Item type | Current library | Collection | Shelving location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
BOOKs | National Law School | Reference | NAB Compactor | 005.8 PET-XIII (Browse shelf(Opens below)) | Available | 35821 |
Table of Contents
Advances in Digital Forensics XIII
Gilbert Peterson, Sujeet Shenoi Front Matter
Themes and Issues
Establishing Findings in Digital Forensic Examinations: A Case Study Method
Oluwasayo Oyelami, Martin Olivier 3-21
A Model for Digital Evidence Admissibility Assessment
Albert Antwi-Boasiako, Hein Venter 23-38
Mobile and Embedded Device Forensics
Evaluating the Authenticity of Smartphone Evidence
Heloise Pieterse, Martin Olivier, Renier Heerden 41-61
Forensic Evaluation of an Amazon Fire TV Stick
Logan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland 63-79
Detecting Anomalous Programmable Logic Controller Events Using Machine Learning
Ken Yau, Kam-Pui Chow 81-94
Network and Cloud Forensics
A Forensic Methodology for Software-Defined Network Switches
Tommy Chin, Kaiqi Xiong 97-110
Identifying Evidence for Cloud Forensic Analysis
Changwei Liu, Anoop Singhal, Duminda Wijesekera 111-130
Threat Detection and Mitigation
Digital Forensic Implications of Collusion Attacks on the Lightning Network
Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski 133-147
Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis
Nicole Beebe, Lishu Liu, Zi Ye 149-167
Anti-Forensic Threat Modeling
Bruno Hoelz, Marcelo Maues 169-183
Malware Forensics
A Behavior-Based Approach for Malware Detection
Rayan Mosli, Rui Li, Bo Yuan, Yin Pan 187-201
Categorizing Mobile Device Malware Based on System Side-Effects
Zachary Grimmett, Jason Staggs, Sujeet Shenoi 203-219
Image Forensics
Semantic Video Carving Using Perceptual Hashing and Optical Flow
Sijin Li, Guikai Xi, Zoe Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li 223-244
Detecting Fraudulent Bank Checks
Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta 245-266
Forensic Techniques
Automated Collection and Correlation of File Provenance Information
Ryan Good, Gilbert Peterson 269-284
There are no comments on this title.