Table of Contents
|
Advances in Digital Forensics XII Gilbert Peterson, Sujeet Shenoi |
Front Matter |
THEMES AND ISSUES
|
On a Scientific Theory of Digital Forensics Martin Olivier |
3-24 |
Data Privacy Perceptions About Digital Forensic Investigations in India Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta |
25-45 |
A Framework for Assessing the Core Capabilities of a Digital Forensic Organization Ahmed Almarzooqi, Andrew Jones |
47-65 |
MOBILE DEVICE FORENSICS
|
Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics Oluwapelumi Aboluwarin, Panagiotis Andriotis, Atsuhiro Takasu, Theo Tryfonas |
69-87 |
Impact of User Data Privacy Management Controls on Mobile Device Investigations Panagiotis Andriotis, Theo Tryfonas |
89-105 |
Analyzing Mobile Device Ads to Identify Users Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta |
107-126 |
A Forensic Methodology for Analyzing Nintendo 3DS Devices Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos, Mikhaila Burgess |
127-143 |
NETWORK FORENSICS
|
Reconstructing Interactions with Rich Internet Applications from HTTP Traces Sara Baghbanzadeh, Salman Hooshmand, Gregor Bochmann, Guy-Vincent Jourdan, Seyed Mirtaheri, Muhammad Faheem, Iosif Onut |
147-164 |
Reconstructing Tabbed Browser Sessions Using Metadata Associations Sriram Raghavan |
165-188 |
A Probabilistic Network Forensic Model for Evidence Analysis Changwei Liu, Anoop Singhal, Duminda Wijesekera |
189-210 |
CLOUD FORENSICS
|
API-Based Forensic Acquisition of Cloud Drives Vassil Roussev, Andres Barreto, Irfan Ahmed |
213-235 |
The Cloud Storage Ecosystem – A New Business Model for Internet Piracy? Raymond Chan, Kam-Pui Chow, Vivien Chan, Michael Kwan |
237-255 |
SOCIAL MEDIA FORENSICS
|
Windows 8.x Facebook and Twitter Metro App Artifacts Swasti Bhushan Deb |
259-279 |
Profiling Flash Mob Organizers in Web Discussion Forums Vivien Chan, Kam-Pui Chow, Raymond Chan |
281-293 |
IMAGE FORENSICS
|
Enhancing Image Forgery Detection Using 2-D Cross Products Songpon Teerakanok, Tetsutaro Uehara |
297-310 |
Forensic Authentication of Bank Checks Rajesh Kumar, Gaurav Gupta |
311-322 |
FORENSIC TECHNIQUES
|
Data Type Classification: Hierarchical Class-to-Type Modeling Nicole Beebe, Lishu Liu, Minghe Sun |
325-343 |
Secure File Deletion for Solid State Drives Bhupendra Singh, Ravi Saharan, Gaurav Somani, Gaurav Gupta |
345-362 |
FORENSIC TOOLS
|
A Tool for Volatile Memory Acquisition from Android Devices Haiyu Yang, Jianwei Zhuge, Huiming Liu, Wei Liu |
365-378 |
Advanced Automated Disk Investigation Toolkit Umit Karabiyik, Sudhir Aggarwal |
379-396 |