The directory entries used in the File Allocation Table filesystems maintain a significant amount of file metadata that is of interest to a forensic examiner. This information is ...
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
This paper reports from an ongoing field study of police practice in Sweden. The field study consists of direct observations and conversational interviews. The paper discusses cur...
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...