Full Text Documents

Search


Table of Contents
Advances in Digital Forensics XII
Gilbert Peterson, Sujeet Shenoi
Front Matter

THEMES AND ISSUES


On a Scientific Theory of Digital Forensics
Martin Olivier
3-24
Data Privacy Perceptions About Digital Forensic Investigations in India
Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta
25-45
A Framework for Assessing the Core Capabilities of a Digital Forensic Organization
Ahmed Almarzooqi, Andrew Jones
47-65

MOBILE DEVICE FORENSICS


Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics
Oluwapelumi Aboluwarin, Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas
69-87
Impact of User Data Privacy Management Controls on Mobile Device Investigations
Panagiotis Andriotis, Theo Tryfonas
89-105
Analyzing Mobile Device Ads to Identify Users
Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
107-126
A Forensic Methodology for Analyzing Nintendo 3DS Devices
Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos, Mikhaila Burgess
127-143

NETWORK FORENSICS


Reconstructing Interactions with Rich Internet Applications from HTTP Traces
Sara Baghbanzadeh, Salman Hooshmand, Gregor Bochmann, Guy-Vincent Jourdan, Seyed Mirtaheri, Muhammad Faheem, Iosif Onut
147-164
Reconstructing Tabbed Browser Sessions Using Metadata Associations
Sriram Raghavan
165-188
A Probabilistic Network Forensic Model for Evidence Analysis
Changwei Liu, Anoop Singhal, Duminda Wijesekera
189-210

CLOUD FORENSICS


API-Based Forensic Acquisition of Cloud Drives
Vassil Roussev, Andres Barreto, Irfan Ahmed
213-235
The Cloud Storage Ecosystem – A New Business Model for Internet Piracy?
Raymond Chan, Kam-Pui Chow, Vivien Chan, Michael Kwan
237-255

SOCIAL MEDIA FORENSICS


Windows 8.x Facebook and Twitter Metro App Artifacts
Swasti Bhushan Deb
259-279
Profiling Flash Mob Organizers in Web Discussion Forums
Vivien Chan, Kam-Pui Chow, Raymond Chan
281-293

IMAGE FORENSICS


Enhancing Image Forgery Detection Using 2-D Cross Products
Songpon Teerakanok, Tetsutaro Uehara
297-310
Forensic Authentication of Bank Checks
Rajesh Kumar, Gaurav Gupta
311-322

FORENSIC TECHNIQUES


Data Type Classification: Hierarchical Class-to-Type Modeling
Nicole Beebe, Lishu Liu, Minghe Sun
325-343
Secure File Deletion for Solid State Drives
Bhupendra Singh, Ravi Saharan, Gaurav Somani, Gaurav Gupta
345-362

FORENSIC TOOLS


A Tool for Volatile Memory Acquisition from Android Devices
Haiyu Yang, Jianwei Zhuge, Huiming Liu, Wei Liu
365-378
Advanced Automated Disk Investigation Toolkit
Umit Karabiyik, Sudhir Aggarwal
379-396

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/