-
1
-
-
84867697645
-
The forensic chain of evidence model: Improving the process of evidence collection in incident handling procedures
-
Ahmad A. (2002) The forensic chain of evidence model: Improving the process of evidence collection in incident handling procedures. The 6th Pacific Asia Conference on Information Systems.
-
(2002)
The 6th Pacific Asia Conference on Information Systems
-
-
Ahmad, A.1
-
2
-
-
84979796792
-
Internet law: Authenticity of works: Authorship and authenticity in cyberspace
-
Akester, P. (2004) Internet law: authenticity of works: authorship and authenticity in cyberspace. Computer Law & Security Report, 20, 436-444.
-
(2004)
Computer Law & Security Report
, vol.20
, pp. 436-444
-
-
Akester, P.1
-
3
-
-
0003457573
-
-
Evanston, IL, Northwestern University Press
-
Anderson, T., & Twining, W (1991) Analysis of evidence: How to do things with facts based on Wigmore's Science of Judicial Proof, Evanston, IL, Northwestern University Press.
-
(1991)
Analysis of Evidence: How to do Things with Facts Based on Wigmore's Science of Judicial Proof
-
-
Anderson, T.1
Twining, W.2
-
6
-
-
0021044014
-
An introduction to sample selection bias in sociological data
-
Berk, R. A. (1983) An introduction to sample selection bias in sociological data. American Sociological Review, 48, 386 - 398.
-
(1983)
American Sociological Review
, vol.48
, pp. 386-398
-
-
Berk, R.A.1
-
8
-
-
28844486805
-
-
Upper Saddle River, New Jersey, Addison-Wesley
-
Carrier, B. (2005a) File system forensic analysis, Upper Saddle River, New Jersey, Addison-Wesley
-
(2005)
File System Forensic Analysis
-
-
Carrier, B.1
-
10
-
-
84867720924
-
Automated digital evidence target definition using outlier analysis and existing evidence
-
New Orleans
-
Carrier, B. D., & Spaford, Eugene. H. (2005b) Automated digital evidence target definition using outlier analysis and existing evidence. Digital Forensic Research Workshop. New Orleans.
-
(2005)
Digital Forensic Research Workshop
-
-
Carrier, B.D.1
Spaford, E.H.2
-
14
-
-
84867699819
-
Ten things about DNA contamination that lawyers should know
-
Edwards, K. (2005) Ten things about DNA contamination that lawyers should know. Criminal Law Journal, 29, 71 - 93. (Pubitemid 40594878)
-
(2005)
Criminal Law Journal - Sydney
, vol.29
, Issue.2
, pp. 71-93
-
-
Edwards, K.1
-
17
-
-
55749107575
-
-
Australasian Centre for Policing Research
-
Etter, B. (2001b) The forensic challenges of e-crime. Australasian Centre for Policing Research, 3, 1-8.
-
(2001)
The Forensic Challenges of E-crime
, vol.3
, pp. 1-8
-
-
Etter, B.1
-
19
-
-
84867699628
-
Computer forensic case study: Espionage, Part 1 just finding the file is not enough!
-
Flusche, K. J. (2001) Computer forensic case study: Espionage, Part 1 Just finding the file is not enough! Information Security Journal, 10, 1 - 10.
-
(2001)
Information Security Journal
, vol.10
, pp. 1-10
-
-
Flusche, K.J.1
-
20
-
-
79959498789
-
Use of Bayesian belief networks in legal reasoning
-
Huygen, P. E. M. (2002) Use of Bayesian Belief Networks in legal reasoning. 17th BILETA Annual Conference.
-
(2002)
17th BILETA Annual Conference
-
-
Huygen, P.E.M.1
-
21
-
-
32544453278
-
The role of technology in computer forensic investigations
-
DOI 10.1016/S1363-4127(00)02006-9, PII S1363412700020069
-
Janes, S. (2000) The role of technology in computer forensic investigations. Information Security Technical Report, 5, 43 - 50. (Pubitemid 43231475)
-
(2000)
Information Security Technical Report
, vol.5
, Issue.2
, pp. 43-50
-
-
Janes, S.1
-
23
-
-
84867723764
-
On the possibility of constructing meaningful hash collisions for public keys
-
Brisbane, Lucent Technologies, Bell Laboratories, and Technische Universiteit Eindhoven
-
Lenstraand, A., & De Weger, Benne. (2005) On the possibility of constructing meaningful hash collisions for public keys. Australasian Conference on Information Security and Privacy 2005. Brisbane, Lucent Technologies, Bell Laboratories, and Technische Universiteit Eindhoven.
-
(2005)
Australasian Conference on Information Security and Privacy 2005
-
-
Lenstraand, A.1
De Weger, B.2
-
24
-
-
33746202526
-
Gap analysis: Judicial experience and perception of electronic evidence
-
Losavio, M., Adams. J., & Rogers, M. (2006) Gap Analysis: Judicial experience and perception of electronic evidence. Journal of Digital Forensic Practice, 1, 13 - 17.
-
(2006)
Journal of Digital Forensic Practice
, vol.1
, pp. 13-17
-
-
Losavio, M.1
Adams, J.2
Rogers, M.3
-
26
-
-
33745192277
-
Challenges in forensic computing
-
DOI 10.1145/1101779.1101796
-
Mercuri, R. (2005) Challenges in forensic computing. Communications of the ACM 48, 17 - 21 (Pubitemid 43906404)
-
(2005)
Communications of the ACM
, vol.48
, Issue.12
, pp. 17-21
-
-
Mercuri, R.T.1
-
28
-
-
0003656594
-
-
Englewood Cliffs, NJ, Prentice Hall
-
Nisbett, R. E., & Ross, L. (1980) Human inference: Strategies and shortcomings of social judgment, Englewood Cliffs, NJ, Prentice Hall.
-
(1980)
Human Inference: Strategies and Shortcomings of Social Judgment
-
-
Nisbett, R.E.1
Ross, L.2
-
29
-
-
0011506513
-
The use of statistical heuristics in everyday inductive reasoning
-
Nisbett, R. E., Krantz, D. H., Jepson, C., & Kunda, Z (1983) The use of statistical heuristics in everyday inductive reasoning. Psychological Review, 90, 339-363.
-
(1983)
Psychological Review
, vol.90
, pp. 339-363
-
-
Nisbett, R.E.1
Krantz, D.H.2
Jepson, C.3
Kunda, Z.4
-
33
-
-
0003946182
-
-
Notre Dame, Indiana, University of Notre Dame Press
-
Pe, C., & Olbrechts-Tyteca, L. (1969) The new rhetoric: A treatise on argumentation, Notre Dame, Indiana, University of Notre Dame Press.
-
(1969)
The New Rhetoric: A Treatise on Argumentation
-
-
Pe, C.1
Olbrechts-Tyteca, L.2
-
35
-
-
11844303948
-
-
New Jersey, Pfrentice-Hall, Inc.
-
Pospesel, H., & Rodes (Jnr), Robert. E. (1997) Premises and conclusions: Symbolic logic for legal analysis, New Jersey, Pfrentice-Hall, Inc.
-
(1997)
Premises and Conclusions: Symbolic Logic for Legal Analysis
-
-
Pospesel, H.1
Rodes, Jr.2
Robert, E.3
-
38
-
-
23244453289
-
The coming paradigm shift in forensic identification science
-
DOI 10.1126/science.1111565
-
Saks, M. J., & Koehler Jonathan. J (2005) The coming paradigm shift in forensic identification science. Science, 309, 892 - 895. (Pubitemid 41099917)
-
(2005)
Science
, vol.309
, Issue.5736
, pp. 892-895
-
-
Saks, M.J.1
Koehler, J.J.2
-
40
-
-
14544271706
-
Opinion: Cryptanalysis of MD5 and SHA: Time for a new standard: Crypto researchers report weaknesses in common hash functions
-
Schneier, B. (2004) Opinion: Cryptanalysis of MD5 and SHA: Time for a new standard: Crypto researchers report weaknesses in common hash functions. Computerworld.
-
(2004)
Computerworld
-
-
Schneier, B.1
-
41
-
-
80052109290
-
-
New Jersey, John Wiley & Sons, Inc.
-
Silverstone, H., & Sheetz, Michael (2007) Forensic accounting and fraud investigation for non-experts, New Jersey, John Wiley & Sons, Inc.
-
(2007)
Forensic Accounting and Fraud Investigation for Non-experts
-
-
Silverstone, H.1
Sheetz, M.2
-
44
-
-
0342952877
-
Digital footprints: Accessing computer evidence
-
Sommer, P. (2000) Digital footprints: Accessing computer evidence. Criminal Law Review, 61 - 78
-
(2000)
Criminal Law Review
, pp. 61-78
-
-
Sommer, P.1
-
48
-
-
84867697642
-
-
Gerechtigkeitswissenschaft: Kolloquium aus Anlass des 70: Geburtstages von Lothar Philipps. Berlin
-
Tillers, P. (2005) Picturing factual inference in legal settings. Gerechtigkeitswissenschaft: Kolloquium aus Anlass des 70: Geburtstages von Lothar Philipps. Berlin.
-
(2005)
Picturing Factual Inference in Legal Settings
-
-
Tillers, P.1
-
50
-
-
84867692283
-
The virtual horizon: Meeting the law enforcement challenges: Developing an australasian law enforcement strategy for dealing with electronic crime: Scoping paper
-
Unamed Adelaide., Australasian Centre for Policing Research
-
Unamed (2000) The virtual horizon: meeting the law enforcement challenges: developing an Australasian law enforcement strategy for dealing with electronic crime: scoping paper. Police Commissioners' Conference - Electronic Crime Working Party 2000. Adelaide., Australasian Centre for Policing Research.
-
(2000)
Police Commissioners' Conference - Electronic Crime Working Party 2000
-
-
-
51
-
-
79960288554
-
Cracking the computer forensics mystery
-
Wall C., & Paroff, Jason. (2004) Cracking the computer forensics mystery. UtahBar Journal, 17.
-
(2004)
UtahBar Journal
, vol.17
-
-
Wall, C.1
Paroff, J.2
-
52
-
-
56749186425
-
An historical perspective of digital evidence: A forensic scientist's view
-
Whitcomb, C. M. (2002) An historical perspective of digital evidence: A forensic scientist's view. International Journal of Digital Evidence, 1.
-
(2002)
International Journal of Digital Evidence
, vol.1
-
-
Whitcomb, C.M.1
-
53
-
-
0141549587
-
-
Boston, Massachusetts, Thomson Learning
-
Whitman, M. E., AND Mattord, H. J. (2005) Principles of information security, Boston, Massachusetts, Thomson Learning.
-
(2005)
Principles of Information Security
-
-
Whitman, M.E.1
Mattord, H.J.2
-
54
-
-
3042745245
-
Computer forensics education
-
Yasinsac, A., Erbacher, R. F., Marks, D. G., Pollitt, M. M., & Sommer, P. M. (2003) Computer forensics education. IEEE Security & Privacy, 1, 15 - 23.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 15-23
-
-
Yasinsac, A.1
Erbacher, R.F.2
Marks, D.G.3
Pollitt, M.M.4
Sommer, P.M.5
|