Sciweavers

AUSFORENSICS
2004
13 years 5 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
AUSFORENSICS
2004
13 years 5 months ago
Electronic Crime - its not only the big end of town that should be worried
The permeation of technology into our daily lives has resulted in new types of criminal activity and new ways of committing old crimes. As with traditional crime, fundamental to t...
Mathew Hannan, Barry Blundell
AUSFORENSICS
2004
13 years 5 months ago
To Revisit: What is Forensic Computing?
The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academi...
Mathew Hannan
AUSFORENSICS
2004
13 years 5 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
AUSFORENSICS
2004
13 years 5 months ago
Tracing E-mail Headers
Marwan Al-Zarouni
AUSFORENSICS
2004
13 years 5 months ago
Towards Identifying Criteria for the Evidential Weight of System Event Logs
Despite the widespread use of computing in almost all functions of contemporary society and the consequently large number of forensic investigations where computing has been invol...
A. Ahmad, Anthonie B. Ruighaver
IMF
2007
13 years 5 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
IMF
2007
13 years 5 months ago
Taxonomy of Anti-Computer Forensics Threats
Joseph C. Sremack, Alexandre V. Antonov
IMF
2007
13 years 5 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
IMF
2007
13 years 5 months ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay