colella A Digital profiling Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems, (330-343)
  6. Grier J (2011). Detecting data theft using stochastic forensics, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 8, (S71-S77), Online publication date: 1-Aug-2011.
  7. ACM
    Yen P, Yang C and Ahn T Design and implementation of a live-analysis digital forensic system Proceedings of the 2009 International Conference on Hybrid Information Technology, (239-243)
  8. Kiltz S, Hoppe T and Dittmann J A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump Proceedings of the 16th international conference on Digital Signal Processing, (1135-1140)
  9. Barradas-Acosta A, Anaya E, Nakano-Miyatake M and Perez-Meana H (2009). Neural network based attack detection algorithm, WSEAS Transactions on Computers, 8:6, (905-915), Online publication date: 1-Jun-2009.
  10. ACM
    Lim N and Khoo A (2009). Forensics of computers and handheld devices, Communications of the ACM, 52:6, (132-135), Online publication date: 1-Jun-2009.
  11. Barradas-Acosta A, Aguirre-Anaya E and Perez-Meana M Attacks recognition using recurrent neural network Proceedings of the international conference on Computational and information science 2009, (402-409)
  12. Akhter F E-Commerce Security Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (298-303)
  13. ACM
    Bradford P and Ray D Semantics for a domain-specific language for the digital forensics domain Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, (1-3)
  14. ACM
    Austin R Digital forensics on the cheap Proceedings of the 4th annual conference on Information security curriculum development, (1-5)
  15. ACM
    Stahlberg P, Miklau G and Levine B Threats to privacy in the forensic analysis of database systems Proceedings of the 2007 ACM SIGMOD international conference on Management of data, (91-102)
  16. ACM
    Adelstein F (2006). Live forensics, Communications of the ACM, 49:2, (63-66), Online publication date: 1-Feb-2006.
  17. ACM
    Casey E (2006). Investigating sophisticated security breaches, Communications of the ACM, 49:2, (48-55), Online publication date: 1-Feb-2006.
  18. Abraham T Event sequence mining to develop profiles for computer forensic investigation purposes Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (145-153)
  19. Cronin E, Sherr M and Blaze M Listen too closely and you may be confused Proceedings of the 13th international conference on Security protocols, (245-249)
Contributors
  • University of Lausanne

Recommendations