Online Library TheLib.net » Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers
cover of the book Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers

Ebook: Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers

00
27.01.2024
2
0

This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.




This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.


This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
Content:
Front Matter....Pages -
The Role of Perception in Age Estimation....Pages 1-16
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers....Pages 17-32
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media....Pages 33-35
All Bot Net: A Need for Smartphone P2P Awareness....Pages 36-46
Results of Field Testing Mobile Phone Shielding Devices....Pages 47-61
Windows Phone 7 from a Digital Forensics’ Perspective....Pages 62-76
An Agent Based Tool for Windows Mobile Forensics....Pages 77-88
Forensic Extractions of Data from the Nokia N900....Pages 89-103
A Strategy for Testing Metadata Based Deleted File Recovery Tools....Pages 104-114
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus....Pages 115-130
A Novel Methodology for Malware Intrusion Attack Path Reconstruction....Pages 131-140
Performance Issues About Context-Triggered Piecewise Hashing....Pages 141-155
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment....Pages 156-171
Yahoo! Messenger Forensics on Windows Vista and Windows 7....Pages 172-179
Robust Hashing for Efficient Forensic Analysis of Image Sets....Pages 180-187
Tracking User Activity on Personal Computers....Pages 188-196
The Forensic Value of the Windows 7 Jump List....Pages 197-210
Finding Forensic Information on Creating a Folder in $LogFile of NTFS....Pages 211-225
Rescuing Digital Data from Submerged HDD....Pages 226-237
Evaluating the Forensic Image Generator Generator....Pages 238-252
Forensic Extractions of Data from the Nokia N900....Pages 253-267
A Forensic Framework for Incident Analysis Applied to the Insider Threat....Pages 268-281
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid....Pages 282-296
Back Matter....Pages -


This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
Content:
Front Matter....Pages -
The Role of Perception in Age Estimation....Pages 1-16
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers....Pages 17-32
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media....Pages 33-35
All Bot Net: A Need for Smartphone P2P Awareness....Pages 36-46
Results of Field Testing Mobile Phone Shielding Devices....Pages 47-61
Windows Phone 7 from a Digital Forensics’ Perspective....Pages 62-76
An Agent Based Tool for Windows Mobile Forensics....Pages 77-88
Forensic Extractions of Data from the Nokia N900....Pages 89-103
A Strategy for Testing Metadata Based Deleted File Recovery Tools....Pages 104-114
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus....Pages 115-130
A Novel Methodology for Malware Intrusion Attack Path Reconstruction....Pages 131-140
Performance Issues About Context-Triggered Piecewise Hashing....Pages 141-155
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment....Pages 156-171
Yahoo! Messenger Forensics on Windows Vista and Windows 7....Pages 172-179
Robust Hashing for Efficient Forensic Analysis of Image Sets....Pages 180-187
Tracking User Activity on Personal Computers....Pages 188-196
The Forensic Value of the Windows 7 Jump List....Pages 197-210
Finding Forensic Information on Creating a Folder in $LogFile of NTFS....Pages 211-225
Rescuing Digital Data from Submerged HDD....Pages 226-237
Evaluating the Forensic Image Generator Generator....Pages 238-252
Forensic Extractions of Data from the Nokia N900....Pages 253-267
A Forensic Framework for Incident Analysis Applied to the Insider Threat....Pages 268-281
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid....Pages 282-296
Back Matter....Pages -
....
Download the book Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen