NLSUI OPAC header image
Amazon cover image
Image from Amazon.com

Advances in digital forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, U S A, January 30 - February 1, 2017, Revised selected papers

Publisher: New York, NY : Springer Berlin Heidelberg, 2018Description: pages cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9783319672076
Subject(s): DDC classification:
  • 005.8 PET-XIII
Contents:
Table of Contents Advances in Digital Forensics XIII Gilbert Peterson, Sujeet Shenoi Front Matter Themes and Issues Establishing Findings in Digital Forensic Examinations: A Case Study Method Oluwasayo Oyelami, Martin Olivier 3-21 A Model for Digital Evidence Admissibility Assessment Albert Antwi-Boasiako, Hein Venter 23-38 Mobile and Embedded Device Forensics Evaluating the Authenticity of Smartphone Evidence Heloise Pieterse, Martin Olivier, Renier Heerden 41-61 Forensic Evaluation of an Amazon Fire TV Stick Logan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland 63-79 Detecting Anomalous Programmable Logic Controller Events Using Machine Learning Ken Yau, Kam-Pui Chow 81-94 Network and Cloud Forensics A Forensic Methodology for Software-Defined Network Switches Tommy Chin, Kaiqi Xiong 97-110 Identifying Evidence for Cloud Forensic Analysis Changwei Liu, Anoop Singhal, Duminda Wijesekera 111-130 Threat Detection and Mitigation Digital Forensic Implications of Collusion Attacks on the Lightning Network Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski 133-147 Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis Nicole Beebe, Lishu Liu, Zi Ye 149-167 Anti-Forensic Threat Modeling Bruno Hoelz, Marcelo Maues 169-183 Malware Forensics A Behavior-Based Approach for Malware Detection Rayan Mosli, Rui Li, Bo Yuan, Yin Pan 187-201 Categorizing Mobile Device Malware Based on System Side-Effects Zachary Grimmett, Jason Staggs, Sujeet Shenoi 203-219 Image Forensics Semantic Video Carving Using Perceptual Hashing and Optical Flow Sijin Li, Guikai Xi, Zoe Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li 223-244 Detecting Fraudulent Bank Checks Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta 245-266 Forensic Techniques Automated Collection and Correlation of File Provenance Information Ryan Good, Gilbert Peterson 269-284
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Status Date due Barcode
BOOKs BOOKs National Law School Reference NAB Compactor 005.8 PET-XIII (Browse shelf(Opens below)) Available 35821

Table of Contents
Advances in Digital Forensics XIII
Gilbert Peterson, Sujeet Shenoi Front Matter
Themes and Issues
Establishing Findings in Digital Forensic Examinations: A Case Study Method
Oluwasayo Oyelami, Martin Olivier 3-21
A Model for Digital Evidence Admissibility Assessment
Albert Antwi-Boasiako, Hein Venter 23-38
Mobile and Embedded Device Forensics
Evaluating the Authenticity of Smartphone Evidence
Heloise Pieterse, Martin Olivier, Renier Heerden 41-61
Forensic Evaluation of an Amazon Fire TV Stick
Logan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland 63-79
Detecting Anomalous Programmable Logic Controller Events Using Machine Learning
Ken Yau, Kam-Pui Chow 81-94
Network and Cloud Forensics
A Forensic Methodology for Software-Defined Network Switches
Tommy Chin, Kaiqi Xiong 97-110
Identifying Evidence for Cloud Forensic Analysis
Changwei Liu, Anoop Singhal, Duminda Wijesekera 111-130
Threat Detection and Mitigation
Digital Forensic Implications of Collusion Attacks on the Lightning Network
Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski 133-147
Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis
Nicole Beebe, Lishu Liu, Zi Ye 149-167
Anti-Forensic Threat Modeling
Bruno Hoelz, Marcelo Maues 169-183
Malware Forensics
A Behavior-Based Approach for Malware Detection
Rayan Mosli, Rui Li, Bo Yuan, Yin Pan 187-201
Categorizing Mobile Device Malware Based on System Side-Effects
Zachary Grimmett, Jason Staggs, Sujeet Shenoi 203-219
Image Forensics
Semantic Video Carving Using Perceptual Hashing and Optical Flow
Sijin Li, Guikai Xi, Zoe Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li 223-244
Detecting Fraudulent Bank Checks
Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta 245-266
Forensic Techniques
Automated Collection and Correlation of File Provenance Information
Ryan Good, Gilbert Peterson 269-284

There are no comments on this title.

to post a comment.