Abstract is missing.
- Overcast: Forensic Discovery in Cloud EnvironmentsStephen D. Wolthusen. 3-9 [doi]
- Experiences with the NoAH Honeynet Testbed to Detect new Internet WormsJan Kohlrausch. 13-26 [doi]
- Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response TeamKamol Kaemarungsi, Nawattapon Yoskamtorn, Kitisak Jirawannakool, Nuttapong Sanglerdsinlapachai, Chanin Luangingkasut. 27-40 [doi]
- Semi-autonomous Link Layer Vulnerability Discovery and Mitigation DisseminationZiyad Al-Salloum, Stephen D. Wolthusen. 41-53 [doi]
- From the Computer Incident Taxonomy to a Computer Forensic Examination TaxonomyRobert Altschaffel, Stefan Kiltz, Jana Dittmann. 54-68 [doi]
- Fast User Classifying to Establish Forensic Analysis PrioritiesAntonio Grillo, Alessandro Lentini, Gianluigi Me, Matteo Ottoni. 69-77 [doi]
- The Forensic Image Generator Generator (Forensig2)Christian Moch, Felix C. Freiling. 78-93 [doi]
- Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and ChallengesRafael Accorsi. 94-110 [doi]
- Technique to Interrogate an Image of RAMMark Wozar. 111-119 [doi]
- An Automated User Transparent Approach to log Web URLs for Forensic AnalysisMuhammad Kamran Ahmed, Mukhtar Hussain, Asad Raza. 120-127 [doi]
- Self-Forensics Through Case Studies of Small-to-Medium Software SystemsSerguei A. Mokhov, Emil Vassev. 128-141 [doi]
- Analysis of Download Accelerator Plus (DAP) for Forensic ArtefactsMuhammad Yasin, Muhammad Arif Wahla, Firdous Kausar. 142-152 [doi]
- A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software VendorsGuido Schryen. 153-168 [doi]