-
1
-
-
0348155988
-
Forensic Computing
-
Proceedings of INDOCRYPT, New Delhi, India, 8-10 Dec, Springer
-
Li, X. & Seberry, J., "Forensic Computing", Proceedings of INDOCRYPT, New Delhi, India, 8-10 Dec 2003, LNCS 2904, Springer, 2003, pp.18-35.
-
(2003)
LNCS
, vol.2904
, pp. 18-35
-
-
Li, X.1
Seberry, J.2
-
2
-
-
1942425715
-
-
Artech House, MA, USA
-
Mohay, G., Anderson, A., Collie, B., De Vel, O. & McKemmish, R., Computer and Intrusion Forensics, Artech House, MA, USA, 2003.
-
(2003)
Computer and Intrusion Forensics
-
-
Mohay, G.1
Anderson, A.2
Collie, B.3
De Vel, O.4
McKemmish, R.5
-
3
-
-
1942500388
-
Crime Data Mining: A General Framework and Some Examples
-
April
-
Chen, H., Chung, W., Xu, J.L., Wang, G., Qin, Y. & Chau, M., "Crime Data Mining: A General Framework and Some Examples", Computer, April 2004, pp. 50-56.
-
(2004)
Computer
, pp. 50-56
-
-
Chen, H.1
Chung, W.2
Xu, J.L.3
Wang, G.4
Qin, Y.5
Chau, M.6
-
4
-
-
33646419300
-
Cryptographic Hash Standards Where Do We Go from Here?
-
March/April
-
Burr, W.E., "Cryptographic Hash Standards Where Do We Go from Here?", IEEE Security and Privacy, March/April, 2006, pp. 88-91.
-
(2006)
IEEE Security and Privacy
, pp. 88-91
-
-
Burr, W.E.1
-
5
-
-
84870740257
-
-
available from, accessed October 2006
-
The Forensics Toolkit, available from http://www.accessdata.com, accessed October 2006.
-
The Forensics Toolkit
-
-
-
6
-
-
36248984206
-
-
Guidance Software Encase, available from, accessed October 2006
-
Guidance Software Encase, available from http://www.guidancesoftware.com, accessed October 2006.
-
-
-
-
7
-
-
36249014726
-
-
available from, last updated April, accessed October 2006
-
Jhead, available from http://www.sentex.net/~mwandel/jhead/, last updated April 2006, accessed October 2006.
-
(2006)
Jhead
-
-
-
8
-
-
36248942940
-
-
DataLifter Computer Forensic Software, available from, accessed October 2006
-
DataLifter Computer Forensic Software, available from http://datalifter.com/products.htm, accessed October 2006.
-
-
-
-
9
-
-
33745456200
-
Fileprints: Identifying File Types by n-gram Analysis
-
West Point, NY, USA, June
-
Li, W. J., Wang, K., Stolfo, S. & Herxog, B., "Fileprints: Identifying File Types by n-gram Analysis", Proceedings of the 6th IEEE Systems, Man and Cybernetics Assurance Workshop, West Point, NY, USA, June, 2005.
-
(2005)
Proceedings of the 6th IEEE Systems, Man and Cybernetics Assurance Workshop
-
-
Li, W.J.1
Wang, K.2
Stolfo, S.3
Herxog, B.4
-
10
-
-
33845539319
-
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM
-
Karlstadt, Sweden, 22, 24 May
-
Karresand, M. & Shahmehri, N., "Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages", Proceedings of IFIP SEC 2006, Karlstadt, Sweden, 22 - 24 May, 2006.
-
(2006)
Proceedings of IFIP SEC 2006
-
-
Karresand, M.1
Shahmehri, N.2
-
11
-
-
33845952188
-
File Type Identification of Data Fragments by their Binary Structure
-
US Military Academy, West Point, NY, 21-23 June
-
Karresand, M. & Shahmehri, N., "File Type Identification of Data Fragments by their Binary Structure", Proceedings of the 2006 IEEE Workshop on Information Assurance, US Military Academy, West Point, NY, 21-23 June, 2006.
-
(2006)
Proceedings of the 2006 IEEE Workshop on Information Assurance
-
-
Karresand, M.1
Shahmehri, N.2
-
12
-
-
36248991202
-
Forensic Signature Analysis of Digital Image Files
-
Liverpool, UK, 13-14 July
-
Haggerty, J., Berry, T. & Gresty, D., "Forensic Signature Analysis of Digital Image Files", Proceedings of the 1st Conference on Advances in Computer Security and Forensics, Liverpool, UK, 13-14 July, 2006.
-
(2006)
Proceedings of the 1st Conference on Advances in Computer Security and Forensics
-
-
Haggerty, J.1
Berry, T.2
Gresty, D.3
-
13
-
-
85084162889
-
Detecting Backdoors
-
Denver, CO, USA
-
Zhang, Y. & Paxson, V., "Detecting Backdoors", Proceedings of USENIX Security Symposium, Denver, CO, USA, 2000.
-
(2000)
Proceedings of USENIX Security Symposium
-
-
Zhang, Y.1
Paxson, V.2
|