Record ID | ia:digitalforensics0000inte_q8c6 |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/digitalforensics0000inte_q8c6/digitalforensics0000inte_q8c6_marc.xml |
Download MARC binary | https://www.archive.org/download/digitalforensics0000inte_q8c6/digitalforensics0000inte_q8c6_meta.mrc |
LEADER: 04178cam 2200385Ia 4500
001 9925235803401661
005 20160406043630.1
008 130822s2013 gw a b 101 0 eng d
019 $a857971785
020 $a3642398901$q(pbk.)
020 $a9783642398902$q(pbk.)
035 $a99967293488
035 $a(OCoLC)858089201$z(OCoLC)857971785
035 $a(OCoLC)ocn858089201
040 $aCDX$beng$cCDX$dYDXCP$dOCLCQ$dCOO$dOCLCO$dBTCTA$dOCLCQ$dOCLCO$dOCLCF$dOCLCO$dOCL$dOCLCO$dOCLCQ
050 4 $aHV8079.C65$bI58 2012
082 04 $a363.25/968$222
111 2 $aInternational Conference on Digital Forensics and Cyber Crime$n(4th :$d2012 :$cLafayette, Ind.)
245 10 $aDigital forensics and cyber crime :$b4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012 : revised selected papers /$cMarcus Rogers, Kathryn C. Seigfried-Spellar (eds).
246 3 $aICDF2C 2012
260 $aHeidelberg ;$aNew York :$bSpringer,$cỨ́2013.
300 $axiii, 327 pages :$billustrations ;$c24 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering,$x1867-8211 ;$v114
505 00 $tCloud Investigations.$tCloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis /$rKeyun Ruan and Joe Carthy --$tCloud Forensic Maturity Model /$rKeyun Ruan and Joe Carthy --$tIdentifying Remnants of Evidence in the Cloud /$rJeremy Koppen [and others] --$tMalware.$tOn Improving Authorship Attribution of Source Code /$rMatthew F. Tennyson --$tBehavioral.$tTowards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes /$rAhmed F. Shosha [and others] --$tMeasuring the Preference of Image Content for Self-reported Consumers of Child Pornography /$rKathryn C. Seigfried-Spellar --$tCybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study /$rIbrahim Baggili [and others] --$tLaw.$tWhen Should Virtual Cybercrime Be Brought under the Scope of the Criminal Law? /$rLitska Strikwerda --$tNew Developments in Digital Forensics.$tResearch Trends in Digital Forensic Science: An Empirical Analysis of Published Research /$rIbrahim Baggili [and others] --$tFace Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern /$rAbdallah Mohamed and Roman V. Yampolskiy --$tSimilarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2 /$rFrank Breitinger and Harald Baier --$tInvestigating File Encrypted Material Using NTFS $logfile /$rNiall McGrath and Pavel Gladyshev --$tFinding Data in DNA: Computer Forensic Investigations of Living Organisms /$rMarc B. Beck, Eric C. Rouchka and Roman V. Yampolskiy --$tOn the Completeness of Reconstructed Data for Database Forensics /$rOluwasola Mary Adedayo and Martin S. Olivier --$tMobile Device Forensics.$tBlackBerry PlayBook Backup Forensic Analysis /$rMohamed Al Marzougy, Ibrahim Baggili and Andrew Marrington --$tANTS ROAD: A New Tool for SQLite Data Recovery on Android Devices /$rLamine M. Aouad, Tahar M. Kechadi and Roberto Di Russo --$tEvaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis /$rShahzad Saleem, Oliver Popov and Oheneba Kwame Appiah-Kubi --$tDetection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints /$rChrister Idland, Thomas Jelle and Stig F. Mj℗♭♯łlsnes --$tCybercrime Investigations.$tBREDOLAB: Shopping in the Cybercrime Underworld /$rDaan de Graaf, Ahmed F. Shosha and Pavel Gladyshev --$tA Review and Comparative Study of Digital Forensic Investigation Models /$rKwaku Kyei [and others].
504 $aIncludes bibliographical references and index.
650 0 $aComputer crimes$xInvestigation$vCongresses.
650 0 $aComputer security$vCongresses.
700 1 $aRogers, Marcus K.
700 1 $aSeigfried-Spellar, Kathryn C.
830 0 $aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$v114.
947 $hCIRCSTACKS$r31786103030802
980 $a99967293488