Legal Issues
Calibration Testing Of Network Tap Devices
On the Legality of Analyzing Telephone Call Records
Survey of Law Enforcement Perceptions Regarding Digital Evidence
Insider Threat Detection
Insider Threat Analysis Using Information-Centric Modeling
An Integrated System for Insider Threat Detection
Rootkit Detection
Analysis of Tools for Detecting Rootkits and Hidden Processes
A Method for Detecting Linux Kernel Module Rootkits
Authorship Attribution
Future Trends in Authorship Attribution
The Keyboard Dilemma and Authorship Identification
Forensic Techniques
Factors Affecting One-Way Hashing of CD-R Media
Disk Drive I/O Commands and Write Blocking
A New Process Model for Text String Searching
Detecting Steganography Using Multi-Class Classification
Redacting Digital Information from Electronic Devices
File System Forensics
In-Place File Carving
File System Journal Forensics
Network Forensics
Using Search Engines to Acquire Network Forensic Evidence
A Framework for Investigating Railroad Accidents
Portable Electronic Device Forensics
Forensic Analysis of Xbox Consoles
Super-Resolution Video Analysis for Forensic Investigations
Evidence Analysis and Management
Specializing CRISP-DM for Evidence Mining
Applying The Biba Integrity Model to Evidence Management
Formal Methods
Investigating Computer Attacks Using Attack Trees
Attack Patterns: A New Forensic and Design Tool.