Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SADFE
SADFE 2011
Generate Citations
Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
May 26 2011 to May 26 2011
Oakland, California, USA
ISBN: 978-0-7695-4642-1
Table of Contents
IEEE SADFE 2011 Committees
Freely available from IEEE.
pp. 1-2
Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness
Freely available from IEEE.
pp. 1-3
by
Nan Zhang
,
Yong Guan
,
Michael M Losavio
,
Peter Vasquez
,
Robert M. Nissen
,
Edward Talbot
,
Vassil Roussev
The Wikileaks/Manning Panel
Freely available from IEEE.
pp. 1-2
Papers
Protecting Digital Data Privacy in Computer Forensic Examination
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Frank Y.W. Law
,
Patrick P.F. Chan
,
S.M. Yiu
,
K.P. Chow
,
Michael Y.K. Kwan
,
Hayson K.S. Tse
,
Pierre K.Y. Lai
Technical Issues of Forensic Investigations in Cloud Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Dominik Birk
,
Christoph Wegener
Papers
Secure Digital Chains of Evidence
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nicolai Kuntze
,
Carsten Rudolph
Characterizing Data Structures for Volatile Forensics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ellick Chan
,
Shivaram Venkataraman
,
Nadia Tkach
,
Kevin Larson
,
Alejandro Gutierrez
,
Roy H. Campbell
Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Saif Al-Kuwari
,
Stephen D. Wolthusen
Papers
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Junbin Fang
,
Zoe L. Jiang
,
S. M. Yiu
,
K. P. Chow
,
Lucas C. K. Hui
,
Long Chen
,
Xiamu Niu
Papers
Preparing for the Next Wikileaks: Making Forensics Techniques Work
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Robert F. Erbacher
Papers
Computer Forensics And Electronic Evidence - Failure of Competent Computer Forensic Analysis And Other Computer-Related Acts As Ineffective Assistance Of Counsel
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Michael Martin Losavio
,
Deborah Wilson Keeling
Papers
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jiang Wang
,
Fengwei Zhang
,
Kun Sun
,
Angelos Stavrou
Papers
Case Study on South Africa and Namibia: A Model for Electronic Evidence for the SADC Region
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Amelia Phillips
Papers
Host Identification via USB Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Lara Letaw
,
Joe Pletcher
,
Kevin Butler
Building Open and Scalable Digital Forensic Tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Vassil Roussev
Papers
Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Michael M. Losavio
,
Musa Hindi
,
Roman Yampolskiy
,
Deborah Wilson Keeling
Showing 16 out of 16