Centro de Documentação da PJ
Monografia

CD268
RAY, Indrajit, ed.
Advances in digital forensics IV [Documento electrónico] : IFIP International Conference on Digital Forensics / ed. Indrajit Ray, ed. Sujeet Shenoi.- New York : Springer, 2008.- 1 CD-ROM ; 12 cm. - (International Federation for Information Processing)
Ficheiro de 5,35 MB em formato PDF (367 p.).
ISBN 978-0-387-84926-3


INFORMÁTICA FORENSE, PROVA DIGITAL, REDE INFORMÁTICA, INTERNET, TELEFONE MÓVEL, SISTEMA OPERATIVO

Part I. Themes and issues. 1. When is Digital Evidence Forensically Sound? 2. Applying Traditional Forensic Taxonomy to Digital Forensics. Part II. Evidence recovery. 3. Recovering Data from Failing Floppy Disks. 4. Extracting Evidence Using Google Desktop Search. 5. Evaluation of Registry Data Removal by Shredder Programs. Part III. Evidence integrity. 6. Using Boot Control to Preserve the Integrity of Evidence. 7. Hypothesis-Based Investigation of Digital Timestamps. 8. Improving Disk Sector Integrity Using k-Dimension Hashing. Part IV. Evidence management. 9. Class-Aware Similarity Hashing for Data Classification. 10. Applying Topic Modeling to Forensic Data. Part V. Forensic techniques. 11. Forensic Analysis of Volatile Instant Messaging. 12. Timely Rootkit Detection During Live Response. Part VI. Network forensics. 13. Identifying and Analyzing Web Server Attacks. 14. Forensic Web Services. 15. Detecting Remote Exploits Using Data Mining. Part VII. Portable electronic device forensics. 16. Using Sensor Dirt for Toolmark Analysis of Digital Photographs. 17. A New Feature-Based Method for Source Camera Identification. 18. Data Recovery from Windows CE Based Handheld Devices. 19. Legal Issues Pertaining to the Use of Cell Phone Data. Part VIII. Event data recorder forensics. 20. Protection and Recovery of Railroad Event Recorder Data. 21. Automobile Event Data Recorder Forensics. Part IX. Novel investigative techniques. 22. Reasoning About Evidence Using Bayesian Networks. 23. Inferring Sources of Leaks in Document Management Systems. 24. Image Background Matching for Identifying Suspects. Part X. Forensic tools. 25. An Evidence Acquisition Tool for Live Systems. 26. Time Analysis of Hard Drive Imaging Tools. 27. Fusion of Steganalysis Systems Using Bayesian Model Averaging. 28. A Virtual Digital Forensics Laboratory.